spice: Fail to build against OpenSSL 3.0
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
spice (Ubuntu) |
Fix Released
|
High
|
Christian Ehrhardt |
Bug Description
Hello,
As part of a rebuild against OpenSSL3, this package failed to build on one or
several architectures. You can find the details of the rebuild at
https:/
or for the amd64 failed build, directly at
We're planning to transition to OpenSSL 3.0 for the 22.04 release, and consider
this issue as blocking for this transition.
You can find general migration informations at
https:/
For your tests, you can build against libssl-dev as found in the PPA
schopin/
Upstream is tracking this issue, without any sign of a fix so far.
https:/
Related branches
- Sergio Durigan Junior (community): Approve
- Canonical Server packageset reviewers: Pending requested
- git-ubuntu import: Pending requested
-
Diff: 343 lines (+257/-2)4 files modifieddebian/changelog (+203/-0)
debian/control (+3/-2)
debian/patches/0001-test-leaks-fix-the-test-with-OpenSSL3.patch (+50/-0)
debian/patches/series (+1/-0)
Changed in spice (Ubuntu): | |
importance: | Undecided → High |
Changed in spice (Ubuntu): | |
assignee: | nobody → Christian Ehrhardt (paelzer) |
tags: | added: server-next |
tags: | added: patch |
Just when I was reproducing this and started to look at
Program received signal SIGPIPE, Broken pipe. 64-linux- gnu/libc. so.6 64-linux- gnu/libc. so.6 64-linux- gnu/libcrypto. so.3 64-linux- gnu/libcrypto. so.3 64-linux- gnu/libcrypto. so.3 64-linux- gnu/libcrypto. so.3 64-linux- gnu/libcrypto. so.3 64-linux- gnu/libcrypto. so.3 64-linux- gnu/libssl. so.3 64-linux- gnu/libssl. so.3 64-linux- gnu/libssl. so.3 64-linux- gnu/libssl. so.3 64-linux- gnu/libssl. so.3 64-linux- gnu/libssl. so.3 ssl_accept( RedStream* ) (stream= stream@ entry=0x5555557 85620) at ../server/ red-stream. cpp:519 enable_ ssl (ctx=0x5555556d 2ad0, stream= 0x555555785620) at ../server/ red-stream. cpp:569 client_ ssl_connection( RedsState* , int) (reds=reds@ entry=0x5555556 bc2c0, socket=<optimized out>) at ../server/ reds.cpp: 2377 add_ssl_ client (skip_auth=1, socket=<optimized out>, reds=0x5555556b c2c0) at ../server/ reds.cpp: 2454 tests/test- leaks.c: 75 64-linux- gnu/libglib- 2.0.so. 0 64-linux- gnu/libglib- 2.0.so. 0 64-linux- gnu/libglib- 2.0.so. 0 64-linux- gnu/libglib- 2.0.so. 0 tests/test- leaks.c: 256
0x00007ffff71923c7 in sendmsg () from /lib/x86_
(gdb) bt
#0 0x00007ffff71923c7 in sendmsg () at /lib/x86_
#1 0x00007ffff79da645 in () at /lib/x86_
#2 0x00007ffff79ca24b in () at /lib/x86_
#3 0x00007ffff79cdb06 in () at /lib/x86_
#4 0x00007ffff79cdc37 in BIO_write () at /lib/x86_
#5 0x00007ffff79cf061 in () at /lib/x86_
#6 0x00007ffff79ce86f in BIO_ctrl () at /lib/x86_
#7 0x00007ffff7d592da in () at /lib/x86_
#8 0x00007ffff7d93438 in () at /lib/x86_
#9 0x00007ffff7d864ab in () at /lib/x86_
#10 0x00007ffff7d87d99 in () at /lib/x86_
#11 0x00007ffff7d99a56 in () at /lib/x86_
#12 0x00007ffff7d9b528 in () at /lib/x86_
#13 0x000055555556a01f in red_stream_
#14 0x0000555555571e00 in red_stream_
#15 reds_init_
#16 0x000055555557213f in spice_server_
#17 server_leaks() () at ../server/
#18 0x00007ffff7f025a6 in () at /lib/x86_
#19 0x00007ffff7f022cb in () at /lib/x86_
#20 0x00007ffff7f02a7a in g_test_run_suite () at /lib/x86_
#21 0x00007ffff7f02aa1 in g_test_run () at /lib/x86_
#22 0x0000555555562ce2 in main(int, char**) (argc=<optimized out>, argv=<optimized out>) at ../server/
I got a ping from Schopin that he has found this and it is around g_test_ expect_ message that makes this more fatal than it should be.
He has and will post a fix upstream.
Thanks for that!
Please add the link to that patch here and let me know if you intend to upload it to Ubuntu yourself?