PostgreSQL Source Code git master
postinit.c
Go to the documentation of this file.
1/*-------------------------------------------------------------------------
2 *
3 * postinit.c
4 * postgres initialization utilities
5 *
6 * Portions Copyright (c) 1996-2025, PostgreSQL Global Development Group
7 * Portions Copyright (c) 1994, Regents of the University of California
8 *
9 *
10 * IDENTIFICATION
11 * src/backend/utils/init/postinit.c
12 *
13 *
14 *-------------------------------------------------------------------------
15 */
16#include "postgres.h"
17
18#include <ctype.h>
19#include <fcntl.h>
20#include <unistd.h>
21
22#include "access/genam.h"
23#include "access/heapam.h"
24#include "access/htup_details.h"
25#include "access/session.h"
26#include "access/tableam.h"
27#include "access/xact.h"
28#include "access/xlog.h"
29#include "access/xloginsert.h"
30#include "catalog/namespace.h"
31#include "catalog/pg_authid.h"
33#include "catalog/pg_database.h"
36#include "libpq/auth.h"
37#include "libpq/libpq-be.h"
38#include "mb/pg_wchar.h"
39#include "miscadmin.h"
40#include "pgstat.h"
43#include "replication/slot.h"
46#include "storage/aio_subsys.h"
47#include "storage/bufmgr.h"
48#include "storage/fd.h"
49#include "storage/ipc.h"
50#include "storage/lmgr.h"
51#include "storage/proc.h"
52#include "storage/procarray.h"
53#include "storage/procnumber.h"
54#include "storage/procsignal.h"
55#include "storage/sinvaladt.h"
56#include "storage/smgr.h"
57#include "storage/sync.h"
59#include "tcop/tcopprot.h"
60#include "utils/acl.h"
61#include "utils/builtins.h"
62#include "utils/fmgroids.h"
63#include "utils/guc_hooks.h"
65#include "utils/memutils.h"
66#include "utils/pg_locale.h"
67#include "utils/portal.h"
68#include "utils/ps_status.h"
69#include "utils/snapmgr.h"
70#include "utils/syscache.h"
71#include "utils/timeout.h"
72
73static HeapTuple GetDatabaseTuple(const char *dbname);
75static void PerformAuthentication(Port *port);
76static void CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections);
77static void ShutdownPostgres(int code, Datum arg);
78static void StatementTimeoutHandler(void);
79static void LockTimeoutHandler(void);
81static void TransactionTimeoutHandler(void);
82static void IdleSessionTimeoutHandler(void);
83static void IdleStatsUpdateTimeoutHandler(void);
84static void ClientCheckTimeoutHandler(void);
85static bool ThereIsAtLeastOneRole(void);
86static void process_startup_options(Port *port, bool am_superuser);
87static void process_settings(Oid databaseid, Oid roleid);
88
89
90/*** InitPostgres support ***/
91
92
93/*
94 * GetDatabaseTuple -- fetch the pg_database row for a database
95 *
96 * This is used during backend startup when we don't yet have any access to
97 * system catalogs in general. In the worst case, we can seqscan pg_database
98 * using nothing but the hard-wired descriptor that relcache.c creates for
99 * pg_database. In more typical cases, relcache.c was able to load
100 * descriptors for both pg_database and its indexes from the shared relcache
101 * cache file, and so we can do an indexscan. criticalSharedRelcachesBuilt
102 * tells whether we got the cached descriptors.
103 */
104static HeapTuple
106{
107 HeapTuple tuple;
108 Relation relation;
109 SysScanDesc scan;
110 ScanKeyData key[1];
111
112 /*
113 * form a scan key
114 */
115 ScanKeyInit(&key[0],
116 Anum_pg_database_datname,
117 BTEqualStrategyNumber, F_NAMEEQ,
119
120 /*
121 * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
122 * built the critical shared relcache entries (i.e., we're starting up
123 * without a shared relcache cache file).
124 */
125 relation = table_open(DatabaseRelationId, AccessShareLock);
126 scan = systable_beginscan(relation, DatabaseNameIndexId,
128 NULL,
129 1, key);
130
131 tuple = systable_getnext(scan);
132
133 /* Must copy tuple before releasing buffer */
134 if (HeapTupleIsValid(tuple))
135 tuple = heap_copytuple(tuple);
136
137 /* all done */
138 systable_endscan(scan);
139 table_close(relation, AccessShareLock);
140
141 return tuple;
142}
143
144/*
145 * GetDatabaseTupleByOid -- as above, but search by database OID
146 */
147static HeapTuple
149{
150 HeapTuple tuple;
151 Relation relation;
152 SysScanDesc scan;
153 ScanKeyData key[1];
154
155 /*
156 * form a scan key
157 */
158 ScanKeyInit(&key[0],
159 Anum_pg_database_oid,
160 BTEqualStrategyNumber, F_OIDEQ,
161 ObjectIdGetDatum(dboid));
162
163 /*
164 * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
165 * built the critical shared relcache entries (i.e., we're starting up
166 * without a shared relcache cache file).
167 */
168 relation = table_open(DatabaseRelationId, AccessShareLock);
169 scan = systable_beginscan(relation, DatabaseOidIndexId,
171 NULL,
172 1, key);
173
174 tuple = systable_getnext(scan);
175
176 /* Must copy tuple before releasing buffer */
177 if (HeapTupleIsValid(tuple))
178 tuple = heap_copytuple(tuple);
179
180 /* all done */
181 systable_endscan(scan);
182 table_close(relation, AccessShareLock);
183
184 return tuple;
185}
186
187
188/*
189 * PerformAuthentication -- authenticate a remote client
190 *
191 * returns: nothing. Will not return at all if there's any failure.
192 */
193static void
195{
196 /* This should be set already, but let's make sure */
197 ClientAuthInProgress = true; /* limit visibility of log messages */
198
199 /*
200 * In EXEC_BACKEND case, we didn't inherit the contents of pg_hba.conf
201 * etcetera from the postmaster, and have to load them ourselves.
202 *
203 * FIXME: [fork/exec] Ugh. Is there a way around this overhead?
204 */
205#ifdef EXEC_BACKEND
206
207 /*
208 * load_hba() and load_ident() want to work within the PostmasterContext,
209 * so create that if it doesn't exist (which it won't). We'll delete it
210 * again later, in PostgresMain.
211 */
212 if (PostmasterContext == NULL)
214 "Postmaster",
216
217 if (!load_hba())
218 {
219 /*
220 * It makes no sense to continue if we fail to load the HBA file,
221 * since there is no way to connect to the database in this case.
222 */
224 /* translator: %s is a configuration file */
225 (errmsg("could not load %s", HbaFileName)));
226 }
227
228 if (!load_ident())
229 {
230 /*
231 * It is ok to continue if we fail to load the IDENT file, although it
232 * means that you cannot log in using any of the authentication
233 * methods that need a user name mapping. load_ident() already logged
234 * the details of error to the log.
235 */
236 }
237#endif
238
239 /* Capture authentication start time for logging */
241
242 /*
243 * Set up a timeout in case a buggy or malicious client fails to respond
244 * during authentication. Since we're inside a transaction and might do
245 * database access, we have to use the statement_timeout infrastructure.
246 */
248
249 /*
250 * Now perform authentication exchange.
251 */
252 set_ps_display("authentication");
253 ClientAuthentication(port); /* might not return, if failure */
254
255 /*
256 * Done with authentication. Disable the timeout, and log if needed.
257 */
259
260 /* Capture authentication end time for logging */
262
264 {
265 StringInfoData logmsg;
266
267 initStringInfo(&logmsg);
268 if (am_walsender)
269 appendStringInfo(&logmsg, _("replication connection authorized: user=%s"),
270 port->user_name);
271 else
272 appendStringInfo(&logmsg, _("connection authorized: user=%s"),
273 port->user_name);
274 if (!am_walsender)
275 appendStringInfo(&logmsg, _(" database=%s"), port->database_name);
276
277 if (port->application_name != NULL)
278 appendStringInfo(&logmsg, _(" application_name=%s"),
279 port->application_name);
280
281#ifdef USE_SSL
282 if (port->ssl_in_use)
283 appendStringInfo(&logmsg, _(" SSL enabled (protocol=%s, cipher=%s, bits=%d)"),
287#endif
288#ifdef ENABLE_GSS
289 if (port->gss)
290 {
291 const char *princ = be_gssapi_get_princ(port);
292
293 if (princ)
294 appendStringInfo(&logmsg,
295 _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s, principal=%s)"),
296 be_gssapi_get_auth(port) ? _("yes") : _("no"),
297 be_gssapi_get_enc(port) ? _("yes") : _("no"),
298 be_gssapi_get_delegation(port) ? _("yes") : _("no"),
299 princ);
300 else
301 appendStringInfo(&logmsg,
302 _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s)"),
303 be_gssapi_get_auth(port) ? _("yes") : _("no"),
304 be_gssapi_get_enc(port) ? _("yes") : _("no"),
305 be_gssapi_get_delegation(port) ? _("yes") : _("no"));
306 }
307#endif
308
309 ereport(LOG, errmsg_internal("%s", logmsg.data));
310 pfree(logmsg.data);
311 }
312
313 set_ps_display("startup");
314
315 ClientAuthInProgress = false; /* client_min_messages is active now */
316}
317
318
319/*
320 * CheckMyDatabase -- fetch information from the pg_database entry for our DB
321 */
322static void
323CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections)
324{
325 HeapTuple tup;
326 Form_pg_database dbform;
327 Datum datum;
328 bool isnull;
329 char *collate;
330 char *ctype;
331
332 /* Fetch our pg_database row normally, via syscache */
333 tup = SearchSysCache1(DATABASEOID, ObjectIdGetDatum(MyDatabaseId));
334 if (!HeapTupleIsValid(tup))
335 elog(ERROR, "cache lookup failed for database %u", MyDatabaseId);
336 dbform = (Form_pg_database) GETSTRUCT(tup);
337
338 /* This recheck is strictly paranoia */
339 if (strcmp(name, NameStr(dbform->datname)) != 0)
341 (errcode(ERRCODE_UNDEFINED_DATABASE),
342 errmsg("database \"%s\" has disappeared from pg_database",
343 name),
344 errdetail("Database OID %u now seems to belong to \"%s\".",
345 MyDatabaseId, NameStr(dbform->datname))));
346
347 /*
348 * Check permissions to connect to the database.
349 *
350 * These checks are not enforced when in standalone mode, so that there is
351 * a way to recover from disabling all access to all databases, for
352 * example "UPDATE pg_database SET datallowconn = false;".
353 */
355 {
356 /*
357 * Check that the database is currently allowing connections.
358 * (Background processes can override this test and the next one by
359 * setting override_allow_connections.)
360 */
361 if (!dbform->datallowconn && !override_allow_connections)
363 (errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
364 errmsg("database \"%s\" is not currently accepting connections",
365 name)));
366
367 /*
368 * Check privilege to connect to the database. (The am_superuser test
369 * is redundant, but since we have the flag, might as well check it
370 * and save a few cycles.)
371 */
372 if (!am_superuser && !override_allow_connections &&
373 object_aclcheck(DatabaseRelationId, MyDatabaseId, GetUserId(),
376 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
377 errmsg("permission denied for database \"%s\"", name),
378 errdetail("User does not have CONNECT privilege.")));
379
380 /*
381 * Check connection limit for this database. We enforce the limit
382 * only for regular backends, since other process types have their own
383 * PGPROC pools.
384 *
385 * There is a race condition here --- we create our PGPROC before
386 * checking for other PGPROCs. If two backends did this at about the
387 * same time, they might both think they were over the limit, while
388 * ideally one should succeed and one fail. Getting that to work
389 * exactly seems more trouble than it is worth, however; instead we
390 * just document that the connection limit is approximate.
391 */
392 if (dbform->datconnlimit >= 0 &&
394 !am_superuser &&
395 CountDBConnections(MyDatabaseId) > dbform->datconnlimit)
397 (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
398 errmsg("too many connections for database \"%s\"",
399 name)));
400 }
401
402 /*
403 * OK, we're golden. Next to-do item is to save the encoding info out of
404 * the pg_database tuple.
405 */
406 SetDatabaseEncoding(dbform->encoding);
407 /* Record it as a GUC internal option, too */
408 SetConfigOption("server_encoding", GetDatabaseEncodingName(),
410 /* If we have no other source of client_encoding, use server encoding */
411 SetConfigOption("client_encoding", GetDatabaseEncodingName(),
413
414 /* assign locale variables */
415 datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datcollate);
416 collate = TextDatumGetCString(datum);
417 datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datctype);
418 ctype = TextDatumGetCString(datum);
419
420 /*
421 * Historcally, we set LC_COLLATE from datcollate, as well. That's no
422 * longer necessary because all collation behavior is handled through
423 * pg_locale_t.
424 */
425
426 if (pg_perm_setlocale(LC_CTYPE, ctype) == NULL)
428 (errmsg("database locale is incompatible with operating system"),
429 errdetail("The database was initialized with LC_CTYPE \"%s\", "
430 " which is not recognized by setlocale().", ctype),
431 errhint("Recreate the database with another locale or install the missing locale.")));
432
434
435 /*
436 * Check collation version. See similar code in
437 * pg_newlocale_from_collation(). Note that here we warn instead of error
438 * in any case, so that we don't prevent connecting.
439 */
440 datum = SysCacheGetAttr(DATABASEOID, tup, Anum_pg_database_datcollversion,
441 &isnull);
442 if (!isnull)
443 {
444 char *actual_versionstr;
445 char *collversionstr;
446 char *locale;
447
448 collversionstr = TextDatumGetCString(datum);
449
450 if (dbform->datlocprovider == COLLPROVIDER_LIBC)
451 locale = collate;
452 else
453 {
454 datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datlocale);
456 }
457
458 actual_versionstr = get_collation_actual_version(dbform->datlocprovider, locale);
459 if (!actual_versionstr)
460 /* should not happen */
462 "database \"%s\" has no actual collation version, but a version was recorded",
463 name);
464 else if (strcmp(actual_versionstr, collversionstr) != 0)
466 (errmsg("database \"%s\" has a collation version mismatch",
467 name),
468 errdetail("The database was created using collation version %s, "
469 "but the operating system provides version %s.",
470 collversionstr, actual_versionstr),
471 errhint("Rebuild all objects in this database that use the default collation and run "
472 "ALTER DATABASE %s REFRESH COLLATION VERSION, "
473 "or build PostgreSQL with the right library version.",
475 }
476
477 ReleaseSysCache(tup);
478}
479
480
481/*
482 * pg_split_opts -- split a string of options and append it to an argv array
483 *
484 * The caller is responsible for ensuring the argv array is large enough. The
485 * maximum possible number of arguments added by this routine is
486 * (strlen(optstr) + 1) / 2.
487 *
488 * Because some option values can contain spaces we allow escaping using
489 * backslashes, with \\ representing a literal backslash.
490 */
491void
492pg_split_opts(char **argv, int *argcp, const char *optstr)
493{
495
496 initStringInfo(&s);
497
498 while (*optstr)
499 {
500 bool last_was_escape = false;
501
502 resetStringInfo(&s);
503
504 /* skip over leading space */
505 while (isspace((unsigned char) *optstr))
506 optstr++;
507
508 if (*optstr == '\0')
509 break;
510
511 /*
512 * Parse a single option, stopping at the first space, unless it's
513 * escaped.
514 */
515 while (*optstr)
516 {
517 if (isspace((unsigned char) *optstr) && !last_was_escape)
518 break;
519
520 if (!last_was_escape && *optstr == '\\')
521 last_was_escape = true;
522 else
523 {
524 last_was_escape = false;
525 appendStringInfoChar(&s, *optstr);
526 }
527
528 optstr++;
529 }
530
531 /* now store the option in the next argv[] position */
532 argv[(*argcp)++] = pstrdup(s.data);
533 }
534
535 pfree(s.data);
536}
537
538/*
539 * Initialize MaxBackends value from config options.
540 *
541 * This must be called after modules have had the chance to alter GUCs in
542 * shared_preload_libraries and before shared memory size is determined.
543 *
544 * Note that in EXEC_BACKEND environment, the value is passed down from
545 * postmaster to subprocesses via BackendParameters in SubPostmasterMain; only
546 * postmaster itself and processes not under postmaster control should call
547 * this.
548 */
549void
551{
552 Assert(MaxBackends == 0);
553
554 /* Note that this does not include "auxiliary" processes */
557
560 (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
561 errmsg("too many server processes configured"),
562 errdetail("\"max_connections\" (%d) plus \"autovacuum_worker_slots\" (%d) plus \"max_worker_processes\" (%d) plus \"max_wal_senders\" (%d) must be less than %d.",
566}
567
568/*
569 * Initialize the number of fast-path lock slots in PGPROC.
570 *
571 * This must be called after modules have had the chance to alter GUCs in
572 * shared_preload_libraries and before shared memory size is determined.
573 */
574void
576{
577 /* Should be initialized only once. */
579
580 /*
581 * Based on the max_locks_per_transaction GUC, as that's a good indicator
582 * of the expected number of locks, figure out the value for
583 * FastPathLockGroupsPerBackend. This must be a power-of-two. We cap the
584 * value at FP_LOCK_GROUPS_PER_BACKEND_MAX and insist the value is at
585 * least 1.
586 *
587 * The default max_locks_per_transaction = 64 means 4 groups by default.
588 */
592
593 /* Validate we did get a power-of-two */
596}
597
598/*
599 * Early initialization of a backend (either standalone or under postmaster).
600 * This happens even before InitPostgres.
601 *
602 * This is separate from InitPostgres because it is also called by auxiliary
603 * processes, such as the background writer process, which may not call
604 * InitPostgres at all.
605 */
606void
608{
609 Assert(MyProc != NULL);
610
611 /*
612 * Initialize our input/output/debugging file descriptors.
613 */
615
616 /*
617 * Initialize file access. Done early so other subsystems can access
618 * files.
619 */
621
622 /*
623 * Initialize statistics reporting. This needs to happen early to ensure
624 * that pgstat's shutdown callback runs after the shutdown callbacks of
625 * all subsystems that can produce stats (like e.g. transaction commits
626 * can).
627 */
629
630 /*
631 * Initialize AIO before infrastructure that might need to actually
632 * execute AIO.
633 */
635
636 /* Do local initialization of storage and buffer managers */
637 InitSync();
638 smgrinit();
640
641 /*
642 * Initialize temporary file access after pgstat, so that the temporary
643 * file shutdown hook can report temporary file statistics.
644 */
646
647 /*
648 * Initialize local buffers for WAL record construction, in case we ever
649 * try to insert XLOG.
650 */
652
653 /* Initialize lock manager's local structs */
655
656 /*
657 * Initialize replication slots after pgstat. The exit hook might need to
658 * drop ephemeral slots, which in turn triggers stats reporting.
659 */
661}
662
663
664/* --------------------------------
665 * InitPostgres
666 * Initialize POSTGRES.
667 *
668 * Parameters:
669 * in_dbname, dboid: specify database to connect to, as described below
670 * username, useroid: specify role to connect as, as described below
671 * flags:
672 * - INIT_PG_LOAD_SESSION_LIBS to honor [session|local]_preload_libraries.
673 * - INIT_PG_OVERRIDE_ALLOW_CONNS to connect despite !datallowconn.
674 * - INIT_PG_OVERRIDE_ROLE_LOGIN to connect despite !rolcanlogin.
675 * out_dbname: optional output parameter, see below; pass NULL if not used
676 *
677 * The database can be specified by name, using the in_dbname parameter, or by
678 * OID, using the dboid parameter. Specify NULL or InvalidOid respectively
679 * for the unused parameter. If dboid is provided, the actual database
680 * name can be returned to the caller in out_dbname. If out_dbname isn't
681 * NULL, it must point to a buffer of size NAMEDATALEN.
682 *
683 * Similarly, the role can be passed by name, using the username parameter,
684 * or by OID using the useroid parameter.
685 *
686 * In bootstrap mode the database and username parameters are NULL/InvalidOid.
687 * The autovacuum launcher process doesn't specify these parameters either,
688 * because it only goes far enough to be able to read pg_database; it doesn't
689 * connect to any particular database. An autovacuum worker specifies a
690 * database but not a username; conversely, a physical walsender specifies
691 * username but not database.
692 *
693 * By convention, INIT_PG_LOAD_SESSION_LIBS should be passed in "flags" in
694 * "interactive" sessions (including standalone backends), but not in
695 * background processes such as autovacuum. Note in particular that it
696 * shouldn't be true in parallel worker processes; those have another
697 * mechanism for replicating their leader's set of loaded libraries.
698 *
699 * We expect that InitProcess() was already called, so we already have a
700 * PGPROC struct ... but it's not completely filled in yet.
701 *
702 * Note:
703 * Be very careful with the order of calls in the InitPostgres function.
704 * --------------------------------
705 */
706void
707InitPostgres(const char *in_dbname, Oid dboid,
708 const char *username, Oid useroid,
709 bits32 flags,
710 char *out_dbname)
711{
712 bool bootstrap = IsBootstrapProcessingMode();
713 bool am_superuser;
714 char *fullpath;
715 char dbname[NAMEDATALEN];
716 int nfree = 0;
717
718 elog(DEBUG3, "InitPostgres");
719
720 /*
721 * Add my PGPROC struct to the ProcArray.
722 *
723 * Once I have done this, I am visible to other backends!
724 */
726
727 /* Initialize status reporting */
729
730 /*
731 * And initialize an entry in the PgBackendStatus array. That way, if
732 * LWLocks or third-party authentication should happen to hang, it is
733 * possible to retrieve some information about what is going on.
734 */
735 if (!bootstrap)
736 {
738 INJECTION_POINT("init-pre-auth", NULL);
739 }
740
741 /*
742 * Initialize my entry in the shared-invalidation manager's array of
743 * per-backend data.
744 */
746
748
749 /*
750 * Also set up timeout handlers needed for backend operation. We need
751 * these in every case except bootstrap.
752 */
753 if (!bootstrap)
754 {
765 }
766
767 /*
768 * If this is either a bootstrap process or a standalone backend, start up
769 * the XLOG machinery, and register to have it closed down at exit. In
770 * other cases, the startup process is responsible for starting up the
771 * XLOG machinery, and the checkpointer for closing it down.
772 */
774 {
775 /*
776 * We don't yet have an aux-process resource owner, but StartupXLOG
777 * and ShutdownXLOG will need one. Hence, create said resource owner
778 * (and register a callback to clean it up after ShutdownXLOG runs).
779 */
781
782 StartupXLOG();
783 /* Release (and warn about) any buffer pins leaked in StartupXLOG */
785 /* Reset CurrentResourceOwner to nothing for the moment */
787
788 /*
789 * Use before_shmem_exit() so that ShutdownXLOG() can rely on DSM
790 * segments etc to work (which in turn is required for pgstats).
791 */
794 }
795
796 /*
797 * Initialize the relation cache and the system catalog caches. Note that
798 * no catalog access happens here; we only set up the hashtable structure.
799 * We must do this before starting a transaction because transaction abort
800 * would try to touch these hashtables.
801 */
805
806 /* Initialize portal manager */
808
809 /*
810 * Load relcache entries for the shared system catalogs. This must create
811 * at least entries for pg_database and catalogs used for authentication.
812 */
814
815 /*
816 * Set up process-exit callback to do pre-shutdown cleanup. This is the
817 * one of the first before_shmem_exit callbacks we register; thus, this
818 * will be one the last things we do before low-level modules like the
819 * buffer manager begin to close down. We need to have this in place
820 * before we begin our first transaction --- if we fail during the
821 * initialization transaction, as is entirely possible, we need the
822 * AbortTransaction call to clean up.
823 */
825
826 /* The autovacuum launcher is done here */
828 {
829 /* fill in the remainder of this entry in the PgBackendStatus array */
831
832 return;
833 }
834
835 /*
836 * Start a new transaction here before first access to db.
837 */
838 if (!bootstrap)
839 {
840 /* statement_timestamp must be set for timeouts to work correctly */
843
844 /*
845 * transaction_isolation will have been set to the default by the
846 * above. If the default is "serializable", and we are in hot
847 * standby, we will fail if we don't change it to something lower.
848 * Fortunately, "read committed" is plenty good enough.
849 */
851 }
852
853 /*
854 * Perform client authentication if necessary, then figure out our
855 * postgres user ID, and see if we are a superuser.
856 *
857 * In standalone mode, autovacuum worker processes and slot sync worker
858 * process, we use a fixed ID, otherwise we figure it out from the
859 * authenticated user name.
860 */
862 {
864 am_superuser = true;
865 }
866 else if (!IsUnderPostmaster)
867 {
869 am_superuser = true;
872 (errcode(ERRCODE_UNDEFINED_OBJECT),
873 errmsg("no roles are defined in this database system"),
874 errhint("You should immediately run CREATE USER \"%s\" SUPERUSER;.",
875 username != NULL ? username : "postgres")));
876 }
877 else if (AmBackgroundWorkerProcess())
878 {
879 if (username == NULL && !OidIsValid(useroid))
880 {
882 am_superuser = true;
883 }
884 else
885 {
887 (flags & INIT_PG_OVERRIDE_ROLE_LOGIN) != 0);
888 am_superuser = superuser();
889 }
890 }
891 else
892 {
893 /* normal multiuser case */
894 Assert(MyProcPort != NULL);
896 InitializeSessionUserId(username, useroid, false);
897 /* ensure that auth_method is actually valid, aka authn_id is not NULL */
901 am_superuser = superuser();
902 }
903
904 /* Report any SSL/GSS details for the session. */
905 if (MyProcPort != NULL)
906 {
907 Assert(!bootstrap);
908
910 }
911
912 /*
913 * Binary upgrades only allowed super-user connections
914 */
915 if (IsBinaryUpgrade && !am_superuser)
916 {
918 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
919 errmsg("must be superuser to connect in binary upgrade mode")));
920 }
921
922 /*
923 * The last few regular connection slots are reserved for superusers and
924 * roles with privileges of pg_use_reserved_connections. We do not apply
925 * these limits to background processes, since they all have their own
926 * pools of PGPROC slots.
927 *
928 * Note: At this point, the new backend has already claimed a proc struct,
929 * so we must check whether the number of free slots is strictly less than
930 * the reserved connection limits.
931 */
932 if (AmRegularBackendProcess() && !am_superuser &&
935 {
938 (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
939 errmsg("remaining connection slots are reserved for roles with the %s attribute",
940 "SUPERUSER")));
941
942 if (!has_privs_of_role(GetUserId(), ROLE_PG_USE_RESERVED_CONNECTIONS))
944 (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
945 errmsg("remaining connection slots are reserved for roles with privileges of the \"%s\" role",
946 "pg_use_reserved_connections")));
947 }
948
949 /* Check replication permissions needed for walsender processes. */
950 if (am_walsender)
951 {
952 Assert(!bootstrap);
953
956 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
957 errmsg("permission denied to start WAL sender"),
958 errdetail("Only roles with the %s attribute may start a WAL sender process.",
959 "REPLICATION")));
960 }
961
962 /*
963 * If this is a plain walsender only supporting physical replication, we
964 * don't want to connect to any particular database. Just finish the
965 * backend startup by processing any options from the startup packet, and
966 * we're done.
967 */
969 {
970 /* process any options passed in the startup packet */
971 if (MyProcPort != NULL)
972 process_startup_options(MyProcPort, am_superuser);
973
974 /* Apply PostAuthDelay as soon as we've read all options */
975 if (PostAuthDelay > 0)
976 pg_usleep(PostAuthDelay * 1000000L);
977
978 /* initialize client encoding */
980
981 /* fill in the remainder of this entry in the PgBackendStatus array */
983
984 /* close the transaction we started above */
986
987 return;
988 }
989
990 /*
991 * Set up the global variables holding database id and default tablespace.
992 * But note we won't actually try to touch the database just yet.
993 *
994 * We take a shortcut in the bootstrap case, otherwise we have to look up
995 * the db's entry in pg_database.
996 */
997 if (bootstrap)
998 {
999 dboid = Template1DbOid;
1000 MyDatabaseTableSpace = DEFAULTTABLESPACE_OID;
1001 }
1002 else if (in_dbname != NULL)
1003 {
1004 HeapTuple tuple;
1005 Form_pg_database dbform;
1006
1007 tuple = GetDatabaseTuple(in_dbname);
1008 if (!HeapTupleIsValid(tuple))
1009 ereport(FATAL,
1010 (errcode(ERRCODE_UNDEFINED_DATABASE),
1011 errmsg("database \"%s\" does not exist", in_dbname)));
1012 dbform = (Form_pg_database) GETSTRUCT(tuple);
1013 dboid = dbform->oid;
1014 }
1015 else if (!OidIsValid(dboid))
1016 {
1017 /*
1018 * If this is a background worker not bound to any particular
1019 * database, we're done now. Everything that follows only makes sense
1020 * if we are bound to a specific database. We do need to close the
1021 * transaction we started before returning.
1022 */
1023 if (!bootstrap)
1024 {
1027 }
1028 return;
1029 }
1030
1031 /*
1032 * Now, take a writer's lock on the database we are trying to connect to.
1033 * If there is a concurrently running DROP DATABASE on that database, this
1034 * will block us until it finishes (and has committed its update of
1035 * pg_database).
1036 *
1037 * Note that the lock is not held long, only until the end of this startup
1038 * transaction. This is OK since we will advertise our use of the
1039 * database in the ProcArray before dropping the lock (in fact, that's the
1040 * next thing to do). Anyone trying a DROP DATABASE after this point will
1041 * see us in the array once they have the lock. Ordering is important for
1042 * this because we don't want to advertise ourselves as being in this
1043 * database until we have the lock; otherwise we create what amounts to a
1044 * deadlock with CountOtherDBBackends().
1045 *
1046 * Note: use of RowExclusiveLock here is reasonable because we envision
1047 * our session as being a concurrent writer of the database. If we had a
1048 * way of declaring a session as being guaranteed-read-only, we could use
1049 * AccessShareLock for such sessions and thereby not conflict against
1050 * CREATE DATABASE.
1051 */
1052 if (!bootstrap)
1053 LockSharedObject(DatabaseRelationId, dboid, 0, RowExclusiveLock);
1054
1055 /*
1056 * Recheck pg_database to make sure the target database hasn't gone away.
1057 * If there was a concurrent DROP DATABASE, this ensures we will die
1058 * cleanly without creating a mess.
1059 */
1060 if (!bootstrap)
1061 {
1062 HeapTuple tuple;
1063 Form_pg_database datform;
1064
1065 tuple = GetDatabaseTupleByOid(dboid);
1066 if (HeapTupleIsValid(tuple))
1067 datform = (Form_pg_database) GETSTRUCT(tuple);
1068
1069 if (!HeapTupleIsValid(tuple) ||
1070 (in_dbname && namestrcmp(&datform->datname, in_dbname)))
1071 {
1072 if (in_dbname)
1073 ereport(FATAL,
1074 (errcode(ERRCODE_UNDEFINED_DATABASE),
1075 errmsg("database \"%s\" does not exist", in_dbname),
1076 errdetail("It seems to have just been dropped or renamed.")));
1077 else
1078 ereport(FATAL,
1079 (errcode(ERRCODE_UNDEFINED_DATABASE),
1080 errmsg("database %u does not exist", dboid)));
1081 }
1082
1083 strlcpy(dbname, NameStr(datform->datname), sizeof(dbname));
1084
1085 if (database_is_invalid_form(datform))
1086 {
1087 ereport(FATAL,
1088 errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
1089 errmsg("cannot connect to invalid database \"%s\"", dbname),
1090 errhint("Use DROP DATABASE to drop invalid databases."));
1091 }
1092
1093 MyDatabaseTableSpace = datform->dattablespace;
1094 MyDatabaseHasLoginEventTriggers = datform->dathasloginevt;
1095 /* pass the database name back to the caller */
1096 if (out_dbname)
1097 strcpy(out_dbname, dbname);
1098 }
1099
1100 /*
1101 * Now that we rechecked, we are certain to be connected to a database and
1102 * thus can set MyDatabaseId.
1103 *
1104 * It is important that MyDatabaseId only be set once we are sure that the
1105 * target database can no longer be concurrently dropped or renamed. For
1106 * example, without this guarantee, pgstat_update_dbstats() could create
1107 * entries for databases that were just dropped in the pgstat shutdown
1108 * callback, which could confuse other code paths like the autovacuum
1109 * scheduler.
1110 */
1111 MyDatabaseId = dboid;
1112
1113 /*
1114 * Now we can mark our PGPROC entry with the database ID.
1115 *
1116 * We assume this is an atomic store so no lock is needed; though actually
1117 * things would work fine even if it weren't atomic. Anyone searching the
1118 * ProcArray for this database's ID should hold the database lock, so they
1119 * would not be executing concurrently with this store. A process looking
1120 * for another database's ID could in theory see a chance match if it read
1121 * a partially-updated databaseId value; but as long as all such searches
1122 * wait and retry, as in CountOtherDBBackends(), they will certainly see
1123 * the correct value on their next try.
1124 */
1126
1127 /*
1128 * We established a catalog snapshot while reading pg_authid and/or
1129 * pg_database; but until we have set up MyDatabaseId, we won't react to
1130 * incoming sinval messages for unshared catalogs, so we won't realize it
1131 * if the snapshot has been invalidated. Assume it's no good anymore.
1132 */
1134
1135 /*
1136 * Now we should be able to access the database directory safely. Verify
1137 * it's there and looks reasonable.
1138 */
1140
1141 if (!bootstrap)
1142 {
1143 if (access(fullpath, F_OK) == -1)
1144 {
1145 if (errno == ENOENT)
1146 ereport(FATAL,
1147 (errcode(ERRCODE_UNDEFINED_DATABASE),
1148 errmsg("database \"%s\" does not exist",
1149 dbname),
1150 errdetail("The database subdirectory \"%s\" is missing.",
1151 fullpath)));
1152 else
1153 ereport(FATAL,
1155 errmsg("could not access directory \"%s\": %m",
1156 fullpath)));
1157 }
1158
1159 ValidatePgVersion(fullpath);
1160 }
1161
1162 SetDatabasePath(fullpath);
1163 pfree(fullpath);
1164
1165 /*
1166 * It's now possible to do real access to the system catalogs.
1167 *
1168 * Load relcache entries for the system catalogs. This must create at
1169 * least the minimum set of "nailed-in" cache entries.
1170 */
1172
1173 /* set up ACL framework (so CheckMyDatabase can check permissions) */
1175
1176 /*
1177 * Re-read the pg_database row for our database, check permissions and set
1178 * up database-specific GUC settings. We can't do this until all the
1179 * database-access infrastructure is up. (Also, it wants to know if the
1180 * user is a superuser, so the above stuff has to happen first.)
1181 */
1182 if (!bootstrap)
1183 CheckMyDatabase(dbname, am_superuser,
1184 (flags & INIT_PG_OVERRIDE_ALLOW_CONNS) != 0);
1185
1186 /*
1187 * Now process any command-line switches and any additional GUC variable
1188 * settings passed in the startup packet. We couldn't do this before
1189 * because we didn't know if client is a superuser.
1190 */
1191 if (MyProcPort != NULL)
1192 process_startup_options(MyProcPort, am_superuser);
1193
1194 /* Process pg_db_role_setting options */
1196
1197 /* Apply PostAuthDelay as soon as we've read all options */
1198 if (PostAuthDelay > 0)
1199 pg_usleep(PostAuthDelay * 1000000L);
1200
1201 /*
1202 * Initialize various default states that can't be set up until we've
1203 * selected the active user and gotten the right GUC settings.
1204 */
1205
1206 /* set default namespace search path */
1208
1209 /* initialize client encoding */
1211
1212 /* Initialize this backend's session state. */
1214
1215 /*
1216 * If this is an interactive session, load any libraries that should be
1217 * preloaded at backend start. Since those are determined by GUCs, this
1218 * can't happen until GUC settings are complete, but we want it to happen
1219 * during the initial transaction in case anything that requires database
1220 * access needs to be done.
1221 */
1222 if ((flags & INIT_PG_LOAD_SESSION_LIBS) != 0)
1224
1225 /* fill in the remainder of this entry in the PgBackendStatus array */
1226 if (!bootstrap)
1228
1229 /* close the transaction we started above */
1230 if (!bootstrap)
1232}
1233
1234/*
1235 * Process any command-line switches and any additional GUC variable
1236 * settings passed in the startup packet.
1237 */
1238static void
1240{
1241 GucContext gucctx;
1242 ListCell *gucopts;
1243
1244 gucctx = am_superuser ? PGC_SU_BACKEND : PGC_BACKEND;
1245
1246 /*
1247 * First process any command-line switches that were included in the
1248 * startup packet, if we are in a regular backend.
1249 */
1250 if (port->cmdline_options != NULL)
1251 {
1252 /*
1253 * The maximum possible number of commandline arguments that could
1254 * come from port->cmdline_options is (strlen + 1) / 2; see
1255 * pg_split_opts().
1256 */
1257 char **av;
1258 int maxac;
1259 int ac;
1260
1261 maxac = 2 + (strlen(port->cmdline_options) + 1) / 2;
1262
1263 av = (char **) palloc(maxac * sizeof(char *));
1264 ac = 0;
1265
1266 av[ac++] = "postgres";
1267
1268 pg_split_opts(av, &ac, port->cmdline_options);
1269
1270 av[ac] = NULL;
1271
1272 Assert(ac < maxac);
1273
1274 (void) process_postgres_switches(ac, av, gucctx, NULL);
1275 }
1276
1277 /*
1278 * Process any additional GUC variable settings passed in startup packet.
1279 * These are handled exactly like command-line variables.
1280 */
1281 gucopts = list_head(port->guc_options);
1282 while (gucopts)
1283 {
1284 char *name;
1285 char *value;
1286
1287 name = lfirst(gucopts);
1288 gucopts = lnext(port->guc_options, gucopts);
1289
1290 value = lfirst(gucopts);
1291 gucopts = lnext(port->guc_options, gucopts);
1292
1294 }
1295}
1296
1297/*
1298 * Load GUC settings from pg_db_role_setting.
1299 *
1300 * We try specific settings for the database/role combination, as well as
1301 * general for this database and for this user.
1302 */
1303static void
1304process_settings(Oid databaseid, Oid roleid)
1305{
1306 Relation relsetting;
1307 Snapshot snapshot;
1308
1309 if (!IsUnderPostmaster)
1310 return;
1311
1312 relsetting = table_open(DbRoleSettingRelationId, AccessShareLock);
1313
1314 /* read all the settings under the same snapshot for efficiency */
1315 snapshot = RegisterSnapshot(GetCatalogSnapshot(DbRoleSettingRelationId));
1316
1317 /* Later settings are ignored if set earlier. */
1318 ApplySetting(snapshot, databaseid, roleid, relsetting, PGC_S_DATABASE_USER);
1319 ApplySetting(snapshot, InvalidOid, roleid, relsetting, PGC_S_USER);
1320 ApplySetting(snapshot, databaseid, InvalidOid, relsetting, PGC_S_DATABASE);
1321 ApplySetting(snapshot, InvalidOid, InvalidOid, relsetting, PGC_S_GLOBAL);
1322
1323 UnregisterSnapshot(snapshot);
1324 table_close(relsetting, AccessShareLock);
1325}
1326
1327/*
1328 * Backend-shutdown callback. Do cleanup that we want to be sure happens
1329 * before all the supporting modules begin to nail their doors shut via
1330 * their own callbacks.
1331 *
1332 * User-level cleanup, such as temp-relation removal and UNLISTEN, happens
1333 * via separate callbacks that execute before this one. We don't combine the
1334 * callbacks because we still want this one to happen if the user-level
1335 * cleanup fails.
1336 */
1337static void
1339{
1340 /* Make sure we've killed any active transaction */
1342
1343 /*
1344 * User locks are not released by transaction end, so be sure to release
1345 * them explicitly.
1346 */
1348}
1349
1350
1351/*
1352 * STATEMENT_TIMEOUT handler: trigger a query-cancel interrupt.
1353 */
1354static void
1356{
1357 int sig = SIGINT;
1358
1359 /*
1360 * During authentication the timeout is used to deal with
1361 * authentication_timeout - we want to quit in response to such timeouts.
1362 */
1364 sig = SIGTERM;
1365
1366#ifdef HAVE_SETSID
1367 /* try to signal whole process group */
1368 kill(-MyProcPid, sig);
1369#endif
1370 kill(MyProcPid, sig);
1371}
1372
1373/*
1374 * LOCK_TIMEOUT handler: trigger a query-cancel interrupt.
1375 */
1376static void
1378{
1379#ifdef HAVE_SETSID
1380 /* try to signal whole process group */
1381 kill(-MyProcPid, SIGINT);
1382#endif
1383 kill(MyProcPid, SIGINT);
1384}
1385
1386static void
1388{
1390 InterruptPending = true;
1392}
1393
1394static void
1396{
1398 InterruptPending = true;
1400}
1401
1402static void
1404{
1406 InterruptPending = true;
1408}
1409
1410static void
1412{
1414 InterruptPending = true;
1416}
1417
1418static void
1420{
1422 InterruptPending = true;
1424}
1425
1426/*
1427 * Returns true if at least one role is defined in this database cluster.
1428 */
1429static bool
1431{
1432 Relation pg_authid_rel;
1433 TableScanDesc scan;
1434 bool result;
1435
1436 pg_authid_rel = table_open(AuthIdRelationId, AccessShareLock);
1437
1438 scan = table_beginscan_catalog(pg_authid_rel, 0, NULL);
1439 result = (heap_getnext(scan, ForwardScanDirection) != NULL);
1440
1441 table_endscan(scan);
1442 table_close(pg_authid_rel, AccessShareLock);
1443
1444 return result;
1445}
void initialize_acl(void)
Definition: acl.c:5040
bool has_privs_of_role(Oid member, Oid role)
Definition: acl.c:5284
@ ACLCHECK_OK
Definition: acl.h:183
AclResult object_aclcheck(Oid classid, Oid objectid, Oid roleid, AclMode mode)
Definition: aclchk.c:3834
void pgaio_init_backend(void)
Definition: aio_init.c:218
void ClientAuthentication(Port *port)
Definition: auth.c:379
int autovacuum_worker_slots
Definition: autovacuum.c:118
TimestampTz GetCurrentTimestamp(void)
Definition: timestamp.c:1645
uint32 log_connections
ConnectionTiming conn_timing
@ LOG_CONNECTION_AUTHORIZATION
void pgstat_bestart_security(void)
void pgstat_bestart_initial(void)
void pgstat_beinit(void)
void pgstat_bestart_final(void)
bool be_gssapi_get_auth(Port *port)
bool be_gssapi_get_enc(Port *port)
const char * be_gssapi_get_princ(Port *port)
bool be_gssapi_get_delegation(Port *port)
const char * be_tls_get_version(Port *port)
int be_tls_get_cipher_bits(Port *port)
const char * be_tls_get_cipher(Port *port)
void InitBufferManagerAccess(void)
Definition: bufmgr.c:4007
#define TextDatumGetCString(d)
Definition: builtins.h:98
#define NameStr(name)
Definition: c.h:754
#define Min(x, y)
Definition: c.h:1006
#define Max(x, y)
Definition: c.h:1000
uint32 bits32
Definition: c.h:550
#define OidIsValid(objectId)
Definition: c.h:777
bool database_is_invalid_form(Form_pg_database datform)
Definition: dbcommands.c:3214
int errmsg_internal(const char *fmt,...)
Definition: elog.c:1170
void DebugFileOpen(void)
Definition: elog.c:2128
int errcode_for_file_access(void)
Definition: elog.c:886
int errdetail(const char *fmt,...)
Definition: elog.c:1216
int errhint(const char *fmt,...)
Definition: elog.c:1330
int errcode(int sqlerrcode)
Definition: elog.c:863
int errmsg(const char *fmt,...)
Definition: elog.c:1080
#define _(x)
Definition: elog.c:91
#define LOG
Definition: elog.h:31
#define DEBUG3
Definition: elog.h:28
#define FATAL
Definition: elog.h:41
#define WARNING
Definition: elog.h:36
#define ERROR
Definition: elog.h:39
#define elog(elevel,...)
Definition: elog.h:226
#define ereport(elevel,...)
Definition: elog.h:150
void InitFileAccess(void)
Definition: fd.c:900
void InitTemporaryFileAccess(void)
Definition: fd.c:930
void systable_endscan(SysScanDesc sysscan)
Definition: genam.c:603
HeapTuple systable_getnext(SysScanDesc sysscan)
Definition: genam.c:514
SysScanDesc systable_beginscan(Relation heapRelation, Oid indexId, bool indexOK, Snapshot snapshot, int nkeys, ScanKey key)
Definition: genam.c:388
volatile sig_atomic_t IdleStatsUpdateTimeoutPending
Definition: globals.c:42
bool MyDatabaseHasLoginEventTriggers
Definition: globals.c:98
volatile sig_atomic_t InterruptPending
Definition: globals.c:32
int MyCancelKeyLength
Definition: globals.c:53
volatile sig_atomic_t IdleSessionTimeoutPending
Definition: globals.c:39
bool IsBinaryUpgrade
Definition: globals.c:121
volatile sig_atomic_t IdleInTransactionSessionTimeoutPending
Definition: globals.c:37
volatile sig_atomic_t TransactionTimeoutPending
Definition: globals.c:38
int MyProcPid
Definition: globals.c:47
bool IsUnderPostmaster
Definition: globals.c:120
int MaxConnections
Definition: globals.c:143
Oid MyDatabaseTableSpace
Definition: globals.c:96
int MaxBackends
Definition: globals.c:146
uint8 MyCancelKey[MAX_CANCEL_KEY_LENGTH]
Definition: globals.c:52
struct Port * MyProcPort
Definition: globals.c:51
struct Latch * MyLatch
Definition: globals.c:63
volatile sig_atomic_t CheckClientConnectionPending
Definition: globals.c:35
int max_worker_processes
Definition: globals.c:144
Oid MyDatabaseId
Definition: globals.c:94
void SetConfigOption(const char *name, const char *value, GucContext context, GucSource source)
Definition: guc.c:4196
@ PGC_S_DYNAMIC_DEFAULT
Definition: guc.h:114
@ PGC_S_GLOBAL
Definition: guc.h:118
@ PGC_S_DATABASE
Definition: guc.h:119
@ PGC_S_CLIENT
Definition: guc.h:122
@ PGC_S_DATABASE_USER
Definition: guc.h:121
@ PGC_S_USER
Definition: guc.h:120
GucContext
Definition: guc.h:72
@ PGC_INTERNAL
Definition: guc.h:73
@ PGC_SU_BACKEND
Definition: guc.h:76
@ PGC_BACKEND
Definition: guc.h:77
char * HbaFileName
Definition: guc_tables.c:557
Assert(PointerIsAligned(start, uint64))
bool load_ident(void)
Definition: hba.c:3036
bool load_hba(void)
Definition: hba.c:2642
const char * hba_authname(UserAuth auth_method)
Definition: hba.c:3138
HeapTuple heap_getnext(TableScanDesc sscan, ScanDirection direction)
Definition: heapam.c:1361
HeapTuple heap_copytuple(HeapTuple tuple)
Definition: heaptuple.c:778
#define HeapTupleIsValid(tuple)
Definition: htup.h:78
static void * GETSTRUCT(const HeapTupleData *tuple)
Definition: htup_details.h:728
static struct @171 value
static char * username
Definition: initdb.c:153
static char * locale
Definition: initdb.c:140
#define INJECTION_POINT(name, arg)
void before_shmem_exit(pg_on_exit_callback function, Datum arg)
Definition: ipc.c:337
void SetLatch(Latch *latch)
Definition: latch.c:290
void LockSharedObject(Oid classid, Oid objid, uint16 objsubid, LOCKMODE lockmode)
Definition: lmgr.c:1088
void InitLockManagerAccess(void)
Definition: lock.c:505
void LockReleaseAll(LOCKMETHODID lockmethodid, bool allLocks)
Definition: lock.c:2307
int max_locks_per_xact
Definition: lock.c:53
int FastPathLockGroupsPerBackend
Definition: lock.c:202
#define USER_LOCKMETHOD
Definition: lock.h:128
#define AccessShareLock
Definition: lockdefs.h:36
#define RowExclusiveLock
Definition: lockdefs.h:38
void InitializeClientEncoding(void)
Definition: mbutils.c:282
const char * GetDatabaseEncodingName(void)
Definition: mbutils.c:1268
void SetDatabaseEncoding(int encoding)
Definition: mbutils.c:1162
char * pstrdup(const char *in)
Definition: mcxt.c:1759
void pfree(void *pointer)
Definition: mcxt.c:1594
MemoryContext TopMemoryContext
Definition: mcxt.c:166
void * palloc(Size size)
Definition: mcxt.c:1365
MemoryContext PostmasterContext
Definition: mcxt.c:168
#define AllocSetContextCreate
Definition: memutils.h:129
#define ALLOCSET_DEFAULT_SIZES
Definition: memutils.h:160
#define IsBootstrapProcessingMode()
Definition: miscadmin.h:477
#define INIT_PG_LOAD_SESSION_LIBS
Definition: miscadmin.h:499
#define AmAutoVacuumWorkerProcess()
Definition: miscadmin.h:383
#define AmBackgroundWorkerProcess()
Definition: miscadmin.h:384
#define AmLogicalSlotSyncWorkerProcess()
Definition: miscadmin.h:386
#define AmAutoVacuumLauncherProcess()
Definition: miscadmin.h:382
#define AmRegularBackendProcess()
Definition: miscadmin.h:381
#define INIT_PG_OVERRIDE_ROLE_LOGIN
Definition: miscadmin.h:501
#define INIT_PG_OVERRIDE_ALLOW_CONNS
Definition: miscadmin.h:500
void InitializeSessionUserId(const char *rolename, Oid roleid, bool bypass_login_check)
Definition: miscinit.c:710
void InitializeSystemUser(const char *authn_id, const char *auth_method)
Definition: miscinit.c:874
void InitializeSessionUserIdStandalone(void)
Definition: miscinit.c:840
void process_session_preload_libraries(void)
Definition: miscinit.c:1865
Oid GetUserId(void)
Definition: miscinit.c:469
Oid GetSessionUserId(void)
Definition: miscinit.c:508
void SetDatabasePath(const char *path)
Definition: miscinit.c:283
ClientConnectionInfo MyClientConnectionInfo
Definition: miscinit.c:1018
bool has_rolreplication(Oid roleid)
Definition: miscinit.c:688
void ValidatePgVersion(const char *path)
Definition: miscinit.c:1718
int namestrcmp(Name name, const char *str)
Definition: name.c:247
void InitializeSearchPath(void)
Definition: namespace.c:4806
#define ACL_CONNECT
Definition: parsenodes.h:87
void * arg
static uint32 pg_nextpower2_32(uint32 num)
Definition: pg_bitutils.h:189
#define NAMEDATALEN
static int sig
Definition: pg_ctl.c:81
FormData_pg_database * Form_pg_database
Definition: pg_database.h:96
void ApplySetting(Snapshot snapshot, Oid databaseid, Oid roleid, Relation relsetting, GucSource source)
#define lfirst(lc)
Definition: pg_list.h:172
static ListCell * list_head(const List *l)
Definition: pg_list.h:128
static ListCell * lnext(const List *l, const ListCell *c)
Definition: pg_list.h:343
char * get_collation_actual_version(char collprovider, const char *collcollate)
Definition: pg_locale.c:1244
char * pg_perm_setlocale(int category, const char *locale)
Definition: pg_locale.c:169
void init_database_collation(void)
Definition: pg_locale.c:1128
static int port
Definition: pg_regress.c:115
void pgstat_initialize(void)
Definition: pgstat.c:641
void pgstat_before_server_shutdown(int code, Datum arg)
Definition: pgstat.c:562
void InitPlanCache(void)
Definition: plancache.c:146
size_t strlcpy(char *dst, const char *src, size_t siz)
Definition: strlcpy.c:45
void EnablePortalManager(void)
Definition: portalmem.c:104
void process_postgres_switches(int argc, char *argv[], GucContext ctx, const char **dbname)
Definition: postgres.c:3799
int PostAuthDelay
Definition: postgres.c:100
static Datum ObjectIdGetDatum(Oid X)
Definition: postgres.h:262
uint64_t Datum
Definition: postgres.h:70
static Datum CStringGetDatum(const char *X)
Definition: postgres.h:360
#define InvalidOid
Definition: postgres_ext.h:37
unsigned int Oid
Definition: postgres_ext.h:32
static void ShutdownPostgres(int code, Datum arg)
Definition: postinit.c:1338
static void IdleInTransactionSessionTimeoutHandler(void)
Definition: postinit.c:1395
static void LockTimeoutHandler(void)
Definition: postinit.c:1377
void InitializeMaxBackends(void)
Definition: postinit.c:550
void pg_split_opts(char **argv, int *argcp, const char *optstr)
Definition: postinit.c:492
static void IdleStatsUpdateTimeoutHandler(void)
Definition: postinit.c:1411
static void process_settings(Oid databaseid, Oid roleid)
Definition: postinit.c:1304
void BaseInit(void)
Definition: postinit.c:607
static void IdleSessionTimeoutHandler(void)
Definition: postinit.c:1403
static void process_startup_options(Port *port, bool am_superuser)
Definition: postinit.c:1239
static void StatementTimeoutHandler(void)
Definition: postinit.c:1355
static void CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections)
Definition: postinit.c:323
static bool ThereIsAtLeastOneRole(void)
Definition: postinit.c:1430
static void PerformAuthentication(Port *port)
Definition: postinit.c:194
void InitializeFastPathLocks(void)
Definition: postinit.c:575
static void ClientCheckTimeoutHandler(void)
Definition: postinit.c:1419
static HeapTuple GetDatabaseTuple(const char *dbname)
Definition: postinit.c:105
void InitPostgres(const char *in_dbname, Oid dboid, const char *username, Oid useroid, bits32 flags, char *out_dbname)
Definition: postinit.c:707
static HeapTuple GetDatabaseTupleByOid(Oid dboid)
Definition: postinit.c:148
static void TransactionTimeoutHandler(void)
Definition: postinit.c:1387
int ReservedConnections
Definition: postmaster.c:230
bool ClientAuthInProgress
Definition: postmaster.c:372
int AuthenticationTimeout
Definition: postmaster.c:241
int SuperuserReservedConnections
Definition: postmaster.c:229
short access
Definition: preproc-type.c:36
#define FP_LOCK_GROUPS_PER_BACKEND_MAX
Definition: proc.h:91
#define FP_LOCK_SLOTS_PER_GROUP
Definition: proc.h:92
#define NUM_SPECIAL_WORKER_PROCS
Definition: proc.h:450
int CountDBConnections(Oid databaseid)
Definition: procarray.c:3590
#define MAX_BACKENDS
Definition: procnumber.h:39
void ProcSignalInit(const uint8 *cancel_key, int cancel_key_len)
Definition: procsignal.c:166
static void set_ps_display(const char *activity)
Definition: ps_status.h:40
bool criticalSharedRelcachesBuilt
Definition: relcache.c:146
void RelationCacheInitializePhase3(void)
Definition: relcache.c:4107
void RelationCacheInitialize(void)
Definition: relcache.c:4002
void RelationCacheInitializePhase2(void)
Definition: relcache.c:4048
char * GetDatabasePath(Oid dbOid, Oid spcOid)
Definition: relpath.c:110
void ReleaseAuxProcessResources(bool isCommit)
Definition: resowner.c:1016
ResourceOwner CurrentResourceOwner
Definition: resowner.c:173
void CreateAuxProcessResourceOwner(void)
Definition: resowner.c:996
const char * quote_identifier(const char *ident)
Definition: ruleutils.c:13062
void ScanKeyInit(ScanKey entry, AttrNumber attributeNumber, StrategyNumber strategy, RegProcedure procedure, Datum argument)
Definition: scankey.c:76
@ ForwardScanDirection
Definition: sdir.h:28
struct @10::@11 av[32]
void InitializeSession(void)
Definition: session.c:54
void pg_usleep(long microsec)
Definition: signal.c:53
void SharedInvalBackendInit(bool sendOnly)
Definition: sinvaladt.c:272
void ReplicationSlotInitialize(void)
Definition: slot.c:241
void smgrinit(void)
Definition: smgr.c:188
Snapshot GetCatalogSnapshot(Oid relid)
Definition: snapmgr.c:385
void UnregisterSnapshot(Snapshot snapshot)
Definition: snapmgr.c:866
Snapshot RegisterSnapshot(Snapshot snapshot)
Definition: snapmgr.c:824
void InvalidateCatalogSnapshot(void)
Definition: snapmgr.c:455
PGPROC * MyProc
Definition: proc.c:67
bool HaveNFreeProcs(int n, int *nfree)
Definition: proc.c:787
void CheckDeadLockAlert(void)
Definition: proc.c:1883
void InitProcessPhase2(void)
Definition: proc.c:585
#define BTEqualStrategyNumber
Definition: stratnum.h:31
char * dbname
Definition: streamutil.c:49
void resetStringInfo(StringInfo str)
Definition: stringinfo.c:126
void appendStringInfo(StringInfo str, const char *fmt,...)
Definition: stringinfo.c:145
void appendStringInfoChar(StringInfo str, char ch)
Definition: stringinfo.c:242
void initStringInfo(StringInfo str)
Definition: stringinfo.c:97
const char * authn_id
Definition: libpq-be.h:99
UserAuth auth_method
Definition: libpq-be.h:105
TimestampTz auth_start
TimestampTz auth_end
Oid databaseId
Definition: proc.h:224
Definition: libpq-be.h:129
bool superuser(void)
Definition: superuser.c:46
void InitSync(void)
Definition: sync.c:124
void InitCatalogCache(void)
Definition: syscache.c:110
void ReleaseSysCache(HeapTuple tuple)
Definition: syscache.c:264
HeapTuple SearchSysCache1(int cacheId, Datum key1)
Definition: syscache.c:220
Datum SysCacheGetAttr(int cacheId, HeapTuple tup, AttrNumber attributeNumber, bool *isNull)
Definition: syscache.c:595
Datum SysCacheGetAttrNotNull(int cacheId, HeapTuple tup, AttrNumber attributeNumber)
Definition: syscache.c:625
void table_close(Relation relation, LOCKMODE lockmode)
Definition: table.c:126
Relation table_open(Oid relationId, LOCKMODE lockmode)
Definition: table.c:40
TableScanDesc table_beginscan_catalog(Relation relation, int nkeys, ScanKeyData *key)
Definition: tableam.c:113
static void table_endscan(TableScanDesc scan)
Definition: tableam.h:985
void enable_timeout_after(TimeoutId id, int delay_ms)
Definition: timeout.c:560
void disable_timeout(TimeoutId id, bool keep_indicator)
Definition: timeout.c:685
TimeoutId RegisterTimeout(TimeoutId id, timeout_handler_proc handler)
Definition: timeout.c:505
@ IDLE_SESSION_TIMEOUT
Definition: timeout.h:35
@ IDLE_IN_TRANSACTION_SESSION_TIMEOUT
Definition: timeout.h:33
@ LOCK_TIMEOUT
Definition: timeout.h:28
@ STATEMENT_TIMEOUT
Definition: timeout.h:29
@ DEADLOCK_TIMEOUT
Definition: timeout.h:27
@ TRANSACTION_TIMEOUT
Definition: timeout.h:34
@ IDLE_STATS_UPDATE_TIMEOUT
Definition: timeout.h:36
@ CLIENT_CONNECTION_CHECK_TIMEOUT
Definition: timeout.h:37
const char * name
bool am_walsender
Definition: walsender.c:123
bool am_db_walsender
Definition: walsender.c:126
int max_wal_senders
Definition: walsender.c:129
#define kill(pid, sig)
Definition: win32_port.h:493
void StartTransactionCommand(void)
Definition: xact.c:3077
int XactIsoLevel
Definition: xact.c:80
void SetCurrentStatementStartTimestamp(void)
Definition: xact.c:915
void CommitTransactionCommand(void)
Definition: xact.c:3175
void AbortOutOfAnyTransaction(void)
Definition: xact.c:4880
#define XACT_READ_COMMITTED
Definition: xact.h:37
void StartupXLOG(void)
Definition: xlog.c:5483
void ShutdownXLOG(int code, Datum arg)
Definition: xlog.c:6674
void InitXLogInsert(void)
Definition: xloginsert.c:1370