Line data Source code
1 : /*-------------------------------------------------------------------------
2 : *
3 : * postinit.c
4 : * postgres initialization utilities
5 : *
6 : * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
7 : * Portions Copyright (c) 1994, Regents of the University of California
8 : *
9 : *
10 : * IDENTIFICATION
11 : * src/backend/utils/init/postinit.c
12 : *
13 : *
14 : *-------------------------------------------------------------------------
15 : */
16 : #include "postgres.h"
17 :
18 : #include <ctype.h>
19 : #include <fcntl.h>
20 : #include <unistd.h>
21 :
22 : #include "access/genam.h"
23 : #include "access/heapam.h"
24 : #include "access/htup_details.h"
25 : #include "access/session.h"
26 : #include "access/tableam.h"
27 : #include "access/xact.h"
28 : #include "access/xlog.h"
29 : #include "access/xloginsert.h"
30 : #include "catalog/namespace.h"
31 : #include "catalog/pg_authid.h"
32 : #include "catalog/pg_collation.h"
33 : #include "catalog/pg_database.h"
34 : #include "catalog/pg_db_role_setting.h"
35 : #include "catalog/pg_tablespace.h"
36 : #include "libpq/auth.h"
37 : #include "libpq/libpq-be.h"
38 : #include "mb/pg_wchar.h"
39 : #include "miscadmin.h"
40 : #include "pgstat.h"
41 : #include "port/pg_bitutils.h"
42 : #include "postmaster/autovacuum.h"
43 : #include "postmaster/postmaster.h"
44 : #include "replication/slot.h"
45 : #include "replication/slotsync.h"
46 : #include "replication/walsender.h"
47 : #include "storage/aio_subsys.h"
48 : #include "storage/bufmgr.h"
49 : #include "storage/fd.h"
50 : #include "storage/ipc.h"
51 : #include "storage/lmgr.h"
52 : #include "storage/proc.h"
53 : #include "storage/procarray.h"
54 : #include "storage/procnumber.h"
55 : #include "storage/procsignal.h"
56 : #include "storage/sinvaladt.h"
57 : #include "storage/smgr.h"
58 : #include "storage/sync.h"
59 : #include "tcop/backend_startup.h"
60 : #include "tcop/tcopprot.h"
61 : #include "utils/acl.h"
62 : #include "utils/builtins.h"
63 : #include "utils/fmgroids.h"
64 : #include "utils/guc_hooks.h"
65 : #include "utils/injection_point.h"
66 : #include "utils/memutils.h"
67 : #include "utils/pg_locale.h"
68 : #include "utils/portal.h"
69 : #include "utils/ps_status.h"
70 : #include "utils/snapmgr.h"
71 : #include "utils/syscache.h"
72 : #include "utils/timeout.h"
73 :
74 : /* has this backend called EmitConnectionWarnings()? */
75 : static bool ConnectionWarningsEmitted;
76 :
77 : /* content of warnings to send via EmitConnectionWarnings() */
78 : static List *ConnectionWarningMessages;
79 : static List *ConnectionWarningDetails;
80 :
81 : static HeapTuple GetDatabaseTuple(const char *dbname);
82 : static HeapTuple GetDatabaseTupleByOid(Oid dboid);
83 : static void PerformAuthentication(Port *port);
84 : static void CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections);
85 : static void ShutdownPostgres(int code, Datum arg);
86 : static void StatementTimeoutHandler(void);
87 : static void LockTimeoutHandler(void);
88 : static void IdleInTransactionSessionTimeoutHandler(void);
89 : static void TransactionTimeoutHandler(void);
90 : static void IdleSessionTimeoutHandler(void);
91 : static void IdleStatsUpdateTimeoutHandler(void);
92 : static void ClientCheckTimeoutHandler(void);
93 : static bool ThereIsAtLeastOneRole(void);
94 : static void process_startup_options(Port *port, bool am_superuser);
95 : static void process_settings(Oid databaseid, Oid roleid);
96 : static void EmitConnectionWarnings(void);
97 :
98 :
99 : /*** InitPostgres support ***/
100 :
101 :
102 : /*
103 : * GetDatabaseTuple -- fetch the pg_database row for a database
104 : *
105 : * This is used during backend startup when we don't yet have any access to
106 : * system catalogs in general. In the worst case, we can seqscan pg_database
107 : * using nothing but the hard-wired descriptor that relcache.c creates for
108 : * pg_database. In more typical cases, relcache.c was able to load
109 : * descriptors for both pg_database and its indexes from the shared relcache
110 : * cache file, and so we can do an indexscan. criticalSharedRelcachesBuilt
111 : * tells whether we got the cached descriptors.
112 : */
113 : static HeapTuple
114 14121 : GetDatabaseTuple(const char *dbname)
115 : {
116 : HeapTuple tuple;
117 : Relation relation;
118 : SysScanDesc scan;
119 : ScanKeyData key[1];
120 :
121 : /*
122 : * form a scan key
123 : */
124 14121 : ScanKeyInit(&key[0],
125 : Anum_pg_database_datname,
126 : BTEqualStrategyNumber, F_NAMEEQ,
127 : CStringGetDatum(dbname));
128 :
129 : /*
130 : * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
131 : * built the critical shared relcache entries (i.e., we're starting up
132 : * without a shared relcache cache file).
133 : */
134 14121 : relation = table_open(DatabaseRelationId, AccessShareLock);
135 14121 : scan = systable_beginscan(relation, DatabaseNameIndexId,
136 : criticalSharedRelcachesBuilt,
137 : NULL,
138 : 1, key);
139 :
140 14121 : tuple = systable_getnext(scan);
141 :
142 : /* Must copy tuple before releasing buffer */
143 14121 : if (HeapTupleIsValid(tuple))
144 14111 : tuple = heap_copytuple(tuple);
145 :
146 : /* all done */
147 14121 : systable_endscan(scan);
148 14121 : table_close(relation, AccessShareLock);
149 :
150 14121 : return tuple;
151 : }
152 :
153 : /*
154 : * GetDatabaseTupleByOid -- as above, but search by database OID
155 : */
156 : static HeapTuple
157 18210 : GetDatabaseTupleByOid(Oid dboid)
158 : {
159 : HeapTuple tuple;
160 : Relation relation;
161 : SysScanDesc scan;
162 : ScanKeyData key[1];
163 :
164 : /*
165 : * form a scan key
166 : */
167 18210 : ScanKeyInit(&key[0],
168 : Anum_pg_database_oid,
169 : BTEqualStrategyNumber, F_OIDEQ,
170 : ObjectIdGetDatum(dboid));
171 :
172 : /*
173 : * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
174 : * built the critical shared relcache entries (i.e., we're starting up
175 : * without a shared relcache cache file).
176 : */
177 18210 : relation = table_open(DatabaseRelationId, AccessShareLock);
178 18210 : scan = systable_beginscan(relation, DatabaseOidIndexId,
179 : criticalSharedRelcachesBuilt,
180 : NULL,
181 : 1, key);
182 :
183 18210 : tuple = systable_getnext(scan);
184 :
185 : /* Must copy tuple before releasing buffer */
186 18210 : if (HeapTupleIsValid(tuple))
187 18210 : tuple = heap_copytuple(tuple);
188 :
189 : /* all done */
190 18210 : systable_endscan(scan);
191 18210 : table_close(relation, AccessShareLock);
192 :
193 18210 : return tuple;
194 : }
195 :
196 :
197 : /*
198 : * PerformAuthentication -- authenticate a remote client
199 : *
200 : * returns: nothing. Will not return at all if there's any failure.
201 : */
202 : static void
203 14611 : PerformAuthentication(Port *port)
204 : {
205 : /* This should be set already, but let's make sure */
206 14611 : ClientAuthInProgress = true; /* limit visibility of log messages */
207 :
208 : /*
209 : * In EXEC_BACKEND case, we didn't inherit the contents of pg_hba.conf
210 : * etcetera from the postmaster, and have to load them ourselves.
211 : *
212 : * FIXME: [fork/exec] Ugh. Is there a way around this overhead?
213 : */
214 : #ifdef EXEC_BACKEND
215 :
216 : /*
217 : * load_hba() and load_ident() want to work within the PostmasterContext,
218 : * so create that if it doesn't exist (which it won't). We'll delete it
219 : * again later, in PostgresMain.
220 : */
221 : if (PostmasterContext == NULL)
222 : PostmasterContext = AllocSetContextCreate(TopMemoryContext,
223 : "Postmaster",
224 : ALLOCSET_DEFAULT_SIZES);
225 :
226 : if (!load_hba())
227 : {
228 : /*
229 : * It makes no sense to continue if we fail to load the HBA file,
230 : * since there is no way to connect to the database in this case.
231 : */
232 : ereport(FATAL,
233 : /* translator: %s is a configuration file */
234 : (errmsg("could not load %s", HbaFileName)));
235 : }
236 :
237 : if (!load_ident())
238 : {
239 : /*
240 : * It is ok to continue if we fail to load the IDENT file, although it
241 : * means that you cannot log in using any of the authentication
242 : * methods that need a user name mapping. load_ident() already logged
243 : * the details of error to the log.
244 : */
245 : }
246 : #endif
247 :
248 : /* Capture authentication start time for logging */
249 14611 : conn_timing.auth_start = GetCurrentTimestamp();
250 :
251 : /*
252 : * Set up a timeout in case a buggy or malicious client fails to respond
253 : * during authentication. Since we're inside a transaction and might do
254 : * database access, we have to use the statement_timeout infrastructure.
255 : */
256 14611 : enable_timeout_after(STATEMENT_TIMEOUT, AuthenticationTimeout * 1000);
257 :
258 : /*
259 : * Now perform authentication exchange.
260 : */
261 14611 : set_ps_display("authentication");
262 14611 : ClientAuthentication(port); /* might not return, if failure */
263 :
264 : /*
265 : * Done with authentication. Disable the timeout, and log if needed.
266 : */
267 14537 : disable_timeout(STATEMENT_TIMEOUT, false);
268 :
269 : /* Capture authentication end time for logging */
270 14537 : conn_timing.auth_end = GetCurrentTimestamp();
271 :
272 14537 : if (log_connections & LOG_CONNECTION_AUTHORIZATION)
273 : {
274 : StringInfoData logmsg;
275 :
276 242 : initStringInfo(&logmsg);
277 242 : if (am_walsender)
278 0 : appendStringInfo(&logmsg, _("replication connection authorized: user=%s"),
279 : port->user_name);
280 : else
281 242 : appendStringInfo(&logmsg, _("connection authorized: user=%s"),
282 : port->user_name);
283 242 : if (!am_walsender)
284 242 : appendStringInfo(&logmsg, _(" database=%s"), port->database_name);
285 :
286 242 : if (port->application_name != NULL)
287 242 : appendStringInfo(&logmsg, _(" application_name=%s"),
288 : port->application_name);
289 :
290 : #ifdef USE_SSL
291 242 : if (port->ssl_in_use)
292 111 : appendStringInfo(&logmsg, _(" SSL enabled (protocol=%s, cipher=%s, bits=%d)"),
293 : be_tls_get_version(port),
294 : be_tls_get_cipher(port),
295 : be_tls_get_cipher_bits(port));
296 : #endif
297 : #ifdef ENABLE_GSS
298 : if (port->gss)
299 : {
300 : const char *princ = be_gssapi_get_princ(port);
301 :
302 : if (princ)
303 : appendStringInfo(&logmsg,
304 : _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s, principal=%s)"),
305 : be_gssapi_get_auth(port) ? _("yes") : _("no"),
306 : be_gssapi_get_enc(port) ? _("yes") : _("no"),
307 : be_gssapi_get_delegation(port) ? _("yes") : _("no"),
308 : princ);
309 : else
310 : appendStringInfo(&logmsg,
311 : _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s)"),
312 : be_gssapi_get_auth(port) ? _("yes") : _("no"),
313 : be_gssapi_get_enc(port) ? _("yes") : _("no"),
314 : be_gssapi_get_delegation(port) ? _("yes") : _("no"));
315 : }
316 : #endif
317 :
318 242 : ereport(LOG, errmsg_internal("%s", logmsg.data));
319 242 : pfree(logmsg.data);
320 : }
321 :
322 14537 : set_ps_display("startup");
323 :
324 14537 : ClientAuthInProgress = false; /* client_min_messages is active now */
325 14537 : }
326 :
327 :
328 : /*
329 : * CheckMyDatabase -- fetch information from the pg_database entry for our DB
330 : */
331 : static void
332 18203 : CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections)
333 : {
334 : HeapTuple tup;
335 : Form_pg_database dbform;
336 : Datum datum;
337 : bool isnull;
338 : char *collate;
339 : char *ctype;
340 :
341 : /* Fetch our pg_database row normally, via syscache */
342 18203 : tup = SearchSysCache1(DATABASEOID, ObjectIdGetDatum(MyDatabaseId));
343 18203 : if (!HeapTupleIsValid(tup))
344 0 : elog(ERROR, "cache lookup failed for database %u", MyDatabaseId);
345 18203 : dbform = (Form_pg_database) GETSTRUCT(tup);
346 :
347 : /* This recheck is strictly paranoia */
348 18203 : if (strcmp(name, NameStr(dbform->datname)) != 0)
349 0 : ereport(FATAL,
350 : (errcode(ERRCODE_UNDEFINED_DATABASE),
351 : errmsg("database \"%s\" has disappeared from pg_database",
352 : name),
353 : errdetail("Database OID %u now seems to belong to \"%s\".",
354 : MyDatabaseId, NameStr(dbform->datname))));
355 :
356 : /*
357 : * Check permissions to connect to the database.
358 : *
359 : * These checks are not enforced when in standalone mode, so that there is
360 : * a way to recover from disabling all access to all databases, for
361 : * example "UPDATE pg_database SET datallowconn = false;".
362 : */
363 18203 : if (IsUnderPostmaster)
364 : {
365 : /*
366 : * Check that the database is currently allowing connections.
367 : * (Background processes can override this test and the next one by
368 : * setting override_allow_connections.)
369 : */
370 18127 : if (!dbform->datallowconn && !override_allow_connections)
371 1 : ereport(FATAL,
372 : (errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
373 : errmsg("database \"%s\" is not currently accepting connections",
374 : name)));
375 :
376 : /*
377 : * Check privilege to connect to the database. (The am_superuser test
378 : * is redundant, but since we have the flag, might as well check it
379 : * and save a few cycles.)
380 : */
381 18441 : if (!am_superuser && !override_allow_connections &&
382 315 : object_aclcheck(DatabaseRelationId, MyDatabaseId, GetUserId(),
383 : ACL_CONNECT) != ACLCHECK_OK)
384 0 : ereport(FATAL,
385 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
386 : errmsg("permission denied for database \"%s\"", name),
387 : errdetail("User does not have CONNECT privilege.")));
388 :
389 : /*
390 : * Check connection limit for this database. We enforce the limit
391 : * only for regular backends, since other process types have their own
392 : * PGPROC pools.
393 : *
394 : * There is a race condition here --- we create our PGPROC before
395 : * checking for other PGPROCs. If two backends did this at about the
396 : * same time, they might both think they were over the limit, while
397 : * ideally one should succeed and one fail. Getting that to work
398 : * exactly seems more trouble than it is worth, however; instead we
399 : * just document that the connection limit is approximate.
400 : */
401 18126 : if (dbform->datconnlimit >= 0 &&
402 0 : AmRegularBackendProcess() &&
403 0 : !am_superuser &&
404 0 : CountDBConnections(MyDatabaseId) > dbform->datconnlimit)
405 0 : ereport(FATAL,
406 : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
407 : errmsg("too many connections for database \"%s\"",
408 : name)));
409 : }
410 :
411 : /*
412 : * OK, we're golden. Next to-do item is to save the encoding info out of
413 : * the pg_database tuple.
414 : */
415 18202 : SetDatabaseEncoding(dbform->encoding);
416 : /* Record it as a GUC internal option, too */
417 18202 : SetConfigOption("server_encoding", GetDatabaseEncodingName(),
418 : PGC_INTERNAL, PGC_S_DYNAMIC_DEFAULT);
419 : /* If we have no other source of client_encoding, use server encoding */
420 18202 : SetConfigOption("client_encoding", GetDatabaseEncodingName(),
421 : PGC_BACKEND, PGC_S_DYNAMIC_DEFAULT);
422 :
423 : /* assign locale variables */
424 18202 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datcollate);
425 18202 : collate = TextDatumGetCString(datum);
426 18202 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datctype);
427 18202 : ctype = TextDatumGetCString(datum);
428 :
429 : /*
430 : * Historically, we set LC_COLLATE from datcollate, as well. That's no
431 : * longer necessary because all collation behavior is handled through
432 : * pg_locale_t.
433 : */
434 :
435 18202 : if (pg_perm_setlocale(LC_CTYPE, ctype) == NULL)
436 0 : ereport(FATAL,
437 : (errmsg("database locale is incompatible with operating system"),
438 : errdetail("The database was initialized with LC_CTYPE \"%s\", "
439 : " which is not recognized by setlocale().", ctype),
440 : errhint("Recreate the database with another locale or install the missing locale.")));
441 :
442 18202 : init_database_collation();
443 :
444 : /*
445 : * Check collation version. See similar code in
446 : * pg_newlocale_from_collation(). Note that here we warn instead of error
447 : * in any case, so that we don't prevent connecting.
448 : */
449 18200 : datum = SysCacheGetAttr(DATABASEOID, tup, Anum_pg_database_datcollversion,
450 : &isnull);
451 18200 : if (!isnull)
452 : {
453 : char *actual_versionstr;
454 : char *collversionstr;
455 : char *locale;
456 :
457 17372 : collversionstr = TextDatumGetCString(datum);
458 :
459 17372 : if (dbform->datlocprovider == COLLPROVIDER_LIBC)
460 16439 : locale = collate;
461 : else
462 : {
463 933 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datlocale);
464 933 : locale = TextDatumGetCString(datum);
465 : }
466 :
467 17372 : actual_versionstr = get_collation_actual_version(dbform->datlocprovider, locale);
468 17372 : if (!actual_versionstr)
469 : /* should not happen */
470 0 : elog(WARNING,
471 : "database \"%s\" has no actual collation version, but a version was recorded",
472 : name);
473 17372 : else if (strcmp(actual_versionstr, collversionstr) != 0)
474 0 : ereport(WARNING,
475 : (errmsg("database \"%s\" has a collation version mismatch",
476 : name),
477 : errdetail("The database was created using collation version %s, "
478 : "but the operating system provides version %s.",
479 : collversionstr, actual_versionstr),
480 : errhint("Rebuild all objects in this database that use the default collation and run "
481 : "ALTER DATABASE %s REFRESH COLLATION VERSION, "
482 : "or build PostgreSQL with the right library version.",
483 : quote_identifier(name))));
484 : }
485 :
486 18200 : ReleaseSysCache(tup);
487 18200 : }
488 :
489 :
490 : /*
491 : * pg_split_opts -- split a string of options and append it to an argv array
492 : *
493 : * The caller is responsible for ensuring the argv array is large enough. The
494 : * maximum possible number of arguments added by this routine is
495 : * (strlen(optstr) + 1) / 2.
496 : *
497 : * Because some option values can contain spaces we allow escaping using
498 : * backslashes, with \\ representing a literal backslash.
499 : */
500 : void
501 4342 : pg_split_opts(char **argv, int *argcp, const char *optstr)
502 : {
503 : StringInfoData s;
504 :
505 4342 : initStringInfo(&s);
506 :
507 15898 : while (*optstr)
508 : {
509 11556 : bool last_was_escape = false;
510 :
511 11556 : resetStringInfo(&s);
512 :
513 : /* skip over leading space */
514 22129 : while (isspace((unsigned char) *optstr))
515 10573 : optstr++;
516 :
517 11556 : if (*optstr == '\0')
518 0 : break;
519 :
520 : /*
521 : * Parse a single option, stopping at the first space, unless it's
522 : * escaped.
523 : */
524 176413 : while (*optstr)
525 : {
526 172071 : if (isspace((unsigned char) *optstr) && !last_was_escape)
527 7214 : break;
528 :
529 164857 : if (!last_was_escape && *optstr == '\\')
530 20 : last_was_escape = true;
531 : else
532 : {
533 164837 : last_was_escape = false;
534 164837 : appendStringInfoChar(&s, *optstr);
535 : }
536 :
537 164857 : optstr++;
538 : }
539 :
540 : /* now store the option in the next argv[] position */
541 11556 : argv[(*argcp)++] = pstrdup(s.data);
542 : }
543 :
544 4342 : pfree(s.data);
545 4342 : }
546 :
547 : /*
548 : * Initialize MaxBackends value from config options.
549 : *
550 : * This must be called after modules have had the chance to alter GUCs in
551 : * shared_preload_libraries and before shared memory size is determined.
552 : *
553 : * Note that in EXEC_BACKEND environment, the value is passed down from
554 : * postmaster to subprocesses via BackendParameters in SubPostmasterMain; only
555 : * postmaster itself and processes not under postmaster control should call
556 : * this.
557 : */
558 : void
559 1228 : InitializeMaxBackends(void)
560 : {
561 : Assert(MaxBackends == 0);
562 :
563 : /* Note that this does not include "auxiliary" processes */
564 1228 : MaxBackends = MaxConnections + autovacuum_worker_slots +
565 1228 : max_worker_processes + max_wal_senders + NUM_SPECIAL_WORKER_PROCS;
566 :
567 1228 : if (MaxBackends > MAX_BACKENDS)
568 0 : ereport(ERROR,
569 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
570 : errmsg("too many server processes configured"),
571 : errdetail("\"max_connections\" (%d) plus \"autovacuum_worker_slots\" (%d) plus \"max_worker_processes\" (%d) plus \"max_wal_senders\" (%d) must be less than %d.",
572 : MaxConnections, autovacuum_worker_slots,
573 : max_worker_processes, max_wal_senders,
574 : MAX_BACKENDS - (NUM_SPECIAL_WORKER_PROCS - 1))));
575 1228 : }
576 :
577 : /*
578 : * Initialize the number of fast-path lock slots in PGPROC.
579 : *
580 : * This must be called after modules have had the chance to alter GUCs in
581 : * shared_preload_libraries and before shared memory size is determined.
582 : */
583 : void
584 1228 : InitializeFastPathLocks(void)
585 : {
586 : /* Should be initialized only once. */
587 : Assert(FastPathLockGroupsPerBackend == 0);
588 :
589 : /*
590 : * Based on the max_locks_per_transaction GUC, as that's a good indicator
591 : * of the expected number of locks, figure out the value for
592 : * FastPathLockGroupsPerBackend. This must be a power-of-two. We cap the
593 : * value at FP_LOCK_GROUPS_PER_BACKEND_MAX and insist the value is at
594 : * least 1.
595 : *
596 : * The default max_locks_per_transaction = 128 means 8 groups by default.
597 : */
598 1228 : FastPathLockGroupsPerBackend =
599 1228 : Max(Min(pg_nextpower2_32(max_locks_per_xact) / FP_LOCK_SLOTS_PER_GROUP,
600 : FP_LOCK_GROUPS_PER_BACKEND_MAX), 1);
601 :
602 : /* Validate we did get a power-of-two */
603 : Assert(FastPathLockGroupsPerBackend ==
604 : pg_nextpower2_32(FastPathLockGroupsPerBackend));
605 1228 : }
606 :
607 : /*
608 : * Early initialization of a backend (either standalone or under postmaster).
609 : * This happens even before InitPostgres.
610 : *
611 : * This is separate from InitPostgres because it is also called by auxiliary
612 : * processes, such as the background writer process, which may not call
613 : * InitPostgres at all.
614 : */
615 : void
616 24829 : BaseInit(void)
617 : {
618 : Assert(MyProc != NULL);
619 :
620 : /*
621 : * Initialize our input/output/debugging file descriptors.
622 : */
623 24829 : DebugFileOpen();
624 :
625 : /*
626 : * Initialize file access. Done early so other subsystems can access
627 : * files.
628 : */
629 24829 : InitFileAccess();
630 :
631 : /*
632 : * Initialize statistics reporting. This needs to happen early to ensure
633 : * that pgstat's shutdown callback runs after the shutdown callbacks of
634 : * all subsystems that can produce stats (like e.g. transaction commits
635 : * can).
636 : */
637 24829 : pgstat_initialize();
638 :
639 : /*
640 : * Initialize AIO before infrastructure that might need to actually
641 : * execute AIO.
642 : */
643 24829 : pgaio_init_backend();
644 :
645 : /* Do local initialization of storage and buffer managers */
646 24829 : InitSync();
647 24829 : smgrinit();
648 24829 : InitBufferManagerAccess();
649 :
650 : /*
651 : * Initialize temporary file access after pgstat, so that the temporary
652 : * file shutdown hook can report temporary file statistics.
653 : */
654 24829 : InitTemporaryFileAccess();
655 :
656 : /*
657 : * Initialize local buffers for WAL record construction, in case we ever
658 : * try to insert XLOG.
659 : */
660 24829 : InitXLogInsert();
661 :
662 : /* Initialize lock manager's local structs */
663 24829 : InitLockManagerAccess();
664 :
665 : /* Initialize logical info WAL logging state */
666 24829 : InitializeProcessXLogLogicalInfo();
667 :
668 : /*
669 : * Initialize replication slots after pgstat. The exit hook might need to
670 : * drop ephemeral slots, which in turn triggers stats reporting.
671 : */
672 24829 : ReplicationSlotInitialize();
673 24829 : }
674 :
675 :
676 : /* --------------------------------
677 : * InitPostgres
678 : * Initialize POSTGRES.
679 : *
680 : * Parameters:
681 : * in_dbname, dboid: specify database to connect to, as described below
682 : * username, useroid: specify role to connect as, as described below
683 : * flags:
684 : * - INIT_PG_LOAD_SESSION_LIBS to honor [session|local]_preload_libraries.
685 : * - INIT_PG_OVERRIDE_ALLOW_CONNS to connect despite !datallowconn.
686 : * - INIT_PG_OVERRIDE_ROLE_LOGIN to connect despite !rolcanlogin.
687 : * out_dbname: optional output parameter, see below; pass NULL if not used
688 : *
689 : * The database can be specified by name, using the in_dbname parameter, or by
690 : * OID, using the dboid parameter. Specify NULL or InvalidOid respectively
691 : * for the unused parameter. If dboid is provided, the actual database
692 : * name can be returned to the caller in out_dbname. If out_dbname isn't
693 : * NULL, it must point to a buffer of size NAMEDATALEN.
694 : *
695 : * Similarly, the role can be passed by name, using the username parameter,
696 : * or by OID using the useroid parameter.
697 : *
698 : * In bootstrap mode the database and username parameters are NULL/InvalidOid.
699 : * The autovacuum launcher process doesn't specify these parameters either,
700 : * because it only goes far enough to be able to read pg_database; it doesn't
701 : * connect to any particular database. An autovacuum worker specifies a
702 : * database but not a username; conversely, a physical walsender specifies
703 : * username but not database.
704 : *
705 : * By convention, INIT_PG_LOAD_SESSION_LIBS should be passed in "flags" in
706 : * "interactive" sessions (including standalone backends), but not in
707 : * background processes such as autovacuum. Note in particular that it
708 : * shouldn't be true in parallel worker processes; those have another
709 : * mechanism for replicating their leader's set of loaded libraries.
710 : *
711 : * We expect that InitProcess() was already called, so we already have a
712 : * PGPROC struct ... but it's not completely filled in yet.
713 : *
714 : * Note:
715 : * Be very careful with the order of calls in the InitPostgres function.
716 : * --------------------------------
717 : */
718 : void
719 19852 : InitPostgres(const char *in_dbname, Oid dboid,
720 : const char *username, Oid useroid,
721 : uint32 flags,
722 : char *out_dbname)
723 : {
724 19852 : bool bootstrap = IsBootstrapProcessingMode();
725 : bool am_superuser;
726 : char *fullpath;
727 : char dbname[NAMEDATALEN];
728 19852 : int nfree = 0;
729 :
730 19852 : elog(DEBUG3, "InitPostgres");
731 :
732 : /*
733 : * Add my PGPROC struct to the ProcArray.
734 : *
735 : * Once I have done this, I am visible to other backends!
736 : */
737 19852 : InitProcessPhase2();
738 :
739 : /* Initialize status reporting */
740 19852 : pgstat_beinit();
741 :
742 : /*
743 : * And initialize an entry in the PgBackendStatus array. That way, if
744 : * LWLocks or third-party authentication should happen to hang, it is
745 : * possible to retrieve some information about what is going on.
746 : */
747 19852 : if (!bootstrap)
748 : {
749 19795 : pgstat_bestart_initial();
750 19795 : INJECTION_POINT("init-pre-auth", NULL);
751 : }
752 :
753 : /*
754 : * Initialize my entry in the shared-invalidation manager's array of
755 : * per-backend data.
756 : */
757 19852 : SharedInvalBackendInit(false);
758 :
759 19852 : ProcSignalInit(MyCancelKey, MyCancelKeyLength);
760 :
761 : /*
762 : * Initialize a local cache of the data_checksum_version, to be updated by
763 : * the procsignal-based barriers.
764 : *
765 : * This intentionally happens after initializing the procsignal, otherwise
766 : * we might miss a state change. This means we can get a barrier for the
767 : * state we've just initialized.
768 : *
769 : * The postmaster (which is what gets forked into the new child process)
770 : * does not handle barriers, therefore it may not have the current value
771 : * of LocalDataChecksumVersion value (it'll have the value read from the
772 : * control file, which may be arbitrarily old).
773 : *
774 : * NB: Even if the postmaster handled barriers, the value might still be
775 : * stale, as it might have changed after this process forked.
776 : */
777 19852 : InitLocalDataChecksumState();
778 :
779 : /*
780 : * Also set up timeout handlers needed for backend operation. We need
781 : * these in every case except bootstrap.
782 : */
783 19852 : if (!bootstrap)
784 : {
785 19795 : RegisterTimeout(DEADLOCK_TIMEOUT, CheckDeadLockAlert);
786 19795 : RegisterTimeout(STATEMENT_TIMEOUT, StatementTimeoutHandler);
787 19795 : RegisterTimeout(LOCK_TIMEOUT, LockTimeoutHandler);
788 19795 : RegisterTimeout(IDLE_IN_TRANSACTION_SESSION_TIMEOUT,
789 : IdleInTransactionSessionTimeoutHandler);
790 19795 : RegisterTimeout(TRANSACTION_TIMEOUT, TransactionTimeoutHandler);
791 19795 : RegisterTimeout(IDLE_SESSION_TIMEOUT, IdleSessionTimeoutHandler);
792 19795 : RegisterTimeout(CLIENT_CONNECTION_CHECK_TIMEOUT, ClientCheckTimeoutHandler);
793 19795 : RegisterTimeout(IDLE_STATS_UPDATE_TIMEOUT,
794 : IdleStatsUpdateTimeoutHandler);
795 : }
796 :
797 : /*
798 : * If this is either a bootstrap process or a standalone backend, start up
799 : * the XLOG machinery, and register to have it closed down at exit. In
800 : * other cases, the startup process is responsible for starting up the
801 : * XLOG machinery, and the checkpointer for closing it down.
802 : */
803 19852 : if (!IsUnderPostmaster)
804 : {
805 : /*
806 : * We don't yet have an aux-process resource owner, but StartupXLOG
807 : * and ShutdownXLOG will need one. Hence, create said resource owner
808 : * (and register a callback to clean it up after ShutdownXLOG runs).
809 : */
810 133 : CreateAuxProcessResourceOwner();
811 :
812 133 : StartupXLOG();
813 : /* Release (and warn about) any buffer pins leaked in StartupXLOG */
814 133 : ReleaseAuxProcessResources(true);
815 : /* Reset CurrentResourceOwner to nothing for the moment */
816 133 : CurrentResourceOwner = NULL;
817 :
818 : /*
819 : * Use before_shmem_exit() so that ShutdownXLOG() can rely on DSM
820 : * segments etc to work (which in turn is required for pgstats).
821 : */
822 133 : before_shmem_exit(pgstat_before_server_shutdown, 0);
823 133 : before_shmem_exit(ShutdownXLOG, 0);
824 : }
825 :
826 : /*
827 : * Initialize the relation cache and the system catalog caches. Note that
828 : * no catalog access happens here; we only set up the hashtable structure.
829 : * We must do this before starting a transaction because transaction abort
830 : * would try to touch these hashtables.
831 : */
832 19852 : RelationCacheInitialize();
833 19852 : InitCatalogCache();
834 19852 : InitPlanCache();
835 :
836 : /* Initialize portal manager */
837 19852 : EnablePortalManager();
838 :
839 : /*
840 : * Load relcache entries for the shared system catalogs. This must create
841 : * at least entries for pg_database and catalogs used for authentication.
842 : */
843 19852 : RelationCacheInitializePhase2();
844 :
845 : /*
846 : * Set up process-exit callback to do pre-shutdown cleanup. This is one
847 : * of the first before_shmem_exit callbacks we register; thus, this will
848 : * be one of the last things we do before low-level modules like the
849 : * buffer manager begin to close down. We need to have this in place
850 : * before we begin our first transaction --- if we fail during the
851 : * initialization transaction, as is entirely possible, we need the
852 : * AbortTransaction call to clean up.
853 : */
854 19852 : before_shmem_exit(ShutdownPostgres, 0);
855 :
856 : /* The autovacuum launcher is done here */
857 19852 : if (AmAutoVacuumLauncherProcess())
858 : {
859 : /* fill in the remainder of this entry in the PgBackendStatus array */
860 477 : pgstat_bestart_final();
861 :
862 1494 : return;
863 : }
864 :
865 : /*
866 : * Start a new transaction here before first access to db.
867 : */
868 19375 : if (!bootstrap)
869 : {
870 : /* statement_timestamp must be set for timeouts to work correctly */
871 19318 : SetCurrentStatementStartTimestamp();
872 19318 : StartTransactionCommand();
873 :
874 : /*
875 : * transaction_isolation will have been set to the default by the
876 : * above. If the default is "serializable", and we are in hot
877 : * standby, we will fail if we don't change it to something lower.
878 : * Fortunately, "read committed" is plenty good enough.
879 : */
880 19318 : XactIsoLevel = XACT_READ_COMMITTED;
881 : }
882 :
883 : /*
884 : * Perform client authentication if necessary, then figure out our
885 : * postgres user ID, and see if we are a superuser.
886 : *
887 : * In standalone mode, autovacuum worker processes and slot sync worker
888 : * process, we use a fixed ID, otherwise we figure it out from the
889 : * authenticated user name.
890 : */
891 19375 : if (bootstrap || AmAutoVacuumWorkerProcess() || AmLogicalSlotSyncWorkerProcess())
892 : {
893 1496 : InitializeSessionUserIdStandalone();
894 1496 : am_superuser = true;
895 : }
896 17879 : else if (!IsUnderPostmaster)
897 : {
898 76 : InitializeSessionUserIdStandalone();
899 76 : am_superuser = true;
900 76 : if (!ThereIsAtLeastOneRole())
901 0 : ereport(WARNING,
902 : (errcode(ERRCODE_UNDEFINED_OBJECT),
903 : errmsg("no roles are defined in this database system"),
904 : errhint("You should immediately run CREATE USER \"%s\" SUPERUSER;.",
905 : username != NULL ? username : "postgres")));
906 : }
907 17803 : else if (AmBackgroundWorkerProcess() || AmDataChecksumsWorkerProcess())
908 : {
909 3192 : if (username == NULL && !OidIsValid(useroid))
910 : {
911 552 : InitializeSessionUserIdStandalone();
912 552 : am_superuser = true;
913 : }
914 : else
915 : {
916 2640 : InitializeSessionUserId(username, useroid,
917 2640 : (flags & INIT_PG_OVERRIDE_ROLE_LOGIN) != 0);
918 2639 : am_superuser = superuser();
919 : }
920 : }
921 : else
922 : {
923 : /* normal multiuser case */
924 : Assert(MyProcPort != NULL);
925 14611 : PerformAuthentication(MyProcPort);
926 14537 : InitializeSessionUserId(username, useroid, false);
927 : /* ensure that auth_method is actually valid, aka authn_id is not NULL */
928 14533 : if (MyClientConnectionInfo.authn_id)
929 129 : InitializeSystemUser(MyClientConnectionInfo.authn_id,
930 : hba_authname(MyClientConnectionInfo.auth_method));
931 14533 : am_superuser = superuser();
932 : }
933 :
934 : /* Report any SSL/GSS details for the session. */
935 19296 : if (MyProcPort != NULL)
936 : {
937 : Assert(!bootstrap);
938 :
939 14533 : pgstat_bestart_security();
940 : }
941 :
942 : /*
943 : * Binary upgrades only allowed super-user connections
944 : */
945 19296 : if (IsBinaryUpgrade && !am_superuser)
946 : {
947 0 : ereport(FATAL,
948 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
949 : errmsg("must be superuser to connect in binary upgrade mode")));
950 : }
951 :
952 : /*
953 : * The last few regular connection slots are reserved for superusers and
954 : * roles with privileges of pg_use_reserved_connections. We do not apply
955 : * these limits to background processes, since they all have their own
956 : * pools of PGPROC slots.
957 : *
958 : * Note: At this point, the new backend has already claimed a proc struct,
959 : * so we must check whether the number of free slots is strictly less than
960 : * the reserved connection limits.
961 : */
962 19296 : if (AmRegularBackendProcess() && !am_superuser &&
963 276 : (SuperuserReservedConnections + ReservedConnections) > 0 &&
964 276 : !HaveNFreeProcs(SuperuserReservedConnections + ReservedConnections, &nfree))
965 : {
966 4 : if (nfree < SuperuserReservedConnections)
967 1 : ereport(FATAL,
968 : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
969 : errmsg("remaining connection slots are reserved for roles with the %s attribute",
970 : "SUPERUSER")));
971 :
972 3 : if (!has_privs_of_role(GetUserId(), ROLE_PG_USE_RESERVED_CONNECTIONS))
973 1 : ereport(FATAL,
974 : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
975 : errmsg("remaining connection slots are reserved for roles with privileges of the \"%s\" role",
976 : "pg_use_reserved_connections")));
977 : }
978 :
979 : /* Check replication permissions needed for walsender processes. */
980 19294 : if (am_walsender)
981 : {
982 : Assert(!bootstrap);
983 :
984 1289 : if (!has_rolreplication(GetUserId()))
985 0 : ereport(FATAL,
986 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
987 : errmsg("permission denied to start WAL sender"),
988 : errdetail("Only roles with the %s attribute may start a WAL sender process.",
989 : "REPLICATION")));
990 : }
991 :
992 : /*
993 : * If this is a plain walsender only supporting physical replication, we
994 : * don't want to connect to any particular database. Just finish the
995 : * backend startup by processing any options from the startup packet, and
996 : * we're done.
997 : */
998 19294 : if (am_walsender && !am_db_walsender)
999 : {
1000 : /* process any options passed in the startup packet */
1001 492 : if (MyProcPort != NULL)
1002 492 : process_startup_options(MyProcPort, am_superuser);
1003 :
1004 : /* Apply PostAuthDelay as soon as we've read all options */
1005 492 : if (PostAuthDelay > 0)
1006 0 : pg_usleep(PostAuthDelay * 1000000L);
1007 :
1008 : /* initialize client encoding */
1009 492 : InitializeClientEncoding();
1010 :
1011 : /* fill in the remainder of this entry in the PgBackendStatus array */
1012 492 : pgstat_bestart_final();
1013 :
1014 : /* close the transaction we started above */
1015 492 : CommitTransactionCommand();
1016 :
1017 : /* send any WARNINGs we've accumulated during initialization */
1018 492 : EmitConnectionWarnings();
1019 :
1020 492 : return;
1021 : }
1022 :
1023 : /*
1024 : * Set up the global variables holding database id and default tablespace.
1025 : * But note we won't actually try to touch the database just yet.
1026 : *
1027 : * We take a shortcut in the bootstrap case, otherwise we have to look up
1028 : * the db's entry in pg_database.
1029 : */
1030 18802 : if (bootstrap)
1031 : {
1032 57 : dboid = Template1DbOid;
1033 57 : MyDatabaseTableSpace = DEFAULTTABLESPACE_OID;
1034 : }
1035 18745 : else if (in_dbname != NULL)
1036 : {
1037 : HeapTuple tuple;
1038 : Form_pg_database dbform;
1039 :
1040 14121 : tuple = GetDatabaseTuple(in_dbname);
1041 14121 : if (!HeapTupleIsValid(tuple))
1042 10 : ereport(FATAL,
1043 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1044 : errmsg("database \"%s\" does not exist", in_dbname)));
1045 14111 : dbform = (Form_pg_database) GETSTRUCT(tuple);
1046 14111 : dboid = dbform->oid;
1047 : }
1048 4624 : else if (!OidIsValid(dboid))
1049 : {
1050 : /*
1051 : * If this is a background worker not bound to any particular
1052 : * database, we're done now. Everything that follows only makes sense
1053 : * if we are bound to a specific database. We do need to close the
1054 : * transaction we started before returning.
1055 : */
1056 525 : if (!bootstrap)
1057 : {
1058 525 : pgstat_bestart_final();
1059 525 : CommitTransactionCommand();
1060 : }
1061 525 : return;
1062 : }
1063 :
1064 : /*
1065 : * Now, take a writer's lock on the database we are trying to connect to.
1066 : * If there is a concurrently running DROP DATABASE on that database, this
1067 : * will block us until it finishes (and has committed its update of
1068 : * pg_database).
1069 : *
1070 : * Note that the lock is not held long, only until the end of this startup
1071 : * transaction. This is OK since we will advertise our use of the
1072 : * database in the ProcArray before dropping the lock (in fact, that's the
1073 : * next thing to do). Anyone trying a DROP DATABASE after this point will
1074 : * see us in the array once they have the lock. Ordering is important for
1075 : * this because we don't want to advertise ourselves as being in this
1076 : * database until we have the lock; otherwise we create what amounts to a
1077 : * deadlock with CountOtherDBBackends().
1078 : *
1079 : * Note: use of RowExclusiveLock here is reasonable because we envision
1080 : * our session as being a concurrent writer of the database. If we had a
1081 : * way of declaring a session as being guaranteed-read-only, we could use
1082 : * AccessShareLock for such sessions and thereby not conflict against
1083 : * CREATE DATABASE.
1084 : */
1085 18267 : if (!bootstrap)
1086 18210 : LockSharedObject(DatabaseRelationId, dboid, 0, RowExclusiveLock);
1087 :
1088 : /*
1089 : * Recheck pg_database to make sure the target database hasn't gone away.
1090 : * If there was a concurrent DROP DATABASE, this ensures we will die
1091 : * cleanly without creating a mess.
1092 : */
1093 18267 : if (!bootstrap)
1094 : {
1095 : HeapTuple tuple;
1096 : Form_pg_database datform;
1097 :
1098 18210 : tuple = GetDatabaseTupleByOid(dboid);
1099 18210 : if (HeapTupleIsValid(tuple))
1100 18210 : datform = (Form_pg_database) GETSTRUCT(tuple);
1101 :
1102 18210 : if (!HeapTupleIsValid(tuple) ||
1103 14111 : (in_dbname && namestrcmp(&datform->datname, in_dbname)))
1104 : {
1105 0 : if (in_dbname)
1106 0 : ereport(FATAL,
1107 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1108 : errmsg("database \"%s\" does not exist", in_dbname),
1109 : errdetail("It seems to have just been dropped or renamed.")));
1110 : else
1111 0 : ereport(FATAL,
1112 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1113 : errmsg("database %u does not exist", dboid)));
1114 : }
1115 :
1116 18210 : strlcpy(dbname, NameStr(datform->datname), sizeof(dbname));
1117 :
1118 18210 : if (database_is_invalid_form(datform))
1119 : {
1120 6 : ereport(FATAL,
1121 : errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
1122 : errmsg("cannot connect to invalid database \"%s\"", dbname),
1123 : errhint("Use DROP DATABASE to drop invalid databases."));
1124 : }
1125 :
1126 18204 : MyDatabaseTableSpace = datform->dattablespace;
1127 18204 : MyDatabaseHasLoginEventTriggers = datform->dathasloginevt;
1128 : /* pass the database name back to the caller */
1129 18204 : if (out_dbname)
1130 1433 : strcpy(out_dbname, dbname);
1131 : }
1132 :
1133 : /*
1134 : * Now that we rechecked, we are certain to be connected to a database and
1135 : * thus can set MyDatabaseId.
1136 : *
1137 : * It is important that MyDatabaseId only be set once we are sure that the
1138 : * target database can no longer be concurrently dropped or renamed. For
1139 : * example, without this guarantee, pgstat_update_dbstats() could create
1140 : * entries for databases that were just dropped in the pgstat shutdown
1141 : * callback, which could confuse other code paths like the autovacuum
1142 : * scheduler.
1143 : */
1144 18261 : MyDatabaseId = dboid;
1145 :
1146 : /*
1147 : * Now we can mark our PGPROC entry with the database ID.
1148 : *
1149 : * We assume this is an atomic store so no lock is needed; though actually
1150 : * things would work fine even if it weren't atomic. Anyone searching the
1151 : * ProcArray for this database's ID should hold the database lock, so they
1152 : * would not be executing concurrently with this store. A process looking
1153 : * for another database's ID could in theory see a chance match if it read
1154 : * a partially-updated databaseId value; but as long as all such searches
1155 : * wait and retry, as in CountOtherDBBackends(), they will certainly see
1156 : * the correct value on their next try.
1157 : */
1158 18261 : MyProc->databaseId = MyDatabaseId;
1159 :
1160 : /*
1161 : * We established a catalog snapshot while reading pg_authid and/or
1162 : * pg_database; but until we have set up MyDatabaseId, we won't react to
1163 : * incoming sinval messages for unshared catalogs, so we won't realize it
1164 : * if the snapshot has been invalidated. Assume it's no good anymore.
1165 : */
1166 18261 : InvalidateCatalogSnapshot();
1167 :
1168 : /*
1169 : * Now we should be able to access the database directory safely. Verify
1170 : * it's there and looks reasonable.
1171 : */
1172 18261 : fullpath = GetDatabasePath(MyDatabaseId, MyDatabaseTableSpace);
1173 :
1174 18261 : if (!bootstrap)
1175 : {
1176 18204 : if (access(fullpath, F_OK) == -1)
1177 : {
1178 0 : if (errno == ENOENT)
1179 0 : ereport(FATAL,
1180 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1181 : errmsg("database \"%s\" does not exist",
1182 : dbname),
1183 : errdetail("The database subdirectory \"%s\" is missing.",
1184 : fullpath)));
1185 : else
1186 0 : ereport(FATAL,
1187 : (errcode_for_file_access(),
1188 : errmsg("could not access directory \"%s\": %m",
1189 : fullpath)));
1190 : }
1191 :
1192 18204 : ValidatePgVersion(fullpath);
1193 : }
1194 :
1195 18261 : SetDatabasePath(fullpath);
1196 18261 : pfree(fullpath);
1197 :
1198 : /*
1199 : * It's now possible to do real access to the system catalogs.
1200 : *
1201 : * Load relcache entries for the system catalogs. This must create at
1202 : * least the minimum set of "nailed-in" cache entries.
1203 : */
1204 18261 : RelationCacheInitializePhase3();
1205 :
1206 : /* set up ACL framework (so CheckMyDatabase can check permissions) */
1207 18260 : initialize_acl();
1208 :
1209 : /*
1210 : * Re-read the pg_database row for our database, check permissions and set
1211 : * up database-specific GUC settings. We can't do this until all the
1212 : * database-access infrastructure is up. (Also, it wants to know if the
1213 : * user is a superuser, so the above stuff has to happen first.)
1214 : */
1215 18260 : if (!bootstrap)
1216 18203 : CheckMyDatabase(dbname, am_superuser,
1217 18203 : (flags & INIT_PG_OVERRIDE_ALLOW_CONNS) != 0);
1218 :
1219 : /*
1220 : * Now process any command-line switches and any additional GUC variable
1221 : * settings passed in the startup packet. We couldn't do this before
1222 : * because we didn't know if client is a superuser.
1223 : */
1224 18257 : if (MyProcPort != NULL)
1225 14023 : process_startup_options(MyProcPort, am_superuser);
1226 :
1227 : /* Process pg_db_role_setting options */
1228 18257 : process_settings(MyDatabaseId, GetSessionUserId());
1229 :
1230 : /* Apply PostAuthDelay as soon as we've read all options */
1231 18257 : if (PostAuthDelay > 0)
1232 0 : pg_usleep(PostAuthDelay * 1000000L);
1233 :
1234 : /*
1235 : * Initialize various default states that can't be set up until we've
1236 : * selected the active user and gotten the right GUC settings.
1237 : */
1238 :
1239 : /* set default namespace search path */
1240 18257 : InitializeSearchPath();
1241 :
1242 : /* initialize client encoding */
1243 18257 : InitializeClientEncoding();
1244 :
1245 : /* Initialize this backend's session state. */
1246 18257 : InitializeSession();
1247 :
1248 : /*
1249 : * If this is an interactive session, load any libraries that should be
1250 : * preloaded at backend start. Since those are determined by GUCs, this
1251 : * can't happen until GUC settings are complete, but we want it to happen
1252 : * during the initial transaction in case anything that requires database
1253 : * access needs to be done.
1254 : */
1255 18257 : if ((flags & INIT_PG_LOAD_SESSION_LIBS) != 0)
1256 13300 : process_session_preload_libraries();
1257 :
1258 : /* fill in the remainder of this entry in the PgBackendStatus array */
1259 18257 : if (!bootstrap)
1260 18200 : pgstat_bestart_final();
1261 :
1262 : /* close the transaction we started above */
1263 18257 : if (!bootstrap)
1264 18200 : CommitTransactionCommand();
1265 :
1266 : /* send any WARNINGs we've accumulated during initialization */
1267 18257 : EmitConnectionWarnings();
1268 : }
1269 :
1270 : /*
1271 : * Process any command-line switches and any additional GUC variable
1272 : * settings passed in the startup packet.
1273 : */
1274 : static void
1275 14515 : process_startup_options(Port *port, bool am_superuser)
1276 : {
1277 : GucContext gucctx;
1278 : ListCell *gucopts;
1279 :
1280 14515 : gucctx = am_superuser ? PGC_SU_BACKEND : PGC_BACKEND;
1281 :
1282 : /*
1283 : * First process any command-line switches that were included in the
1284 : * startup packet, if we are in a regular backend.
1285 : */
1286 14515 : if (port->cmdline_options != NULL)
1287 : {
1288 : /*
1289 : * The maximum possible number of commandline arguments that could
1290 : * come from port->cmdline_options is (strlen + 1) / 2; see
1291 : * pg_split_opts().
1292 : */
1293 : char **av;
1294 : int maxac;
1295 : int ac;
1296 :
1297 4342 : maxac = 2 + (strlen(port->cmdline_options) + 1) / 2;
1298 :
1299 4342 : av = palloc_array(char *, maxac);
1300 4342 : ac = 0;
1301 :
1302 4342 : av[ac++] = "postgres";
1303 :
1304 4342 : pg_split_opts(av, &ac, port->cmdline_options);
1305 :
1306 4342 : av[ac] = NULL;
1307 :
1308 : Assert(ac < maxac);
1309 :
1310 4342 : (void) process_postgres_switches(ac, av, gucctx, NULL);
1311 : }
1312 :
1313 : /*
1314 : * Process any additional GUC variable settings passed in startup packet.
1315 : * These are handled exactly like command-line variables.
1316 : */
1317 14515 : gucopts = list_head(port->guc_options);
1318 35198 : while (gucopts)
1319 : {
1320 : char *name;
1321 : char *value;
1322 :
1323 20683 : name = lfirst(gucopts);
1324 20683 : gucopts = lnext(port->guc_options, gucopts);
1325 :
1326 20683 : value = lfirst(gucopts);
1327 20683 : gucopts = lnext(port->guc_options, gucopts);
1328 :
1329 20683 : SetConfigOption(name, value, gucctx, PGC_S_CLIENT);
1330 : }
1331 14515 : }
1332 :
1333 : /*
1334 : * Load GUC settings from pg_db_role_setting.
1335 : *
1336 : * We try specific settings for the database/role combination, as well as
1337 : * general for this database and for this user.
1338 : */
1339 : static void
1340 18257 : process_settings(Oid databaseid, Oid roleid)
1341 : {
1342 : Relation relsetting;
1343 : Snapshot snapshot;
1344 :
1345 18257 : if (!IsUnderPostmaster)
1346 131 : return;
1347 :
1348 18126 : relsetting = table_open(DbRoleSettingRelationId, AccessShareLock);
1349 :
1350 : /* read all the settings under the same snapshot for efficiency */
1351 18126 : snapshot = RegisterSnapshot(GetCatalogSnapshot(DbRoleSettingRelationId));
1352 :
1353 : /* Later settings are ignored if set earlier. */
1354 18126 : ApplySetting(snapshot, databaseid, roleid, relsetting, PGC_S_DATABASE_USER);
1355 18126 : ApplySetting(snapshot, InvalidOid, roleid, relsetting, PGC_S_USER);
1356 18126 : ApplySetting(snapshot, databaseid, InvalidOid, relsetting, PGC_S_DATABASE);
1357 18126 : ApplySetting(snapshot, InvalidOid, InvalidOid, relsetting, PGC_S_GLOBAL);
1358 :
1359 18126 : UnregisterSnapshot(snapshot);
1360 18126 : table_close(relsetting, AccessShareLock);
1361 : }
1362 :
1363 : /*
1364 : * Backend-shutdown callback. Do cleanup that we want to be sure happens
1365 : * before all the supporting modules begin to nail their doors shut via
1366 : * their own callbacks.
1367 : *
1368 : * User-level cleanup, such as temp-relation removal and UNLISTEN, happens
1369 : * via separate callbacks that execute before this one. We don't combine the
1370 : * callbacks because we still want this one to happen if the user-level
1371 : * cleanup fails.
1372 : */
1373 : static void
1374 19852 : ShutdownPostgres(int code, Datum arg)
1375 : {
1376 : /* Make sure we've killed any active transaction */
1377 19852 : AbortOutOfAnyTransaction();
1378 :
1379 : /*
1380 : * User locks are not released by transaction end, so be sure to release
1381 : * them explicitly.
1382 : */
1383 19852 : LockReleaseAll(USER_LOCKMETHOD, true);
1384 19852 : }
1385 :
1386 :
1387 : /*
1388 : * STATEMENT_TIMEOUT handler: trigger a query-cancel interrupt.
1389 : */
1390 : static void
1391 6 : StatementTimeoutHandler(void)
1392 : {
1393 6 : int sig = SIGINT;
1394 :
1395 : /*
1396 : * During authentication the timeout is used to deal with
1397 : * authentication_timeout - we want to quit in response to such timeouts.
1398 : */
1399 6 : if (ClientAuthInProgress)
1400 0 : sig = SIGTERM;
1401 :
1402 : #ifdef HAVE_SETSID
1403 : /* try to signal whole process group */
1404 6 : kill(-MyProcPid, sig);
1405 : #endif
1406 6 : kill(MyProcPid, sig);
1407 6 : }
1408 :
1409 : /*
1410 : * LOCK_TIMEOUT handler: trigger a query-cancel interrupt.
1411 : */
1412 : static void
1413 4 : LockTimeoutHandler(void)
1414 : {
1415 : #ifdef HAVE_SETSID
1416 : /* try to signal whole process group */
1417 4 : kill(-MyProcPid, SIGINT);
1418 : #endif
1419 4 : kill(MyProcPid, SIGINT);
1420 4 : }
1421 :
1422 : static void
1423 1 : TransactionTimeoutHandler(void)
1424 : {
1425 1 : TransactionTimeoutPending = true;
1426 1 : InterruptPending = true;
1427 1 : SetLatch(MyLatch);
1428 1 : }
1429 :
1430 : static void
1431 1 : IdleInTransactionSessionTimeoutHandler(void)
1432 : {
1433 1 : IdleInTransactionSessionTimeoutPending = true;
1434 1 : InterruptPending = true;
1435 1 : SetLatch(MyLatch);
1436 1 : }
1437 :
1438 : static void
1439 1 : IdleSessionTimeoutHandler(void)
1440 : {
1441 1 : IdleSessionTimeoutPending = true;
1442 1 : InterruptPending = true;
1443 1 : SetLatch(MyLatch);
1444 1 : }
1445 :
1446 : static void
1447 17 : IdleStatsUpdateTimeoutHandler(void)
1448 : {
1449 17 : IdleStatsUpdateTimeoutPending = true;
1450 17 : InterruptPending = true;
1451 17 : SetLatch(MyLatch);
1452 17 : }
1453 :
1454 : static void
1455 0 : ClientCheckTimeoutHandler(void)
1456 : {
1457 0 : CheckClientConnectionPending = true;
1458 0 : InterruptPending = true;
1459 0 : SetLatch(MyLatch);
1460 0 : }
1461 :
1462 : /*
1463 : * Returns true if at least one role is defined in this database cluster.
1464 : */
1465 : static bool
1466 76 : ThereIsAtLeastOneRole(void)
1467 : {
1468 : Relation pg_authid_rel;
1469 : TableScanDesc scan;
1470 : bool result;
1471 :
1472 76 : pg_authid_rel = table_open(AuthIdRelationId, AccessShareLock);
1473 :
1474 76 : scan = table_beginscan_catalog(pg_authid_rel, 0, NULL);
1475 76 : result = (heap_getnext(scan, ForwardScanDirection) != NULL);
1476 :
1477 76 : table_endscan(scan);
1478 76 : table_close(pg_authid_rel, AccessShareLock);
1479 :
1480 76 : return result;
1481 : }
1482 :
1483 : /*
1484 : * Stores a warning message to be sent later via EmitConnectionWarnings().
1485 : * Both msg and detail must be non-NULL.
1486 : *
1487 : * NB: Caller should ensure the strings are allocated in a long-lived context
1488 : * like TopMemoryContext.
1489 : */
1490 : void
1491 2 : StoreConnectionWarning(char *msg, char *detail)
1492 : {
1493 : MemoryContext oldcontext;
1494 :
1495 : Assert(msg);
1496 : Assert(detail);
1497 :
1498 2 : if (ConnectionWarningsEmitted)
1499 0 : elog(ERROR, "StoreConnectionWarning() called after EmitConnectionWarnings()");
1500 :
1501 2 : oldcontext = MemoryContextSwitchTo(TopMemoryContext);
1502 :
1503 2 : ConnectionWarningMessages = lappend(ConnectionWarningMessages, msg);
1504 2 : ConnectionWarningDetails = lappend(ConnectionWarningDetails, detail);
1505 :
1506 2 : MemoryContextSwitchTo(oldcontext);
1507 2 : }
1508 :
1509 : /*
1510 : * Sends the warning messages saved via StoreConnectionWarning() and frees the
1511 : * strings and lists.
1512 : *
1513 : * NB: This can only be called once per backend.
1514 : */
1515 : static void
1516 18749 : EmitConnectionWarnings(void)
1517 : {
1518 : ListCell *lc_msg;
1519 : ListCell *lc_detail;
1520 :
1521 18749 : if (ConnectionWarningsEmitted)
1522 0 : elog(ERROR, "EmitConnectionWarnings() called more than once");
1523 : else
1524 18749 : ConnectionWarningsEmitted = true;
1525 :
1526 18751 : forboth(lc_msg, ConnectionWarningMessages,
1527 : lc_detail, ConnectionWarningDetails)
1528 : {
1529 2 : ereport(WARNING,
1530 : (errmsg("%s", (char *) lfirst(lc_msg)),
1531 : errdetail("%s", (char *) lfirst(lc_detail))));
1532 : }
1533 :
1534 18749 : list_free_deep(ConnectionWarningMessages);
1535 18749 : list_free_deep(ConnectionWarningDetails);
1536 18749 : }
|