ID: 40926 Updated by: [EMAIL PROTECTED] Reported By: seanius at debian dot org -Status: Open +Status: Analyzed Bug Type: PostgreSQL related Operating System: Debian GNU/Linux PHP Version: 5.2CVS-2008-05-15 -Assigned To: +Assigned To: hholzgra New Comment:
This is being worked on on the PG side, see "libpq callback unregistration" on http://wiki.postgresql.org/wiki/CommitFest_2008-11#Clients Previous Comments: ------------------------------------------------------------------------ [2008-10-28 22:27:52] [EMAIL PROTECTED] yohgaki seems to have left us so de-assigning. ------------------------------------------------------------------------ [2008-03-01 14:17:22] jbq at caraldi dot com Another workaround is to recompile PostgreSQL's libpq without OpenSSL support (ie the --with-openssl configure switch). After all, OpenSSL is rarely needed in a typical LAPP installation. ------------------------------------------------------------------------ [2007-11-12 14:45:13] sam at zoy dot org Hello, I did read the sources and studied them, and I can confirm that it is a matter of callback jumping to an invalid address. libpq's init_ssl_system() installs callbacks by calling CRYPTO_set_id_callback() and CRYPTO_set_locking_callback(). This function is called each time initialize_SSL() is called (for instance through the PHP pg_connect() function) and does not keep a reference counter, so libpq's destroy_SSL() has no way to know that it should call a destroy_ssl_system() function, and there is no such function anyway. So the callbacks are never removed. But then, upon cleanup, PHP calls zend_shutdown() which properly unloads pgsql.so and therefore the unused libpq. Finally, the zend_shutdown procedure calls zm_shutdown_curl() which in turn calls curl_global_cleanup() which leads to an ERR_free_strings() call and eventually a CRYPTO_lock() call. CRYPTO_lock() checks whether there are any callbacks to call, finds one (the one installed by libpg), calls it, and crashes because libpq was unloaded and hence the callback is no longer in mapped memory. There are a few ways to fix the problem, all of which are highly unsatisfying or irrealist: - always ensure that pgsql.so is loaded before (and therefore unloaded after) any other SSL-using library. - fix libpq so that it keeps a reference count when initialize_SSL() is called, updates it when destroy_SSL() is called, and remove SSL callbacks when the reference count reaches zero. - fix libpq so that it removes the SSL callbacks when unloaded (done in the library's .fini section) - hack PHP's module_destructor() so that it does not unload a module if its name was pgsql.so (or maybe there is already a mechanism for that). None of these proposals is really safe because there might be other conflicts due to libssl not being context-aware. There is also the possibility to fix libssl by making it reentrant or context-aware (just kidding, lol). In all cases, libssl can be copiously blamed. ------------------------------------------------------------------------ [2007-03-26 22:00:20] [EMAIL PROTECTED] Assigned to the maintainer. See also bug #36152. ------------------------------------------------------------------------ [2007-03-26 21:42:29] seanius at debian dot org Description: ------------ note that this might not be a bug in php, but php is certainly affected by it so it's worth at least a bogus entry in your db so other people can google their way to it. if you compile curl and pgsql as shared extensions and then load them in the same order from php.ini, any script that establishes a postgres connection will result in a segfault before the script quits. the problem seems to be that the postgresql libpq library registers a callback function (pq_lockingcallback) for openssl-related locking. around exit time, when php unloads the various extensions, if any modules reference openssl routines in their shutdown methods that indirectly call openssl locking routines, the ssl library will try and call the callback function, which now points at invalid memory since the libpq library has already been dlclose()'d somewhere. if it's been closed directly by php (you guys would know better than me) then i'd say it's a php bug, but if it's closed indirectly by some pq shutdown routine, then you're just innocent victims. anyway, there's a pretty simple workaround for the time being. if you reverse the module loading so order so that pgsql is loaded first (and thus unloaded last by the current php engine), then the callback function never references invalid memory and no segfault happens. btw this was reported a couple times in the debian bts, most of the information can be found at http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=411982 (this is for 5.2.0, but i've verified it against the latest 5.2.1 as well) also, i found #36152 in your bts after writing this up, but it seems that was marked closed in 2006. i think the suggestion in there about overriding libpq's callbacks with your own would probably be the most appropriate if possible. Reproduce code: --------------- <?php // curl.so is loaded before pgsql.so in php.ini $conn_string = "host=localhost dbname=data user=user password=pword"; $dbconn = pg_connect($conn_string); $query = "SELECT count(1) FROM table"; $result = pg_query($dbconn, $query); pg_close($dbconn); ?> Expected result: ---------------- either a successfull connection or error messages about failed connection Actual result: -------------- the expected errors/success, followed by a segfault: copelandia[~]23:30:08$ php foo.php Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL: password authentication failed for user "user" in /home/seanius/foo.php on line 6 Warning: pg_query(): supplied argument is not a valid PostgreSQL link resource in /home/seanius/foo.php on line 8 Warning: pg_close(): supplied argument is not a valid PostgreSQL link resource in /home/seanius/foo.php on line 9 zsh: segmentation fault php foo.php (gdb) bt #0 0x00002b71ee8889a0 in ?? () #1 0x00002b71edf446df in int_err_del () at err.c:353 #2 0x00002b71ee4e9ef9 in Curl_ossl_cleanup () at ../../../lib/ssluse.c:580 #3 0x00002b71ee4f93e2 in Curl_ssl_cleanup () at ../../../lib/sslgen.c:185 #4 0x00002b71ee4f2233 in curl_global_cleanup () at ../../../lib/easy.c:294 #5 0x00002b71ee3a3699 in zm_shutdown_curl (type=9, module_number=1) at /tmp/buildd/php5-5.2.0/ext/curl/interface.c:668 ... where 0x00002b71ee8889a0 was formerly the address of the above mentioned locking callback function ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=40926&edit=1