PostgreSQL Source Code git master
Loading...
Searching...
No Matches
miscinit.c
Go to the documentation of this file.
1/*-------------------------------------------------------------------------
2 *
3 * miscinit.c
4 * miscellaneous initialization support stuff
5 *
6 * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
7 * Portions Copyright (c) 1994, Regents of the University of California
8 *
9 *
10 * IDENTIFICATION
11 * src/backend/utils/init/miscinit.c
12 *
13 *-------------------------------------------------------------------------
14 */
15#include "postgres.h"
16
17#include <sys/param.h>
18#include <signal.h>
19#include <time.h>
20#include <sys/file.h>
21#include <sys/stat.h>
22#include <sys/time.h>
23#include <fcntl.h>
24#include <unistd.h>
25#include <grp.h>
26#include <pwd.h>
27#include <netinet/in.h>
28#include <arpa/inet.h>
29#include <utime.h>
30
31#include "access/htup_details.h"
32#include "access/parallel.h"
33#include "catalog/pg_authid.h"
34#include "common/file_perm.h"
35#include "libpq/libpq.h"
36#include "libpq/pqsignal.h"
37#include "mb/pg_wchar.h"
38#include "miscadmin.h"
39#include "pgstat.h"
44#include "storage/fd.h"
45#include "storage/ipc.h"
46#include "storage/latch.h"
47#include "storage/pg_shmem.h"
48#include "storage/pmsignal.h"
49#include "storage/proc.h"
50#include "storage/procarray.h"
51#include "utils/builtins.h"
52#include "utils/guc.h"
53#include "utils/inval.h"
54#include "utils/memutils.h"
55#include "utils/pidfile.h"
56#include "utils/syscache.h"
57#include "utils/varlena.h"
58#include "utils/wait_event.h"
59
60
61#define DIRECTORY_LOCK_FILE "postmaster.pid"
62
64
66
67/* List of lock files to be removed at proc exit */
69
71
72/* ----------------------------------------------------------------
73 * ignoring system indexes support stuff
74 *
75 * NOTE: "ignoring system indexes" means we do not use the system indexes
76 * for lookups (either in hardwired catalog accesses or in planner-generated
77 * plans). We do, however, still update the indexes when a catalog
78 * modification is made.
79 * ----------------------------------------------------------------
80 */
81
83
84
85/* ----------------------------------------------------------------
86 * common process startup code
87 * ----------------------------------------------------------------
88 */
89
90/*
91 * Initialize the basic environment for a postmaster child
92 *
93 * Should be called as early as possible after the child's startup. However,
94 * on EXEC_BACKEND builds it does need to be after read_backend_variables().
95 */
96void
98{
99 IsUnderPostmaster = true; /* we are a postmaster subprocess now */
100
101 /*
102 * Start our win32 signal implementation. This has to be done after we
103 * read the backend variables, because we need to pick up the signal pipe
104 * from the parent process.
105 */
106#ifdef WIN32
108#endif
109
111
112 /*
113 * make sure stderr is in binary mode before anything can possibly be
114 * written to it, in case it's actually the syslogger pipe, so the pipe
115 * chunking protocol isn't disturbed. Non-logpipe data gets translated on
116 * redirection (e.g. via pg_ctl -l) anyway.
117 */
118#ifdef WIN32
119 _setmode(fileno(stderr), _O_BINARY);
120#endif
121
122 /* We don't want the postmaster's proc_exit() handlers */
124
125 /* In EXEC_BACKEND case we will not have inherited BlockSig etc values */
126#ifdef EXEC_BACKEND
127 pqinitmask();
128#endif
129
130 /* Initialize process-local latch support */
134
135 /*
136 * If possible, make this process a group leader, so that the postmaster
137 * can signal any child processes too. Not all processes will have
138 * children, but for consistency we make all postmaster child processes do
139 * this.
140 */
141#ifdef HAVE_SETSID
142 if (setsid() < 0)
143 elog(FATAL, "setsid() failed: %m");
144#endif
145
146 /*
147 * Every postmaster child process is expected to respond promptly to
148 * SIGQUIT at all times. Therefore we centrally remove SIGQUIT from
149 * BlockSig and install a suitable signal handler. (Client-facing
150 * processes may choose to replace this default choice of handler with
151 * quickdie().) All other blockable signals remain blocked for now.
152 */
154
157
158 /* Request a signal if the postmaster dies, if possible. */
160
161 /* Don't give the pipe to subprograms that we execute. */
162#ifndef WIN32
166 errmsg_internal("could not set postmaster death monitoring pipe to FD_CLOEXEC mode: %m")));
167#endif
168}
169
170/*
171 * Initialize the basic environment for a standalone process.
172 *
173 * argv0 has to be suitable to find the program's executable.
174 */
175void
177{
179
181
182 /*
183 * Start our win32 signal implementation
184 */
185#ifdef WIN32
187#endif
188
190
191 /* Initialize process-local latch support */
195
196 /*
197 * For consistency with InitPostmasterChild, initialize signal mask here.
198 * But we don't unblock SIGQUIT or provide a default handler for it.
199 */
200 pqinitmask();
202
203 /* Compute paths, no postmaster to inherit from */
204 if (my_exec_path[0] == '\0')
205 {
207 elog(FATAL, "%s: could not locate my own executable path",
208 argv0);
209 }
210
211 if (pkglib_path[0] == '\0')
213}
214
215void
217{
219 Assert(MyProc != NULL);
220
222
223 if (FeBeWaitSet)
225 MyLatch);
226
227 /*
228 * Set the shared latch as the local one might have been set. This
229 * shouldn't normally be necessary as code is supposed to check the
230 * condition before waiting for the latch, but a bit care can't hurt.
231 */
233}
234
235void
241
242void
256
257/*
258 * Return a human-readable string representation of a BackendType.
259 *
260 * The string is not localized here, but we mark the strings for translation
261 * so that callers can invoke _() on the result.
262 */
263const char *
265{
266 const char *backendDesc = gettext_noop("unknown process type");
267
268 switch (backendType)
269 {
270#define PG_PROCTYPE(bktype, bkcategory, description, main_func, shmem_attach) \
271 case bktype: backendDesc = description; break;
273#undef PG_PROCTYPE
274 }
275 return backendDesc;
276}
277
278/* ----------------------------------------------------------------
279 * database path / name support stuff
280 * ----------------------------------------------------------------
281 */
282
283void
284SetDatabasePath(const char *path)
285{
286 /* This should happen only once per process */
289}
290
291/*
292 * Validate the proposed data directory.
293 *
294 * Also initialize file and directory create modes and mode mask.
295 */
296void
298{
299 struct stat stat_buf;
300
302
303 if (stat(DataDir, &stat_buf) != 0)
304 {
305 if (errno == ENOENT)
308 errmsg("data directory \"%s\" does not exist",
309 DataDir)));
310 else
313 errmsg("could not read permissions of directory \"%s\": %m",
314 DataDir)));
315 }
316
317 /* eventual chdir would fail anyway, but let's test ... */
318 if (!S_ISDIR(stat_buf.st_mode))
321 errmsg("specified data directory \"%s\" is not a directory",
322 DataDir)));
323
324 /*
325 * Check that the directory belongs to my userid; if not, reject.
326 *
327 * This check is an essential part of the interlock that prevents two
328 * postmasters from starting in the same directory (see CreateLockFile()).
329 * Do not remove or weaken it.
330 *
331 * XXX can we safely enable this check on Windows?
332 */
333#if !defined(WIN32) && !defined(__CYGWIN__)
334 if (stat_buf.st_uid != geteuid())
337 errmsg("data directory \"%s\" has wrong ownership",
338 DataDir),
339 errhint("The server must be started by the user that owns the data directory.")));
340#endif
341
342 /*
343 * Check if the directory has correct permissions. If not, reject.
344 *
345 * Only two possible modes are allowed, 0700 and 0750. The latter mode
346 * indicates that group read/execute should be allowed on all newly
347 * created files and directories.
348 *
349 * XXX temporarily suppress check when on Windows, because there may not
350 * be proper support for Unix-y file permissions. Need to think of a
351 * reasonable check to apply on Windows.
352 */
353#if !defined(WIN32) && !defined(__CYGWIN__)
354 if (stat_buf.st_mode & PG_MODE_MASK_GROUP)
357 errmsg("data directory \"%s\" has invalid permissions",
358 DataDir),
359 errdetail("Permissions should be u=rwx (0700) or u=rwx,g=rx (0750).")));
360#endif
361
362 /*
363 * Reset creation modes and mask based on the mode of the data directory.
364 *
365 * The mask was set earlier in startup to disallow group permissions on
366 * newly created files and directories. However, if group read/execute
367 * are present on the data directory then modify the create modes and mask
368 * to allow group read/execute on newly created files and directories and
369 * set the data_directory_mode GUC.
370 *
371 * Suppress when on Windows, because there may not be proper support for
372 * Unix-y file permissions.
373 */
374#if !defined(WIN32) && !defined(__CYGWIN__)
376
379#endif
380
381 /* Check for PG_VERSION */
383}
384
385/*
386 * Set data directory, but make sure it's an absolute path. Use this,
387 * never set DataDir directly.
388 */
389void
390SetDataDir(const char *dir)
391{
392 char *new;
393
394 Assert(dir);
395
396 /* If presented path is relative, convert to absolute */
397 new = make_absolute_path(dir);
398
399 free(DataDir);
400 DataDir = new;
401}
402
403/*
404 * Change working directory to DataDir. Most of the postmaster and backend
405 * code assumes that we are in DataDir so it can use relative paths to access
406 * stuff in and under the data directory. For convenience during path
407 * setup, however, we don't force the chdir to occur during SetDataDir.
408 */
409void
411{
413
414 if (chdir(DataDir) < 0)
417 errmsg("could not change directory to \"%s\": %m",
418 DataDir)));
419}
420
421
422/* ----------------------------------------------------------------
423 * User ID state
424 *
425 * We have to track several different values associated with the concept
426 * of "user ID".
427 *
428 * AuthenticatedUserId is determined at connection start and never changes.
429 *
430 * SessionUserId is initially the same as AuthenticatedUserId, but can be
431 * changed by SET SESSION AUTHORIZATION (if AuthenticatedUserId is a
432 * superuser). This is the ID reported by the SESSION_USER SQL function.
433 *
434 * OuterUserId is the current user ID in effect at the "outer level" (outside
435 * any transaction or function). This is initially the same as SessionUserId,
436 * but can be changed by SET ROLE to any role that SessionUserId is a
437 * member of. (XXX rename to something like CurrentRoleId?)
438 *
439 * CurrentUserId is the current effective user ID; this is the one to use
440 * for all normal permissions-checking purposes. At outer level this will
441 * be the same as OuterUserId, but it changes during calls to SECURITY
442 * DEFINER functions, as well as locally in some specialized commands.
443 *
444 * SecurityRestrictionContext holds flags indicating reason(s) for changing
445 * CurrentUserId. In some cases we need to lock down operations that are
446 * not directly controlled by privilege settings, and this provides a
447 * convenient way to do it.
448 * ----------------------------------------------------------------
449 */
454static const char *SystemUser = NULL;
455
456/* We also have to remember the superuser state of the session user */
457static bool SessionUserIsSuperuser = false;
458
460
461/* We also remember if a SET ROLE is currently active */
462static bool SetRoleIsActive = false;
463
464/*
465 * GetUserId - get the current effective user ID.
466 *
467 * Note: there's no SetUserId() anymore; use SetUserIdAndSecContext().
468 */
469Oid
471{
473 return CurrentUserId;
474}
475
476
477/*
478 * GetOuterUserId/SetOuterUserId - get/set the outer-level user ID.
479 */
480Oid
482{
484 return OuterUserId;
485}
486
487
488static void
490{
492 Assert(OidIsValid(userid));
493 OuterUserId = userid;
494
495 /* We force the effective user ID to match, too */
496 CurrentUserId = userid;
497
498 /* Also update the is_superuser GUC to match OuterUserId's property */
499 SetConfigOption("is_superuser",
500 is_superuser ? "on" : "off",
502}
503
504
505/*
506 * GetSessionUserId/SetSessionUserId - get/set the session user ID.
507 */
508Oid
514
515bool
521
522static void
530
531/*
532 * Return the system user representing the authenticated identity.
533 * It is defined in InitializeSystemUser() as auth_method:authn_id.
534 */
535const char *
537{
538 return SystemUser;
539}
540
541/*
542 * GetAuthenticatedUserId/SetAuthenticatedUserId - get/set the authenticated
543 * user ID
544 */
545Oid
551
552void
554{
555 Assert(OidIsValid(userid));
556
557 /* call only once */
559
560 AuthenticatedUserId = userid;
561
562 /* Also mark our PGPROC entry with the authenticated user id */
563 /* (We assume this is an atomic store so no lock is needed) */
564 MyProc->roleId = userid;
565}
566
567
568/*
569 * GetUserIdAndSecContext/SetUserIdAndSecContext - get/set the current user ID
570 * and the SecurityRestrictionContext flags.
571 *
572 * Currently there are three valid bits in SecurityRestrictionContext:
573 *
574 * SECURITY_LOCAL_USERID_CHANGE indicates that we are inside an operation
575 * that is temporarily changing CurrentUserId via these functions. This is
576 * needed to indicate that the actual value of CurrentUserId is not in sync
577 * with guc.c's internal state, so SET ROLE has to be disallowed.
578 *
579 * SECURITY_RESTRICTED_OPERATION indicates that we are inside an operation
580 * that does not wish to trust called user-defined functions at all. The
581 * policy is to use this before operations, e.g. autovacuum and REINDEX, that
582 * enumerate relations of a database or schema and run functions associated
583 * with each found relation. The relation owner is the new user ID. Set this
584 * as soon as possible after locking the relation. Restore the old user ID as
585 * late as possible before closing the relation; restoring it shortly after
586 * close is also tolerable. If a command has both relation-enumerating and
587 * non-enumerating modes, e.g. ANALYZE, both modes set this bit. This bit
588 * prevents not only SET ROLE, but various other changes of session state that
589 * normally is unprotected but might possibly be used to subvert the calling
590 * session later. An example is replacing an existing prepared statement with
591 * new code, which will then be executed with the outer session's permissions
592 * when the prepared statement is next used. These restrictions are fairly
593 * draconian, but the functions called in relation-enumerating operations are
594 * really supposed to be side-effect-free anyway.
595 *
596 * SECURITY_NOFORCE_RLS indicates that we are inside an operation which should
597 * ignore the FORCE ROW LEVEL SECURITY per-table indication. This is used to
598 * ensure that FORCE RLS does not mistakenly break referential integrity
599 * checks. Note that this is intentionally only checked when running as the
600 * owner of the table (which should always be the case for referential
601 * integrity checks).
602 *
603 * Unlike GetUserId, GetUserIdAndSecContext does *not* Assert that the current
604 * value of CurrentUserId is valid; nor does SetUserIdAndSecContext require
605 * the new value to be valid. In fact, these routines had better not
606 * ever throw any kind of error. This is because they are used by
607 * StartTransaction and AbortTransaction to save/restore the settings,
608 * and during the first transaction within a backend, the value to be saved
609 * and perhaps restored is indeed invalid. We have to be able to get
610 * through AbortTransaction without asserting in case InitPostgres fails.
611 */
612void
613GetUserIdAndSecContext(Oid *userid, int *sec_context)
614{
615 *userid = CurrentUserId;
616 *sec_context = SecurityRestrictionContext;
617}
618
619void
620SetUserIdAndSecContext(Oid userid, int sec_context)
621{
622 CurrentUserId = userid;
623 SecurityRestrictionContext = sec_context;
624}
625
626
627/*
628 * InLocalUserIdChange - are we inside a local change of CurrentUserId?
629 */
630bool
635
636/*
637 * InSecurityRestrictedOperation - are we inside a security-restricted command?
638 */
639bool
644
645/*
646 * InNoForceRLSOperation - are we ignoring FORCE ROW LEVEL SECURITY ?
647 */
648bool
653
654
655/*
656 * These are obsolete versions of Get/SetUserIdAndSecContext that are
657 * only provided for bug-compatibility with some rather dubious code in
658 * pljava. We allow the userid to be set, but only when not inside a
659 * security restriction context.
660 */
661void
667
668void
670{
671 /* We throw the same error SET ROLE would. */
675 errmsg("cannot set parameter \"%s\" within security-restricted operation",
676 "role")));
677 CurrentUserId = userid;
678 if (sec_def_context)
680 else
682}
683
684
685/*
686 * Check whether specified role has explicit REPLICATION privilege
687 */
688bool
690{
691 bool result = false;
693
694 /* Superusers bypass all permission checking. */
695 if (superuser_arg(roleid))
696 return true;
697
700 {
703 }
704 return result;
705}
706
707/*
708 * Initialize user identity during normal backend startup
709 */
710void
711InitializeSessionUserId(const char *rolename, Oid roleid,
713{
716 char *rname;
717 bool is_superuser;
718
719 /*
720 * In a parallel worker, we don't have to do anything here.
721 * ParallelWorkerMain already set our output variables, and we aren't
722 * going to enforce either rolcanlogin or rolconnlimit. Furthermore, we
723 * don't really want to perform a catalog lookup for the role: we don't
724 * want to fail if it's been dropped.
725 */
727 {
729 return;
730 }
731
732 /*
733 * Don't do scans if we're bootstrapping, none of the system catalogs
734 * exist yet, and they should be owned by postgres anyway.
735 */
737
738 /*
739 * Make sure syscache entries are flushed for recent catalog changes. This
740 * allows us to find roles that were created on-the-fly during
741 * authentication.
742 */
744
745 /*
746 * Look up the role, either by name if that's given or by OID if not.
747 */
748 if (rolename != NULL)
749 {
754 errmsg("role \"%s\" does not exist", rolename)));
755 }
756 else
757 {
762 errmsg("role with OID %u does not exist", roleid)));
763 }
764
766 roleid = rform->oid;
767 rname = NameStr(rform->rolname);
768 is_superuser = rform->rolsuper;
769
771
772 /*
773 * Set SessionUserId and related variables, including "role", via the GUC
774 * mechanisms.
775 *
776 * Note: ideally we would use PGC_S_DYNAMIC_DEFAULT here, so that
777 * session_authorization could subsequently be changed from
778 * pg_db_role_setting entries. Instead, session_authorization in
779 * pg_db_role_setting has no effect. Changing that would require solving
780 * two problems:
781 *
782 * 1. If pg_db_role_setting has values for both session_authorization and
783 * role, we could not be sure which order those would be applied in, and
784 * it would matter.
785 *
786 * 2. Sites may have years-old session_authorization entries. There's not
787 * been any particular reason to remove them. Ending the dormancy of
788 * those entries could seriously change application behavior, so only a
789 * major release should do that.
790 */
791 SetConfigOption("session_authorization", rname,
793
794 /*
795 * These next checks are not enforced when in standalone mode, so that
796 * there is a way to recover from sillinesses like "UPDATE pg_authid SET
797 * rolcanlogin = false;".
798 */
800 {
801 /*
802 * Is role allowed to login at all? (But background workers can
803 * override this by setting bypass_login_check.)
804 */
805 if (!bypass_login_check && !rform->rolcanlogin)
808 errmsg("role \"%s\" is not permitted to log in",
809 rname)));
810
811 /*
812 * Check connection limit for this role. We enforce the limit only
813 * for regular backends, since other process types have their own
814 * PGPROC pools.
815 *
816 * There is a race condition here --- we create our PGPROC before
817 * checking for other PGPROCs. If two backends did this at about the
818 * same time, they might both think they were over the limit, while
819 * ideally one should succeed and one fail. Getting that to work
820 * exactly seems more trouble than it is worth, however; instead we
821 * just document that the connection limit is approximate.
822 */
823 if (rform->rolconnlimit >= 0 &&
825 !is_superuser &&
826 CountUserBackends(roleid) > rform->rolconnlimit)
829 errmsg("too many connections for role \"%s\"",
830 rname)));
831 }
832
834}
835
836
837/*
838 * Initialize user identity during special backend startup
839 */
840void
842{
843 /*
844 * This function should only be called in single-user mode, in autovacuum
845 * workers, in slot sync worker and in background workers.
846 */
850
851 /* call only once */
853
855
856 /*
857 * XXX Ideally we'd do this via SetConfigOption("session_authorization"),
858 * but we lack the role name needed to do that, and we can't fetch it
859 * because one reason for this special case is to be able to start up even
860 * if something's happened to the BOOTSTRAP_SUPERUSERID's pg_authid row.
861 * Since we don't set the GUC itself, C code will see the value as NULL,
862 * and current_setting() will report an empty string within this session.
863 */
865
866 /* We could do SetConfigOption("role"), but let's be consistent */
868}
869
870/*
871 * Initialize the system user.
872 *
873 * This is built as auth_method:authn_id.
874 */
875void
876InitializeSystemUser(const char *authn_id, const char *auth_method)
877{
878 char *system_user;
879
880 /* call only once */
882
883 /*
884 * InitializeSystemUser should be called only when authn_id is not NULL,
885 * meaning that auth_method is valid.
886 */
887 Assert(authn_id != NULL);
888
889 system_user = psprintf("%s:%s", auth_method, authn_id);
890
891 /* Store SystemUser in long-lived storage */
894}
895
896/*
897 * SQL-function SYSTEM_USER
898 */
899Datum
901{
902 const char *sysuser = GetSystemUser();
903
904 if (sysuser)
906 else
908}
909
910/*
911 * Change session auth ID while running
912 *
913 * The SQL standard says that SET SESSION AUTHORIZATION implies SET ROLE NONE.
914 * We mechanize that at higher levels not here, because this is the GUC
915 * assign hook for "session_authorization", and it must be commutative with
916 * SetCurrentRoleId (the hook for "role") because guc.c provides no guarantees
917 * which will run first during cases such as transaction rollback. Therefore,
918 * we update derived state (OuterUserId/CurrentUserId/is_superuser) only if
919 * !SetRoleIsActive.
920 */
921void
923{
925
926 if (!SetRoleIsActive)
928}
929
930/*
931 * Report current role id
932 * This follows the semantics of SET ROLE, ie return the outer-level ID
933 * not the current effective ID, and return InvalidOid when the setting
934 * is logically SET ROLE NONE.
935 */
936Oid
938{
939 if (SetRoleIsActive)
940 return OuterUserId;
941 else
942 return InvalidOid;
943}
944
945/*
946 * Change Role ID while running (SET ROLE)
947 *
948 * If roleid is InvalidOid, we are doing SET ROLE NONE: revert to the
949 * session user authorization. In this case the is_superuser argument
950 * is ignored.
951 *
952 * When roleid is not InvalidOid, the caller must have checked whether
953 * the session user has permission to become that role. (We cannot check
954 * here because this routine must be able to execute in a failed transaction
955 * to restore a prior value of the ROLE GUC variable.)
956 */
957void
959{
960 /*
961 * Get correct info if it's SET ROLE NONE
962 *
963 * If SessionUserId hasn't been set yet, do nothing beyond updating
964 * SetRoleIsActive --- the eventual SetSessionAuthorization call will
965 * update the derived state. This is needed since we will get called
966 * during GUC initialization.
967 */
968 if (!OidIsValid(roleid))
969 {
970 SetRoleIsActive = false;
971
973 return;
974
975 roleid = SessionUserId;
977 }
978 else
979 SetRoleIsActive = true;
980
982}
983
984
985/*
986 * Get user name from user oid, returns NULL for nonexistent roleid if noerr
987 * is true.
988 */
989char *
991{
992 HeapTuple tuple;
993 char *result;
994
995 tuple = SearchSysCache1(AUTHOID, ObjectIdGetDatum(roleid));
996 if (!HeapTupleIsValid(tuple))
997 {
998 if (!noerr)
1001 errmsg("invalid role OID: %u", roleid)));
1002 result = NULL;
1003 }
1004 else
1005 {
1007 ReleaseSysCache(tuple);
1008 }
1009 return result;
1010}
1011
1012/* ------------------------------------------------------------------------
1013 * Client connection state shared with parallel workers
1014 *
1015 * ClientConnectionInfo contains pieces of information about the client that
1016 * need to be synced to parallel workers when they initialize.
1017 *-------------------------------------------------------------------------
1018 */
1019
1021
1022/*
1023 * Intermediate representation of ClientConnectionInfo for easier
1024 * serialization. Variable-length fields are allocated right after this
1025 * header.
1026 */
1032
1033/*
1034 * Calculate the space needed to serialize MyClientConnectionInfo.
1035 */
1036Size
1038{
1039 Size size = 0;
1040
1041 size = add_size(size, sizeof(SerializedClientConnectionInfo));
1042
1045
1046 return size;
1047}
1048
1049/*
1050 * Serialize MyClientConnectionInfo for use by parallel workers.
1051 */
1052void
1054 char *start_address)
1055{
1057
1060
1063
1064 /* Copy serialized representation to buffer */
1065 Assert(maxsize >= sizeof(serialized));
1067
1068 maxsize -= sizeof(serialized);
1069 start_address += sizeof(serialized);
1070
1071 /* Copy authn_id into the space after the struct */
1072 if (serialized.authn_id_len >= 0)
1073 {
1074 Assert(maxsize >= (serialized.authn_id_len + 1));
1077 /* include the NULL terminator to ease deserialization */
1078 serialized.authn_id_len + 1);
1079 }
1080}
1081
1082/*
1083 * Restore MyClientConnectionInfo from its serialized representation.
1084 */
1085void
1087{
1089
1090 memcpy(&serialized, conninfo, sizeof(serialized));
1091
1092 /* Copy the fields back into place */
1095
1096 if (serialized.authn_id_len >= 0)
1097 {
1098 char *authn_id;
1099
1100 authn_id = conninfo + sizeof(serialized);
1102 authn_id);
1103 }
1104}
1105
1106
1107/*-------------------------------------------------------------------------
1108 * Interlock-file support
1109 *
1110 * These routines are used to create both a data-directory lockfile
1111 * ($DATADIR/postmaster.pid) and Unix-socket-file lockfiles ($SOCKFILE.lock).
1112 * Both kinds of files contain the same info initially, although we can add
1113 * more information to a data-directory lockfile after it's created, using
1114 * AddToDataDirLockFile(). See pidfile.h for documentation of the contents
1115 * of these lockfiles.
1116 *
1117 * On successful lockfile creation, a proc_exit callback to remove the
1118 * lockfile is automatically created.
1119 *-------------------------------------------------------------------------
1120 */
1121
1122/*
1123 * proc_exit callback to remove lockfiles.
1124 */
1125static void
1127{
1128 ListCell *l;
1129
1130 foreach(l, lock_files)
1131 {
1132 char *curfile = (char *) lfirst(l);
1133
1134 unlink(curfile);
1135 /* Should we complain if the unlink fails? */
1136 }
1137 /* Since we're about to exit, no need to reclaim storage */
1138
1139 /*
1140 * Lock file removal should always be the last externally visible action
1141 * of a postmaster or standalone backend, while we won't come here at all
1142 * when exiting postmaster child processes. Therefore, this is a good
1143 * place to log completion of shutdown. We could alternatively teach
1144 * proc_exit() to do it, but that seems uglier. In a standalone backend,
1145 * use NOTICE elevel to be less chatty.
1146 */
1148 (errmsg("database system is shut down")));
1149}
1150
1151/*
1152 * Create a lockfile.
1153 *
1154 * filename is the path name of the lockfile to create.
1155 * amPostmaster is used to determine how to encode the output PID.
1156 * socketDir is the Unix socket directory path to include (possibly empty).
1157 * isDDLock and refName are used to determine what error message to produce.
1158 */
1159static void
1161 const char *socketDir,
1162 bool isDDLock, const char *refName)
1163{
1164 int fd;
1165 char buffer[MAXPGPATH * 2 + 256];
1166 int ntries;
1167 int len;
1168 int encoded_pid;
1170 pid_t my_pid,
1171 my_p_pid,
1172 my_gp_pid;
1173 const char *envvar;
1174
1175 /*
1176 * If the PID in the lockfile is our own PID or our parent's or
1177 * grandparent's PID, then the file must be stale (probably left over from
1178 * a previous system boot cycle). We need to check this because of the
1179 * likelihood that a reboot will assign exactly the same PID as we had in
1180 * the previous reboot, or one that's only one or two counts larger and
1181 * hence the lockfile's PID now refers to an ancestor shell process. We
1182 * allow pg_ctl to pass down its parent shell PID (our grandparent PID)
1183 * via the environment variable PG_GRANDPARENT_PID; this is so that
1184 * launching the postmaster via pg_ctl can be just as reliable as
1185 * launching it directly. There is no provision for detecting
1186 * further-removed ancestor processes, but if the init script is written
1187 * carefully then all but the immediate parent shell will be root-owned
1188 * processes and so the kill test will fail with EPERM. Note that we
1189 * cannot get a false negative this way, because an existing postmaster
1190 * would surely never launch a competing postmaster or pg_ctl process
1191 * directly.
1192 */
1193 my_pid = getpid();
1194
1195#ifndef WIN32
1196 my_p_pid = getppid();
1197#else
1198
1199 /*
1200 * Windows hasn't got getppid(), but doesn't need it since it's not using
1201 * real kill() either...
1202 */
1203 my_p_pid = 0;
1204#endif
1205
1206 envvar = getenv("PG_GRANDPARENT_PID");
1207 if (envvar)
1208 my_gp_pid = atoi(envvar);
1209 else
1210 my_gp_pid = 0;
1211
1212 /*
1213 * We need a loop here because of race conditions. But don't loop forever
1214 * (for example, a non-writable $PGDATA directory might cause a failure
1215 * that won't go away). 100 tries seems like plenty.
1216 */
1217 for (ntries = 0;; ntries++)
1218 {
1219 /*
1220 * Try to create the lock file --- O_EXCL makes this atomic.
1221 *
1222 * Think not to make the file protection weaker than 0600/0640. See
1223 * comments below.
1224 */
1226 if (fd >= 0)
1227 break; /* Success; exit the retry loop */
1228
1229 /*
1230 * Couldn't create the pid file. Probably it already exists.
1231 */
1232 if ((errno != EEXIST && errno != EACCES) || ntries > 100)
1233 ereport(FATAL,
1235 errmsg("could not create lock file \"%s\": %m",
1236 filename)));
1237
1238 /*
1239 * Read the file to get the old owner's PID. Note race condition
1240 * here: file might have been deleted since we tried to create it.
1241 */
1243 if (fd < 0)
1244 {
1245 if (errno == ENOENT)
1246 continue; /* race condition; try again */
1247 ereport(FATAL,
1249 errmsg("could not open lock file \"%s\": %m",
1250 filename)));
1251 }
1253 if ((len = read(fd, buffer, sizeof(buffer) - 1)) < 0)
1254 ereport(FATAL,
1256 errmsg("could not read lock file \"%s\": %m",
1257 filename)));
1259 close(fd);
1260
1261 if (len == 0)
1262 {
1263 ereport(FATAL,
1265 errmsg("lock file \"%s\" is empty", filename),
1266 errhint("Either another server is starting, or the lock file is the remnant of a previous server startup crash.")));
1267 }
1268
1269 buffer[len] = '\0';
1270 encoded_pid = atoi(buffer);
1271
1272 /* if pid < 0, the pid is for postgres, not postmaster */
1274
1275 if (other_pid <= 0)
1276 elog(FATAL, "bogus data in lock file \"%s\": \"%s\"",
1277 filename, buffer);
1278
1279 /*
1280 * Check to see if the other process still exists
1281 *
1282 * Per discussion above, my_pid, my_p_pid, and my_gp_pid can be
1283 * ignored as false matches.
1284 *
1285 * Normally kill() will fail with ESRCH if the given PID doesn't
1286 * exist.
1287 *
1288 * We can treat the EPERM-error case as okay because that error
1289 * implies that the existing process has a different userid than we
1290 * do, which means it cannot be a competing postmaster. A postmaster
1291 * cannot successfully attach to a data directory owned by a userid
1292 * other than its own, as enforced in checkDataDir(). Also, since we
1293 * create the lockfiles mode 0600/0640, we'd have failed above if the
1294 * lockfile belonged to another userid --- which means that whatever
1295 * process kill() is reporting about isn't the one that made the
1296 * lockfile. (NOTE: this last consideration is the only one that
1297 * keeps us from blowing away a Unix socket file belonging to an
1298 * instance of Postgres being run by someone else, at least on
1299 * machines where /tmp hasn't got a stickybit.)
1300 */
1301 if (other_pid != my_pid && other_pid != my_p_pid &&
1303 {
1304 if (kill(other_pid, 0) == 0 ||
1305 (errno != ESRCH && errno != EPERM))
1306 {
1307 /* lockfile belongs to a live process */
1308 ereport(FATAL,
1310 errmsg("lock file \"%s\" already exists",
1311 filename),
1312 isDDLock ?
1313 (encoded_pid < 0 ?
1314 errhint("Is another postgres (PID %d) running in data directory \"%s\"?",
1315 (int) other_pid, refName) :
1316 errhint("Is another postmaster (PID %d) running in data directory \"%s\"?",
1317 (int) other_pid, refName)) :
1318 (encoded_pid < 0 ?
1319 errhint("Is another postgres (PID %d) using socket file \"%s\"?",
1320 (int) other_pid, refName) :
1321 errhint("Is another postmaster (PID %d) using socket file \"%s\"?",
1322 (int) other_pid, refName))));
1323 }
1324 }
1325
1326 /*
1327 * No, the creating process did not exist. However, it could be that
1328 * the postmaster crashed (or more likely was kill -9'd by a clueless
1329 * admin) but has left orphan backends behind. Check for this by
1330 * looking to see if there is an associated shmem segment that is
1331 * still in use.
1332 *
1333 * Note: because postmaster.pid is written in multiple steps, we might
1334 * not find the shmem ID values in it; we can't treat that as an
1335 * error.
1336 */
1337 if (isDDLock)
1338 {
1339 char *ptr = buffer;
1340 unsigned long id1,
1341 id2;
1342 int lineno;
1343
1344 for (lineno = 1; lineno < LOCK_FILE_LINE_SHMEM_KEY; lineno++)
1345 {
1346 if ((ptr = strchr(ptr, '\n')) == NULL)
1347 break;
1348 ptr++;
1349 }
1350
1351 if (ptr != NULL &&
1352 sscanf(ptr, "%lu %lu", &id1, &id2) == 2)
1353 {
1355 ereport(FATAL,
1357 errmsg("pre-existing shared memory block (key %lu, ID %lu) is still in use",
1358 id1, id2),
1359 errhint("Terminate any old server processes associated with data directory \"%s\".",
1360 refName)));
1361 }
1362 }
1363
1364 /*
1365 * Looks like nobody's home. Unlink the file and try again to create
1366 * it. Need a loop because of possible race condition against other
1367 * would-be creators.
1368 */
1369 if (unlink(filename) < 0)
1370 ereport(FATAL,
1372 errmsg("could not remove old lock file \"%s\": %m",
1373 filename),
1374 errhint("The file seems accidentally left over, but "
1375 "it could not be removed. Please remove the file "
1376 "by hand and try again.")));
1377 }
1378
1379 /*
1380 * Successfully created the file, now fill it. See comment in pidfile.h
1381 * about the contents. Note that we write the same first five lines into
1382 * both datadir and socket lockfiles; although more stuff may get added to
1383 * the datadir lockfile later.
1384 */
1385 snprintf(buffer, sizeof(buffer), "%d\n%s\n" INT64_FORMAT "\n%d\n%s\n",
1386 amPostmaster ? (int) my_pid : -((int) my_pid),
1387 DataDir,
1390 socketDir);
1391
1392 /*
1393 * In a standalone backend, the next line (LOCK_FILE_LINE_LISTEN_ADDR)
1394 * will never receive data, so fill it in as empty now.
1395 */
1396 if (isDDLock && !amPostmaster)
1397 strlcat(buffer, "\n", sizeof(buffer));
1398
1399 errno = 0;
1401 if (write(fd, buffer, strlen(buffer)) != strlen(buffer))
1402 {
1403 int save_errno = errno;
1404
1405 close(fd);
1407 /* if write didn't set errno, assume problem is no disk space */
1409 ereport(FATAL,
1411 errmsg("could not write lock file \"%s\": %m", filename)));
1412 }
1414
1416 if (pg_fsync(fd) != 0)
1417 {
1418 int save_errno = errno;
1419
1420 close(fd);
1422 errno = save_errno;
1423 ereport(FATAL,
1425 errmsg("could not write lock file \"%s\": %m", filename)));
1426 }
1428 if (close(fd) != 0)
1429 {
1430 int save_errno = errno;
1431
1433 errno = save_errno;
1434 ereport(FATAL,
1436 errmsg("could not write lock file \"%s\": %m", filename)));
1437 }
1438
1439 /*
1440 * Arrange to unlink the lock file(s) at proc_exit. If this is the first
1441 * one, set up the on_proc_exit function to do it; then add this lock file
1442 * to the list of files to unlink.
1443 */
1444 if (lock_files == NIL)
1446
1447 /*
1448 * Use lcons so that the lock files are unlinked in reverse order of
1449 * creation; this is critical!
1450 */
1452}
1453
1454/*
1455 * Create the data directory lockfile.
1456 *
1457 * When this is called, we must have already switched the working
1458 * directory to DataDir, so we can just use a relative path. This
1459 * helps ensure that we are locking the directory we should be.
1460 *
1461 * Note that the socket directory path line is initially written as empty.
1462 * postmaster.c will rewrite it upon creating the first Unix socket.
1463 */
1464void
1469
1470/*
1471 * Create a lockfile for the specified Unix socket file.
1472 */
1473void
1475 const char *socketDir)
1476{
1477 char lockfile[MAXPGPATH];
1478
1479 snprintf(lockfile, sizeof(lockfile), "%s.lock", socketfile);
1481}
1482
1483/*
1484 * TouchSocketLockFiles -- mark socket lock files as recently accessed
1485 *
1486 * This routine should be called every so often to ensure that the socket
1487 * lock files have a recent mod or access date. That saves them
1488 * from being removed by overenthusiastic /tmp-directory-cleaner daemons.
1489 * (Another reason we should never have put the socket file in /tmp...)
1490 */
1491void
1493{
1494 ListCell *l;
1495
1496 foreach(l, lock_files)
1497 {
1498 char *socketLockFile = (char *) lfirst(l);
1499
1500 /* No need to touch the data directory lock file, we trust */
1502 continue;
1503
1504 /* we just ignore any error here */
1506 }
1507}
1508
1509
1510/*
1511 * Add (or replace) a line in the data directory lock file.
1512 * The given string should not include a trailing newline.
1513 *
1514 * Note: because we don't truncate the file, if we were to rewrite a line
1515 * with less data than it had before, there would be garbage after the last
1516 * line. While we could fix that by adding a truncate call, that would make
1517 * the file update non-atomic, which we'd rather avoid. Therefore, callers
1518 * should endeavor never to shorten a line once it's been written.
1519 */
1520void
1522{
1523 int fd;
1524 int len;
1525 int lineno;
1526 char *srcptr;
1527 char *destptr;
1528 char srcbuffer[BLCKSZ];
1529 char destbuffer[BLCKSZ];
1530
1532 if (fd < 0)
1533 {
1534 ereport(LOG,
1536 errmsg("could not open file \"%s\": %m",
1538 return;
1539 }
1541 len = read(fd, srcbuffer, sizeof(srcbuffer) - 1);
1543 if (len < 0)
1544 {
1545 ereport(LOG,
1547 errmsg("could not read from file \"%s\": %m",
1549 close(fd);
1550 return;
1551 }
1552 srcbuffer[len] = '\0';
1553
1554 /*
1555 * Advance over lines we are not supposed to rewrite, then copy them to
1556 * destbuffer.
1557 */
1558 srcptr = srcbuffer;
1559 for (lineno = 1; lineno < target_line; lineno++)
1560 {
1561 char *eol = strchr(srcptr, '\n');
1562
1563 if (eol == NULL)
1564 break; /* not enough lines in file yet */
1565 srcptr = eol + 1;
1566 }
1569
1570 /*
1571 * Fill in any missing lines before the target line, in case lines are
1572 * added to the file out of order.
1573 */
1574 for (; lineno < target_line; lineno++)
1575 {
1576 if (destptr < destbuffer + sizeof(destbuffer))
1577 *destptr++ = '\n';
1578 }
1579
1580 /*
1581 * Write or rewrite the target line.
1582 */
1583 snprintf(destptr, destbuffer + sizeof(destbuffer) - destptr, "%s\n", str);
1585
1586 /*
1587 * If there are more lines in the old file, append them to destbuffer.
1588 */
1589 if ((srcptr = strchr(srcptr, '\n')) != NULL)
1590 {
1591 srcptr++;
1592 snprintf(destptr, destbuffer + sizeof(destbuffer) - destptr, "%s",
1593 srcptr);
1594 }
1595
1596 /*
1597 * And rewrite the data. Since we write in a single kernel call, this
1598 * update should appear atomic to onlookers.
1599 */
1601 errno = 0;
1603 if (pg_pwrite(fd, destbuffer, len, 0) != len)
1604 {
1606 /* if write didn't set errno, assume problem is no disk space */
1607 if (errno == 0)
1608 errno = ENOSPC;
1609 ereport(LOG,
1611 errmsg("could not write to file \"%s\": %m",
1613 close(fd);
1614 return;
1615 }
1618 if (pg_fsync(fd) != 0)
1619 {
1620 ereport(LOG,
1622 errmsg("could not write to file \"%s\": %m",
1624 }
1626 if (close(fd) != 0)
1627 {
1628 ereport(LOG,
1630 errmsg("could not write to file \"%s\": %m",
1632 }
1633}
1634
1635
1636/*
1637 * Recheck that the data directory lock file still exists with expected
1638 * content. Return true if the lock file appears OK, false if it isn't.
1639 *
1640 * We call this periodically in the postmaster. The idea is that if the
1641 * lock file has been removed or replaced by another postmaster, we should
1642 * do a panic database shutdown. Therefore, we should return true if there
1643 * is any doubt: we do not want to cause a panic shutdown unnecessarily.
1644 * Transient failures like EINTR or ENFILE should not cause us to fail.
1645 * (If there really is something wrong, we'll detect it on a future recheck.)
1646 */
1647bool
1649{
1650 int fd;
1651 int len;
1652 long file_pid;
1653 char buffer[BLCKSZ];
1654
1656 if (fd < 0)
1657 {
1658 /*
1659 * There are many foreseeable false-positive error conditions. For
1660 * safety, fail only on enumerated clearly-something-is-wrong
1661 * conditions.
1662 */
1663 switch (errno)
1664 {
1665 case ENOENT:
1666 case ENOTDIR:
1667 /* disaster */
1668 ereport(LOG,
1670 errmsg("could not open file \"%s\": %m",
1672 return false;
1673 default:
1674 /* non-fatal, at least for now */
1675 ereport(LOG,
1677 errmsg("could not open file \"%s\": %m; continuing anyway",
1679 return true;
1680 }
1681 }
1683 len = read(fd, buffer, sizeof(buffer) - 1);
1685 if (len < 0)
1686 {
1687 ereport(LOG,
1689 errmsg("could not read from file \"%s\": %m",
1691 close(fd);
1692 return true; /* treat read failure as nonfatal */
1693 }
1694 buffer[len] = '\0';
1695 close(fd);
1696 file_pid = atol(buffer);
1697 if (file_pid == getpid())
1698 return true; /* all is well */
1699
1700 /* Trouble: someone's overwritten the lock file */
1701 ereport(LOG,
1702 (errmsg("lock file \"%s\" contains wrong PID: %ld instead of %ld",
1703 DIRECTORY_LOCK_FILE, file_pid, (long) getpid())));
1704 return false;
1705}
1706
1707
1708/*-------------------------------------------------------------------------
1709 * Version checking support
1710 *-------------------------------------------------------------------------
1711 */
1712
1713/*
1714 * Determine whether the PG_VERSION file in directory `path' indicates
1715 * a data version compatible with the version of this program.
1716 *
1717 * If compatible, return. Otherwise, ereport(FATAL).
1718 */
1719void
1720ValidatePgVersion(const char *path)
1721{
1722 char full_path[MAXPGPATH];
1723 FILE *file;
1724 int ret;
1725 long file_major;
1726 long my_major;
1727 char *endptr;
1728 char file_version_string[64];
1729 const char *my_version_string = PG_VERSION;
1730
1731 my_major = strtol(my_version_string, &endptr, 10);
1732
1733 snprintf(full_path, sizeof(full_path), "%s/PG_VERSION", path);
1734
1735 file = AllocateFile(full_path, "r");
1736 if (!file)
1737 {
1738 if (errno == ENOENT)
1739 ereport(FATAL,
1741 errmsg("\"%s\" is not a valid data directory",
1742 path),
1743 errdetail("File \"%s\" is missing.", full_path)));
1744 else
1745 ereport(FATAL,
1747 errmsg("could not open file \"%s\": %m", full_path)));
1748 }
1749
1750 file_version_string[0] = '\0';
1751 ret = fscanf(file, "%63s", file_version_string);
1752 file_major = strtol(file_version_string, &endptr, 10);
1753
1754 if (ret != 1 || endptr == file_version_string)
1755 ereport(FATAL,
1757 errmsg("\"%s\" is not a valid data directory",
1758 path),
1759 errdetail("File \"%s\" does not contain valid data.",
1760 full_path),
1761 errhint("You might need to initdb.")));
1762
1763 FreeFile(file);
1764
1765 if (my_major != file_major)
1766 ereport(FATAL,
1768 errmsg("database files are incompatible with server"),
1769 errdetail("The data directory was initialized by PostgreSQL version %s, "
1770 "which is not compatible with this version %s.",
1772}
1773
1774/*-------------------------------------------------------------------------
1775 * Library preload support
1776 *-------------------------------------------------------------------------
1777 */
1778
1779/*
1780 * GUC variables: lists of library names to be preloaded at postmaster
1781 * start and at backend start
1782 */
1786
1787/* Flag telling that we are loading shared_preload_libraries */
1790
1793
1794/*
1795 * load the shared libraries listed in 'libraries'
1796 *
1797 * 'gucname': name of GUC variable, for error reports
1798 * 'restricted': if true, force libraries to be in $libdir/plugins/
1799 */
1800static void
1801load_libraries(const char *libraries, const char *gucname, bool restricted)
1802{
1803 char *rawstring;
1804 List *elemlist;
1805 ListCell *l;
1806
1807 if (libraries == NULL || libraries[0] == '\0')
1808 return; /* nothing to do */
1809
1810 /* Need a modifiable copy of string */
1811 rawstring = pstrdup(libraries);
1812
1813 /* Parse string into list of filename paths */
1815 {
1816 /* syntax error in list */
1819 ereport(LOG,
1821 errmsg("invalid list syntax in parameter \"%s\"",
1822 gucname)));
1823 return;
1824 }
1825
1826 foreach(l, elemlist)
1827 {
1828 /* Note that filename was already canonicalized */
1829 char *filename = (char *) lfirst(l);
1830 char *expanded = NULL;
1831
1832 /* If restricting, insert $libdir/plugins if not mentioned already */
1834 {
1835 expanded = psprintf("$libdir/plugins/%s", filename);
1836 filename = expanded;
1837 }
1840 (errmsg_internal("loaded library \"%s\"", filename)));
1841 if (expanded)
1842 pfree(expanded);
1843 }
1844
1847}
1848
1849/*
1850 * process any libraries that should be preloaded at postmaster start
1851 */
1852void
1862
1863/*
1864 * process any libraries that should be preloaded at backend start
1865 */
1866void
1868{
1870 "session_preload_libraries",
1871 false);
1873 "local_preload_libraries",
1874 true);
1875}
1876
1877/*
1878 * process any shared memory requests from preloaded libraries
1879 */
1880void
1888
1889void
1890pg_bindtextdomain(const char *domain)
1891{
1892#ifdef ENABLE_NLS
1893 if (my_exec_path[0] != '\0')
1894 {
1895 char locale_path[MAXPGPATH];
1896
1898 bindtextdomain(domain, locale_path);
1900 }
1901#endif
1902}
bool InitializingParallelWorker
Definition parallel.c:123
void pqinitmask(void)
Definition pqsignal.c:41
sigset_t BlockSig
Definition pqsignal.c:23
bool is_superuser(void)
Definition common.c:2480
#define CStringGetTextDatum(s)
Definition builtins.h:98
#define NameStr(name)
Definition c.h:835
#define gettext_noop(x)
Definition c.h:1285
#define PG_USED_FOR_ASSERTS_ONLY
Definition c.h:249
#define INT64_FORMAT
Definition c.h:634
#define Assert(condition)
Definition c.h:943
#define PG_BINARY
Definition c.h:1374
int32_t int32
Definition c.h:620
#define OidIsValid(objectId)
Definition c.h:858
size_t Size
Definition c.h:689
uint32 result
memcpy(sums, checksumBaseOffsets, sizeof(checksumBaseOffsets))
static bool restricted
Definition command.c:199
int find_my_exec(const char *argv0, char *retpath)
Definition exec.c:161
void load_file(const char *filename, bool restricted)
Definition dfmgr.c:149
Datum arg
Definition elog.c:1322
int errcode_for_socket_access(void)
Definition elog.c:976
int errcode_for_file_access(void)
Definition elog.c:897
int errcode(int sqlerrcode)
Definition elog.c:874
#define LOG
Definition elog.h:32
int errhint(const char *fmt,...) pg_attribute_printf(1
int errdetail(const char *fmt,...) pg_attribute_printf(1
#define FATAL
Definition elog.h:42
int int errmsg_internal(const char *fmt,...) pg_attribute_printf(1
#define DEBUG1
Definition elog.h:31
#define ERROR
Definition elog.h:40
#define elog(elevel,...)
Definition elog.h:228
#define NOTICE
Definition elog.h:36
#define ereport(elevel,...)
Definition elog.h:152
int FreeFile(FILE *file)
Definition fd.c:2827
int pg_fsync(int fd)
Definition fd.c:390
FILE * AllocateFile(const char *name, const char *mode)
Definition fd.c:2628
int pg_file_create_mode
Definition file_perm.c:19
void SetDataDirectoryCreatePerm(int dataDirMode)
Definition file_perm.c:34
int pg_mode_mask
Definition file_perm.c:25
int pg_dir_create_mode
Definition file_perm.c:18
#define PG_MODE_MASK_GROUP
Definition file_perm.h:29
#define PG_RETURN_NULL()
Definition fmgr.h:346
#define PG_RETURN_DATUM(x)
Definition fmgr.h:354
#define PG_FUNCTION_ARGS
Definition fmgr.h:193
char pkglib_path[MAXPGPATH]
Definition globals.c:84
bool IsUnderPostmaster
Definition globals.c:122
int data_directory_mode
Definition globals.c:79
char * DataDir
Definition globals.c:73
bool IsPostmasterEnvironment
Definition globals.c:121
pg_time_t MyStartTime
Definition globals.c:50
struct Latch * MyLatch
Definition globals.c:65
char * DatabasePath
Definition globals.c:106
char my_exec_path[MAXPGPATH]
Definition globals.c:83
void SetConfigOption(const char *name, const char *value, GucContext context, GucSource source)
Definition guc.c:4234
@ PGC_S_DYNAMIC_DEFAULT
Definition guc.h:114
@ PGC_S_OVERRIDE
Definition guc.h:123
@ PGC_INTERNAL
Definition guc.h:73
@ PGC_BACKEND
Definition guc.h:77
const char * str
UserAuth
Definition hba.h:26
#define HeapTupleIsValid(tuple)
Definition htup.h:78
static void * GETSTRUCT(const HeapTupleData *tuple)
#define close(a)
Definition win32.h:12
#define write(a, b, c)
Definition win32.h:14
#define read(a, b, c)
Definition win32.h:13
void SignalHandlerForCrashExit(SIGNAL_ARGS)
Definition interrupt.c:73
void AcceptInvalidationMessages(void)
Definition inval.c:930
void on_proc_exit(pg_on_exit_callback function, Datum arg)
Definition ipc.c:316
void on_exit_reset(void)
Definition ipc.c:423
void InitializeLatchWaitSet(void)
Definition latch.c:35
void SetLatch(Latch *latch)
Definition latch.c:290
void InitLatch(Latch *latch)
Definition latch.c:63
#define FeBeWaitSetLatchPos
Definition libpq.h:67
List * lcons(void *datum, List *list)
Definition list.c:495
void list_free_deep(List *list)
Definition list.c:1560
char * MemoryContextStrdup(MemoryContext context, const char *string)
Definition mcxt.c:1768
char * pstrdup(const char *in)
Definition mcxt.c:1781
void pfree(void *pointer)
Definition mcxt.c:1616
MemoryContext TopMemoryContext
Definition mcxt.c:166
ProcessingMode
Definition miscadmin.h:487
@ InitProcessing
Definition miscadmin.h:489
#define IsBootstrapProcessingMode()
Definition miscadmin.h:495
#define AmAutoVacuumWorkerProcess()
Definition miscadmin.h:398
#define SECURITY_NOFORCE_RLS
Definition miscadmin.h:332
#define AmBackgroundWorkerProcess()
Definition miscadmin.h:399
#define SECURITY_RESTRICTED_OPERATION
Definition miscadmin.h:331
#define AmLogicalSlotSyncWorkerProcess()
Definition miscadmin.h:401
#define SECURITY_LOCAL_USERID_CHANGE
Definition miscadmin.h:330
#define AmRegularBackendProcess()
Definition miscadmin.h:396
BackendType
Definition miscadmin.h:350
@ B_STANDALONE_BACKEND
Definition miscadmin.h:362
#define AmDataChecksumsWorkerProcess()
Definition miscadmin.h:410
void(* shmem_request_hook_type)(void)
Definition miscadmin.h:552
void ChangeToDataDir(void)
Definition miscinit.c:410
Oid GetOuterUserId(void)
Definition miscinit.c:481
bool process_shared_preload_libraries_done
Definition miscinit.c:1789
void process_shmem_requests(void)
Definition miscinit.c:1881
static List * lock_files
Definition miscinit.c:68
void InitializeSessionUserId(const char *rolename, Oid roleid, bool bypass_login_check)
Definition miscinit.c:711
void InitStandaloneProcess(const char *argv0)
Definition miscinit.c:176
void InitializeSystemUser(const char *authn_id, const char *auth_method)
Definition miscinit.c:876
void InitializeSessionUserIdStandalone(void)
Definition miscinit.c:841
void AddToDataDirLockFile(int target_line, const char *str)
Definition miscinit.c:1521
void InitProcessLocalLatch(void)
Definition miscinit.c:236
void GetUserIdAndSecContext(Oid *userid, int *sec_context)
Definition miscinit.c:613
void SetSessionAuthorization(Oid userid, bool is_superuser)
Definition miscinit.c:922
void process_session_preload_libraries(void)
Definition miscinit.c:1867
static bool SessionUserIsSuperuser
Definition miscinit.c:457
bool process_shmem_requests_in_progress
Definition miscinit.c:1792
const char * GetSystemUser(void)
Definition miscinit.c:536
bool InSecurityRestrictedOperation(void)
Definition miscinit.c:640
#define DIRECTORY_LOCK_FILE
Definition miscinit.c:61
Oid GetUserId(void)
Definition miscinit.c:470
static const char * SystemUser
Definition miscinit.c:454
static Oid OuterUserId
Definition miscinit.c:452
bool GetSessionUserIsSuperuser(void)
Definition miscinit.c:516
const char * GetBackendTypeDesc(BackendType backendType)
Definition miscinit.c:264
static int SecurityRestrictionContext
Definition miscinit.c:459
static void SetOuterUserId(Oid userid, bool is_superuser)
Definition miscinit.c:489
Size EstimateClientConnectionInfoSpace(void)
Definition miscinit.c:1037
Oid GetSessionUserId(void)
Definition miscinit.c:509
void SetCurrentRoleId(Oid roleid, bool is_superuser)
Definition miscinit.c:958
bool IgnoreSystemIndexes
Definition miscinit.c:82
Oid GetAuthenticatedUserId(void)
Definition miscinit.c:546
static Oid SessionUserId
Definition miscinit.c:451
bool InLocalUserIdChange(void)
Definition miscinit.c:631
Datum system_user(PG_FUNCTION_ARGS)
Definition miscinit.c:900
void SetDatabasePath(const char *path)
Definition miscinit.c:284
void InitPostmasterChild(void)
Definition miscinit.c:97
char * shared_preload_libraries_string
Definition miscinit.c:1784
ClientConnectionInfo MyClientConnectionInfo
Definition miscinit.c:1020
void process_shared_preload_libraries(void)
Definition miscinit.c:1853
char * session_preload_libraries_string
Definition miscinit.c:1783
static void SetSessionUserId(Oid userid, bool is_superuser)
Definition miscinit.c:523
shmem_request_hook_type shmem_request_hook
Definition miscinit.c:1791
char * local_preload_libraries_string
Definition miscinit.c:1785
static Latch LocalLatchData
Definition miscinit.c:70
void TouchSocketLockFiles(void)
Definition miscinit.c:1492
void RestoreClientConnectionInfo(char *conninfo)
Definition miscinit.c:1086
static Oid CurrentUserId
Definition miscinit.c:453
static bool SetRoleIsActive
Definition miscinit.c:462
bool InNoForceRLSOperation(void)
Definition miscinit.c:649
static Oid AuthenticatedUserId
Definition miscinit.c:450
static void load_libraries(const char *libraries, const char *gucname, bool restricted)
Definition miscinit.c:1801
ProcessingMode Mode
Definition miscinit.c:63
void SetAuthenticatedUserId(Oid userid)
Definition miscinit.c:553
Oid GetCurrentRoleId(void)
Definition miscinit.c:937
void checkDataDir(void)
Definition miscinit.c:297
static void UnlinkLockFiles(int status, Datum arg)
Definition miscinit.c:1126
void SwitchToSharedLatch(void)
Definition miscinit.c:216
BackendType MyBackendType
Definition miscinit.c:65
void GetUserIdAndContext(Oid *userid, bool *sec_def_context)
Definition miscinit.c:662
void SetDataDir(const char *dir)
Definition miscinit.c:390
void SetUserIdAndContext(Oid userid, bool sec_def_context)
Definition miscinit.c:669
bool process_shared_preload_libraries_in_progress
Definition miscinit.c:1788
void pg_bindtextdomain(const char *domain)
Definition miscinit.c:1890
bool has_rolreplication(Oid roleid)
Definition miscinit.c:689
char * GetUserNameFromId(Oid roleid, bool noerr)
Definition miscinit.c:990
static void CreateLockFile(const char *filename, bool amPostmaster, const char *socketDir, bool isDDLock, const char *refName)
Definition miscinit.c:1160
void SerializeClientConnectionInfo(Size maxsize PG_USED_FOR_ASSERTS_ONLY, char *start_address)
Definition miscinit.c:1053
void ValidatePgVersion(const char *path)
Definition miscinit.c:1720
void SetUserIdAndSecContext(Oid userid, int sec_context)
Definition miscinit.c:620
bool RecheckDataDirLockFile(void)
Definition miscinit.c:1648
void CreateDataDirLockFile(bool amPostmaster)
Definition miscinit.c:1465
void SwitchBackToLocalLatch(void)
Definition miscinit.c:243
void CreateSocketLockFile(const char *socketfile, bool amPostmaster, const char *socketDir)
Definition miscinit.c:1474
static char * errmsg
NameData rolname
Definition pg_authid.h:36
END_CATALOG_STRUCT typedef FormData_pg_authid * Form_pg_authid
Definition pg_authid.h:60
bool rolreplication
Definition pg_authid.h:42
#define MAXPGPATH
const void size_t len
static char * argv0
Definition pg_ctl.c:94
static char * filename
Definition pg_dumpall.c:133
#define lfirst(lc)
Definition pg_list.h:172
#define NIL
Definition pg_list.h:68
#define LOCK_FILE_LINE_SHMEM_KEY
Definition pidfile.h:43
void PostmasterDeathSignalInit(void)
Definition pmsignal.c:406
#define pqsignal
Definition port.h:547
void get_pkglib_path(const char *my_exec_path, char *ret_path)
Definition path.c:956
void get_locale_path(const char *my_exec_path, char *ret_path)
Definition path.c:965
#define pg_pwrite
Definition port.h:248
#define snprintf
Definition port.h:260
char * make_absolute_path(const char *path)
Definition path.c:807
char * first_dir_separator(const char *filename)
Definition path.c:110
size_t strlcat(char *dst, const char *src, size_t siz)
Definition strlcat.c:33
static Datum PointerGetDatum(const void *X)
Definition postgres.h:342
static Datum ObjectIdGetDatum(Oid X)
Definition postgres.h:252
uint64_t Datum
Definition postgres.h:70
#define InvalidOid
unsigned int Oid
void InitProcessGlobals(void)
int PostPortNumber
Definition postmaster.c:204
int postmaster_alive_fds[2]
Definition postmaster.c:486
#define POSTMASTER_FD_WATCH
Definition postmaster.h:83
WaitEventSet * FeBeWaitSet
Definition pqcomm.c:167
static int fd(const char *x, int i)
static int fb(int x)
int CountUserBackends(Oid roleid)
Definition procarray.c:3703
char * psprintf(const char *fmt,...)
Definition psprintf.c:43
Size add_size(Size s1, Size s2)
Definition shmem.c:1048
void pgwin32_signal_initialize(void)
Definition signal.c:79
#define free(a)
PGPROC * MyProc
Definition proc.c:71
const char * authn_id
Definition libpq-be.h:99
Definition latch.h:116
Definition pg_list.h:54
Oid roleId
Definition proc.h:202
Latch procLatch
Definition proc.h:256
bool superuser_arg(Oid roleid)
Definition superuser.c:57
void ReleaseSysCache(HeapTuple tuple)
Definition syscache.c:265
HeapTuple SearchSysCache1(SysCacheIdentifier cacheId, Datum key1)
Definition syscache.c:221
bool PGSharedMemoryIsInUse(unsigned long id1, unsigned long id2)
Definition sysv_shmem.c:318
static char * authn_id
Definition validator.c:41
bool SplitDirectoriesString(char *rawstring, char separator, List **namelist)
Definition varlena.c:2950
static void pgstat_report_wait_start(uint32 wait_event_info)
Definition wait_event.h:67
static void pgstat_report_wait_end(void)
Definition wait_event.h:83
void ModifyWaitEvent(WaitEventSet *set, int pos, uint32 events, Latch *latch)
void InitializeWaitEventSupport(void)
#define WL_LATCH_SET
#define stat
Definition win32_port.h:74
#define SIGQUIT
Definition win32_port.h:159
#define S_ISDIR(m)
Definition win32_port.h:315
#define kill(pid, sig)
Definition win32_port.h:490