Line data Source code
1 : /*-------------------------------------------------------------------------
2 : *
3 : * postinit.c
4 : * postgres initialization utilities
5 : *
6 : * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
7 : * Portions Copyright (c) 1994, Regents of the University of California
8 : *
9 : *
10 : * IDENTIFICATION
11 : * src/backend/utils/init/postinit.c
12 : *
13 : *
14 : *-------------------------------------------------------------------------
15 : */
16 : #include "postgres.h"
17 :
18 : #include <ctype.h>
19 : #include <fcntl.h>
20 : #include <unistd.h>
21 :
22 : #include "access/genam.h"
23 : #include "access/heapam.h"
24 : #include "access/htup_details.h"
25 : #include "access/session.h"
26 : #include "access/tableam.h"
27 : #include "access/xact.h"
28 : #include "access/xlog.h"
29 : #include "access/xloginsert.h"
30 : #include "catalog/namespace.h"
31 : #include "catalog/pg_authid.h"
32 : #include "catalog/pg_collation.h"
33 : #include "catalog/pg_database.h"
34 : #include "catalog/pg_db_role_setting.h"
35 : #include "catalog/pg_tablespace.h"
36 : #include "libpq/auth.h"
37 : #include "libpq/libpq-be.h"
38 : #include "mb/pg_wchar.h"
39 : #include "miscadmin.h"
40 : #include "pgstat.h"
41 : #include "port/pg_bitutils.h"
42 : #include "postmaster/autovacuum.h"
43 : #include "postmaster/postmaster.h"
44 : #include "replication/slot.h"
45 : #include "replication/slotsync.h"
46 : #include "replication/walsender.h"
47 : #include "storage/aio_subsys.h"
48 : #include "storage/bufmgr.h"
49 : #include "storage/fd.h"
50 : #include "storage/ipc.h"
51 : #include "storage/lmgr.h"
52 : #include "storage/proc.h"
53 : #include "storage/procarray.h"
54 : #include "storage/procnumber.h"
55 : #include "storage/procsignal.h"
56 : #include "storage/sinvaladt.h"
57 : #include "storage/smgr.h"
58 : #include "storage/sync.h"
59 : #include "tcop/backend_startup.h"
60 : #include "tcop/tcopprot.h"
61 : #include "utils/acl.h"
62 : #include "utils/builtins.h"
63 : #include "utils/fmgroids.h"
64 : #include "utils/guc_hooks.h"
65 : #include "utils/injection_point.h"
66 : #include "utils/memutils.h"
67 : #include "utils/pg_locale.h"
68 : #include "utils/portal.h"
69 : #include "utils/ps_status.h"
70 : #include "utils/snapmgr.h"
71 : #include "utils/syscache.h"
72 : #include "utils/timeout.h"
73 :
74 : /* has this backend called EmitConnectionWarnings()? */
75 : static bool ConnectionWarningsEmitted;
76 :
77 : /* content of warnings to send via EmitConnectionWarnings() */
78 : static List *ConnectionWarningMessages;
79 : static List *ConnectionWarningDetails;
80 :
81 : static HeapTuple GetDatabaseTuple(const char *dbname);
82 : static HeapTuple GetDatabaseTupleByOid(Oid dboid);
83 : static void PerformAuthentication(Port *port);
84 : static void CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections);
85 : static void ShutdownPostgres(int code, Datum arg);
86 : static void StatementTimeoutHandler(void);
87 : static void LockTimeoutHandler(void);
88 : static void IdleInTransactionSessionTimeoutHandler(void);
89 : static void TransactionTimeoutHandler(void);
90 : static void IdleSessionTimeoutHandler(void);
91 : static void IdleStatsUpdateTimeoutHandler(void);
92 : static void ClientCheckTimeoutHandler(void);
93 : static bool ThereIsAtLeastOneRole(void);
94 : static void process_startup_options(Port *port, bool am_superuser);
95 : static void process_settings(Oid databaseid, Oid roleid);
96 : static void EmitConnectionWarnings(void);
97 :
98 :
99 : /*** InitPostgres support ***/
100 :
101 :
102 : /*
103 : * GetDatabaseTuple -- fetch the pg_database row for a database
104 : *
105 : * This is used during backend startup when we don't yet have any access to
106 : * system catalogs in general. In the worst case, we can seqscan pg_database
107 : * using nothing but the hard-wired descriptor that relcache.c creates for
108 : * pg_database. In more typical cases, relcache.c was able to load
109 : * descriptors for both pg_database and its indexes from the shared relcache
110 : * cache file, and so we can do an indexscan. criticalSharedRelcachesBuilt
111 : * tells whether we got the cached descriptors.
112 : */
113 : static HeapTuple
114 14337 : GetDatabaseTuple(const char *dbname)
115 : {
116 : HeapTuple tuple;
117 : Relation relation;
118 : SysScanDesc scan;
119 : ScanKeyData key[1];
120 :
121 : /*
122 : * form a scan key
123 : */
124 14337 : ScanKeyInit(&key[0],
125 : Anum_pg_database_datname,
126 : BTEqualStrategyNumber, F_NAMEEQ,
127 : CStringGetDatum(dbname));
128 :
129 : /*
130 : * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
131 : * built the critical shared relcache entries (i.e., we're starting up
132 : * without a shared relcache cache file).
133 : */
134 14337 : relation = table_open(DatabaseRelationId, AccessShareLock);
135 14337 : scan = systable_beginscan(relation, DatabaseNameIndexId,
136 : criticalSharedRelcachesBuilt,
137 : NULL,
138 : 1, key);
139 :
140 14337 : tuple = systable_getnext(scan);
141 :
142 : /* Must copy tuple before releasing buffer */
143 14337 : if (HeapTupleIsValid(tuple))
144 14327 : tuple = heap_copytuple(tuple);
145 :
146 : /* all done */
147 14337 : systable_endscan(scan);
148 14337 : table_close(relation, AccessShareLock);
149 :
150 14337 : return tuple;
151 : }
152 :
153 : /*
154 : * GetDatabaseTupleByOid -- as above, but search by database OID
155 : */
156 : static HeapTuple
157 18466 : GetDatabaseTupleByOid(Oid dboid)
158 : {
159 : HeapTuple tuple;
160 : Relation relation;
161 : SysScanDesc scan;
162 : ScanKeyData key[1];
163 :
164 : /*
165 : * form a scan key
166 : */
167 18466 : ScanKeyInit(&key[0],
168 : Anum_pg_database_oid,
169 : BTEqualStrategyNumber, F_OIDEQ,
170 : ObjectIdGetDatum(dboid));
171 :
172 : /*
173 : * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
174 : * built the critical shared relcache entries (i.e., we're starting up
175 : * without a shared relcache cache file).
176 : */
177 18466 : relation = table_open(DatabaseRelationId, AccessShareLock);
178 18466 : scan = systable_beginscan(relation, DatabaseOidIndexId,
179 : criticalSharedRelcachesBuilt,
180 : NULL,
181 : 1, key);
182 :
183 18466 : tuple = systable_getnext(scan);
184 :
185 : /* Must copy tuple before releasing buffer */
186 18466 : if (HeapTupleIsValid(tuple))
187 18466 : tuple = heap_copytuple(tuple);
188 :
189 : /* all done */
190 18466 : systable_endscan(scan);
191 18466 : table_close(relation, AccessShareLock);
192 :
193 18466 : return tuple;
194 : }
195 :
196 :
197 : /*
198 : * PerformAuthentication -- authenticate a remote client
199 : *
200 : * returns: nothing. Will not return at all if there's any failure.
201 : */
202 : static void
203 14837 : PerformAuthentication(Port *port)
204 : {
205 : /* This should be set already, but let's make sure */
206 14837 : ClientAuthInProgress = true; /* limit visibility of log messages */
207 :
208 : /*
209 : * In EXEC_BACKEND case, we didn't inherit the contents of pg_hba.conf
210 : * etcetera from the postmaster, and have to load them ourselves.
211 : *
212 : * FIXME: [fork/exec] Ugh. Is there a way around this overhead?
213 : */
214 : #ifdef EXEC_BACKEND
215 :
216 : /*
217 : * load_hba() and load_ident() want to work within the PostmasterContext,
218 : * so create that if it doesn't exist (which it won't). We'll delete it
219 : * again later, in PostgresMain.
220 : */
221 : if (PostmasterContext == NULL)
222 : PostmasterContext = AllocSetContextCreate(TopMemoryContext,
223 : "Postmaster",
224 : ALLOCSET_DEFAULT_SIZES);
225 :
226 : if (!load_hba())
227 : {
228 : /*
229 : * It makes no sense to continue if we fail to load the HBA file,
230 : * since there is no way to connect to the database in this case.
231 : */
232 : ereport(FATAL,
233 : /* translator: %s is a configuration file */
234 : (errmsg("could not load %s", HbaFileName)));
235 : }
236 :
237 : if (!load_ident())
238 : {
239 : /*
240 : * It is ok to continue if we fail to load the IDENT file, although it
241 : * means that you cannot log in using any of the authentication
242 : * methods that need a user name mapping. load_ident() already logged
243 : * the details of error to the log.
244 : */
245 : }
246 : #endif
247 :
248 : /* Capture authentication start time for logging */
249 14837 : conn_timing.auth_start = GetCurrentTimestamp();
250 :
251 : /*
252 : * Set up a timeout in case a buggy or malicious client fails to respond
253 : * during authentication. Since we're inside a transaction and might do
254 : * database access, we have to use the statement_timeout infrastructure.
255 : */
256 14837 : enable_timeout_after(STATEMENT_TIMEOUT, AuthenticationTimeout * 1000);
257 :
258 : /*
259 : * Now perform authentication exchange.
260 : */
261 14837 : set_ps_display("authentication");
262 14837 : ClientAuthentication(port); /* might not return, if failure */
263 :
264 : /*
265 : * Done with authentication. Disable the timeout, and log if needed.
266 : */
267 14763 : disable_timeout(STATEMENT_TIMEOUT, false);
268 :
269 : /* Capture authentication end time for logging */
270 14763 : conn_timing.auth_end = GetCurrentTimestamp();
271 :
272 14763 : if (log_connections & LOG_CONNECTION_AUTHORIZATION)
273 : {
274 : StringInfoData logmsg;
275 :
276 242 : initStringInfo(&logmsg);
277 242 : if (am_walsender)
278 0 : appendStringInfo(&logmsg, _("replication connection authorized: user=%s"),
279 : port->user_name);
280 : else
281 242 : appendStringInfo(&logmsg, _("connection authorized: user=%s"),
282 : port->user_name);
283 242 : if (!am_walsender)
284 242 : appendStringInfo(&logmsg, _(" database=%s"), port->database_name);
285 :
286 242 : if (port->application_name != NULL)
287 242 : appendStringInfo(&logmsg, _(" application_name=%s"),
288 : port->application_name);
289 :
290 : #ifdef USE_SSL
291 242 : if (port->ssl_in_use)
292 111 : appendStringInfo(&logmsg, _(" SSL enabled (protocol=%s, cipher=%s, bits=%d)"),
293 : be_tls_get_version(port),
294 : be_tls_get_cipher(port),
295 : be_tls_get_cipher_bits(port));
296 : #endif
297 : #ifdef ENABLE_GSS
298 : if (port->gss)
299 : {
300 : const char *princ = be_gssapi_get_princ(port);
301 :
302 : if (princ)
303 : appendStringInfo(&logmsg,
304 : _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s, principal=%s)"),
305 : be_gssapi_get_auth(port) ? _("yes") : _("no"),
306 : be_gssapi_get_enc(port) ? _("yes") : _("no"),
307 : be_gssapi_get_delegation(port) ? _("yes") : _("no"),
308 : princ);
309 : else
310 : appendStringInfo(&logmsg,
311 : _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s)"),
312 : be_gssapi_get_auth(port) ? _("yes") : _("no"),
313 : be_gssapi_get_enc(port) ? _("yes") : _("no"),
314 : be_gssapi_get_delegation(port) ? _("yes") : _("no"));
315 : }
316 : #endif
317 :
318 242 : ereport(LOG, errmsg_internal("%s", logmsg.data));
319 242 : pfree(logmsg.data);
320 : }
321 :
322 14763 : set_ps_display("startup");
323 :
324 14763 : ClientAuthInProgress = false; /* client_min_messages is active now */
325 14763 : }
326 :
327 :
328 : /*
329 : * CheckMyDatabase -- fetch information from the pg_database entry for our DB
330 : */
331 : static void
332 18458 : CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections)
333 : {
334 : HeapTuple tup;
335 : Form_pg_database dbform;
336 : Datum datum;
337 : bool isnull;
338 : char *collate;
339 : char *ctype;
340 :
341 : /* Fetch our pg_database row normally, via syscache */
342 18458 : tup = SearchSysCache1(DATABASEOID, ObjectIdGetDatum(MyDatabaseId));
343 18458 : if (!HeapTupleIsValid(tup))
344 0 : elog(ERROR, "cache lookup failed for database %u", MyDatabaseId);
345 18458 : dbform = (Form_pg_database) GETSTRUCT(tup);
346 :
347 : /* This recheck is strictly paranoia */
348 18458 : if (strcmp(name, NameStr(dbform->datname)) != 0)
349 0 : ereport(FATAL,
350 : (errcode(ERRCODE_UNDEFINED_DATABASE),
351 : errmsg("database \"%s\" has disappeared from pg_database",
352 : name),
353 : errdetail("Database OID %u now seems to belong to \"%s\".",
354 : MyDatabaseId, NameStr(dbform->datname))));
355 :
356 : /*
357 : * Check permissions to connect to the database.
358 : *
359 : * These checks are not enforced when in standalone mode, so that there is
360 : * a way to recover from disabling all access to all databases, for
361 : * example "UPDATE pg_database SET datallowconn = false;".
362 : */
363 18458 : if (IsUnderPostmaster)
364 : {
365 : /*
366 : * Check that the database is currently allowing connections.
367 : * (Background processes can override this test and the next one by
368 : * setting override_allow_connections.)
369 : */
370 18382 : if (!dbform->datallowconn && !override_allow_connections)
371 1 : ereport(FATAL,
372 : (errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
373 : errmsg("database \"%s\" is not currently accepting connections",
374 : name)));
375 :
376 : /*
377 : * Check privilege to connect to the database. (The am_superuser test
378 : * is redundant, but since we have the flag, might as well check it
379 : * and save a few cycles.)
380 : */
381 18694 : if (!am_superuser && !override_allow_connections &&
382 313 : object_aclcheck(DatabaseRelationId, MyDatabaseId, GetUserId(),
383 : ACL_CONNECT) != ACLCHECK_OK)
384 0 : ereport(FATAL,
385 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
386 : errmsg("permission denied for database \"%s\"", name),
387 : errdetail("User does not have CONNECT privilege.")));
388 :
389 : /*
390 : * Check connection limit for this database. We enforce the limit
391 : * only for regular backends, since other process types have their own
392 : * PGPROC pools.
393 : *
394 : * There is a race condition here --- we create our PGPROC before
395 : * checking for other PGPROCs. If two backends did this at about the
396 : * same time, they might both think they were over the limit, while
397 : * ideally one should succeed and one fail. Getting that to work
398 : * exactly seems more trouble than it is worth, however; instead we
399 : * just document that the connection limit is approximate.
400 : */
401 18381 : if (dbform->datconnlimit >= 0 &&
402 0 : AmRegularBackendProcess() &&
403 0 : !am_superuser &&
404 0 : CountDBConnections(MyDatabaseId) > dbform->datconnlimit)
405 0 : ereport(FATAL,
406 : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
407 : errmsg("too many connections for database \"%s\"",
408 : name)));
409 : }
410 :
411 : /*
412 : * OK, we're golden. Next to-do item is to save the encoding info out of
413 : * the pg_database tuple.
414 : */
415 18457 : SetDatabaseEncoding(dbform->encoding);
416 : /* Record it as a GUC internal option, too */
417 18457 : SetConfigOption("server_encoding", GetDatabaseEncodingName(),
418 : PGC_INTERNAL, PGC_S_DYNAMIC_DEFAULT);
419 : /* If we have no other source of client_encoding, use server encoding */
420 18457 : SetConfigOption("client_encoding", GetDatabaseEncodingName(),
421 : PGC_BACKEND, PGC_S_DYNAMIC_DEFAULT);
422 :
423 : /* assign locale variables */
424 18457 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datcollate);
425 18457 : collate = TextDatumGetCString(datum);
426 18457 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datctype);
427 18457 : ctype = TextDatumGetCString(datum);
428 :
429 : /*
430 : * Historically, we set LC_COLLATE from datcollate, as well. That's no
431 : * longer necessary because all collation behavior is handled through
432 : * pg_locale_t.
433 : */
434 :
435 18457 : if (pg_perm_setlocale(LC_CTYPE, ctype) == NULL)
436 0 : ereport(FATAL,
437 : (errmsg("database locale is incompatible with operating system"),
438 : errdetail("The database was initialized with LC_CTYPE \"%s\", "
439 : " which is not recognized by setlocale().", ctype),
440 : errhint("Recreate the database with another locale or install the missing locale.")));
441 :
442 18457 : init_database_collation();
443 :
444 : /*
445 : * Check collation version. See similar code in
446 : * pg_newlocale_from_collation(). Note that here we warn instead of error
447 : * in any case, so that we don't prevent connecting.
448 : */
449 18455 : datum = SysCacheGetAttr(DATABASEOID, tup, Anum_pg_database_datcollversion,
450 : &isnull);
451 18455 : if (!isnull)
452 : {
453 : char *actual_versionstr;
454 : char *collversionstr;
455 : char *locale;
456 :
457 17656 : collversionstr = TextDatumGetCString(datum);
458 :
459 17656 : if (dbform->datlocprovider == COLLPROVIDER_LIBC)
460 16720 : locale = collate;
461 : else
462 : {
463 936 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datlocale);
464 936 : locale = TextDatumGetCString(datum);
465 : }
466 :
467 17656 : actual_versionstr = get_collation_actual_version(dbform->datlocprovider, locale);
468 17656 : if (!actual_versionstr)
469 : /* should not happen */
470 0 : elog(WARNING,
471 : "database \"%s\" has no actual collation version, but a version was recorded",
472 : name);
473 17656 : else if (strcmp(actual_versionstr, collversionstr) != 0)
474 0 : ereport(WARNING,
475 : (errmsg("database \"%s\" has a collation version mismatch",
476 : name),
477 : errdetail("The database was created using collation version %s, "
478 : "but the operating system provides version %s.",
479 : collversionstr, actual_versionstr),
480 : errhint("Rebuild all objects in this database that use the default collation and run "
481 : "ALTER DATABASE %s REFRESH COLLATION VERSION, "
482 : "or build PostgreSQL with the right library version.",
483 : quote_identifier(name))));
484 : }
485 :
486 18455 : ReleaseSysCache(tup);
487 18455 : }
488 :
489 :
490 : /*
491 : * pg_split_opts -- split a string of options and append it to an argv array
492 : *
493 : * The caller is responsible for ensuring the argv array is large enough. The
494 : * maximum possible number of arguments added by this routine is
495 : * (strlen(optstr) + 1) / 2.
496 : *
497 : * Because some option values can contain spaces we allow escaping using
498 : * backslashes, with \\ representing a literal backslash.
499 : */
500 : void
501 4373 : pg_split_opts(char **argv, int *argcp, const char *optstr)
502 : {
503 : StringInfoData s;
504 :
505 4373 : initStringInfo(&s);
506 :
507 16011 : while (*optstr)
508 : {
509 11638 : bool last_was_escape = false;
510 :
511 11638 : resetStringInfo(&s);
512 :
513 : /* skip over leading space */
514 22275 : while (isspace((unsigned char) *optstr))
515 10637 : optstr++;
516 :
517 11638 : if (*optstr == '\0')
518 0 : break;
519 :
520 : /*
521 : * Parse a single option, stopping at the first space, unless it's
522 : * escaped.
523 : */
524 177727 : while (*optstr)
525 : {
526 173354 : if (isspace((unsigned char) *optstr) && !last_was_escape)
527 7265 : break;
528 :
529 166089 : if (!last_was_escape && *optstr == '\\')
530 20 : last_was_escape = true;
531 : else
532 : {
533 166069 : last_was_escape = false;
534 166069 : appendStringInfoChar(&s, *optstr);
535 : }
536 :
537 166089 : optstr++;
538 : }
539 :
540 : /* now store the option in the next argv[] position */
541 11638 : argv[(*argcp)++] = pstrdup(s.data);
542 : }
543 :
544 4373 : pfree(s.data);
545 4373 : }
546 :
547 : /*
548 : * Initialize MaxBackends value from config options.
549 : *
550 : * This must be called after modules have had the chance to alter GUCs in
551 : * shared_preload_libraries and before shared memory size is determined.
552 : *
553 : * Note that in EXEC_BACKEND environment, the value is passed down from
554 : * postmaster to subprocesses via BackendParameters in SubPostmasterMain; only
555 : * postmaster itself and processes not under postmaster control should call
556 : * this.
557 : */
558 : void
559 1243 : InitializeMaxBackends(void)
560 : {
561 : Assert(MaxBackends == 0);
562 :
563 : /* Note that this does not include "auxiliary" processes */
564 1243 : MaxBackends = MaxConnections + autovacuum_worker_slots +
565 1243 : max_worker_processes + max_wal_senders + NUM_SPECIAL_WORKER_PROCS;
566 :
567 1243 : if (MaxBackends > MAX_BACKENDS)
568 0 : ereport(ERROR,
569 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
570 : errmsg("too many server processes configured"),
571 : errdetail("\"max_connections\" (%d) plus \"autovacuum_worker_slots\" (%d) plus \"max_worker_processes\" (%d) plus \"max_wal_senders\" (%d) must be less than %d.",
572 : MaxConnections, autovacuum_worker_slots,
573 : max_worker_processes, max_wal_senders,
574 : MAX_BACKENDS - (NUM_SPECIAL_WORKER_PROCS - 1))));
575 1243 : }
576 :
577 : /*
578 : * Initialize the number of fast-path lock slots in PGPROC.
579 : *
580 : * This must be called after modules have had the chance to alter GUCs in
581 : * shared_preload_libraries and before shared memory size is determined.
582 : */
583 : void
584 1243 : InitializeFastPathLocks(void)
585 : {
586 : /* Should be initialized only once. */
587 : Assert(FastPathLockGroupsPerBackend == 0);
588 :
589 : /*
590 : * Based on the max_locks_per_transaction GUC, as that's a good indicator
591 : * of the expected number of locks, figure out the value for
592 : * FastPathLockGroupsPerBackend. This must be a power-of-two. We cap the
593 : * value at FP_LOCK_GROUPS_PER_BACKEND_MAX and insist the value is at
594 : * least 1.
595 : *
596 : * The default max_locks_per_transaction = 128 means 8 groups by default.
597 : */
598 1243 : FastPathLockGroupsPerBackend =
599 1243 : Max(Min(pg_nextpower2_32(max_locks_per_xact) / FP_LOCK_SLOTS_PER_GROUP,
600 : FP_LOCK_GROUPS_PER_BACKEND_MAX), 1);
601 :
602 : /* Validate we did get a power-of-two */
603 : Assert(FastPathLockGroupsPerBackend ==
604 : pg_nextpower2_32(FastPathLockGroupsPerBackend));
605 1243 : }
606 :
607 : /*
608 : * Early initialization of a backend (either standalone or under postmaster).
609 : * This happens even before InitPostgres.
610 : *
611 : * This is separate from InitPostgres because it is also called by auxiliary
612 : * processes, such as the background writer process, which may not call
613 : * InitPostgres at all.
614 : */
615 : void
616 24597 : BaseInit(void)
617 : {
618 : Assert(MyProc != NULL);
619 :
620 : /*
621 : * Initialize our input/output/debugging file descriptors.
622 : */
623 24597 : DebugFileOpen();
624 :
625 : /*
626 : * Initialize file access. Done early so other subsystems can access
627 : * files.
628 : */
629 24597 : InitFileAccess();
630 :
631 : /*
632 : * Initialize statistics reporting. This needs to happen early to ensure
633 : * that pgstat's shutdown callback runs after the shutdown callbacks of
634 : * all subsystems that can produce stats (like e.g. transaction commits
635 : * can).
636 : */
637 24597 : pgstat_initialize();
638 :
639 : /*
640 : * Initialize AIO before infrastructure that might need to actually
641 : * execute AIO.
642 : */
643 24597 : pgaio_init_backend();
644 :
645 : /* Do local initialization of storage and buffer managers */
646 24597 : InitSync();
647 24597 : smgrinit();
648 24597 : InitBufferManagerAccess();
649 :
650 : /*
651 : * Initialize temporary file access after pgstat, so that the temporary
652 : * file shutdown hook can report temporary file statistics.
653 : */
654 24597 : InitTemporaryFileAccess();
655 :
656 : /*
657 : * Initialize local buffers for WAL record construction, in case we ever
658 : * try to insert XLOG.
659 : */
660 24597 : InitXLogInsert();
661 :
662 : /* Initialize lock manager's local structs */
663 24597 : InitLockManagerAccess();
664 :
665 : /* Initialize logical info WAL logging state */
666 24597 : InitializeProcessXLogLogicalInfo();
667 :
668 : /*
669 : * Initialize replication slots after pgstat. The exit hook might need to
670 : * drop ephemeral slots, which in turn triggers stats reporting.
671 : */
672 24597 : ReplicationSlotInitialize();
673 24597 : }
674 :
675 :
676 : /* --------------------------------
677 : * InitPostgres
678 : * Initialize POSTGRES.
679 : *
680 : * Parameters:
681 : * in_dbname, dboid: specify database to connect to, as described below
682 : * username, useroid: specify role to connect as, as described below
683 : * flags:
684 : * - INIT_PG_LOAD_SESSION_LIBS to honor [session|local]_preload_libraries.
685 : * - INIT_PG_OVERRIDE_ALLOW_CONNS to connect despite !datallowconn.
686 : * - INIT_PG_OVERRIDE_ROLE_LOGIN to connect despite !rolcanlogin.
687 : * out_dbname: optional output parameter, see below; pass NULL if not used
688 : *
689 : * The database can be specified by name, using the in_dbname parameter, or by
690 : * OID, using the dboid parameter. Specify NULL or InvalidOid respectively
691 : * for the unused parameter. If dboid is provided, the actual database
692 : * name can be returned to the caller in out_dbname. If out_dbname isn't
693 : * NULL, it must point to a buffer of size NAMEDATALEN.
694 : *
695 : * Similarly, the role can be passed by name, using the username parameter,
696 : * or by OID using the useroid parameter.
697 : *
698 : * In bootstrap mode the database and username parameters are NULL/InvalidOid.
699 : * The autovacuum launcher process doesn't specify these parameters either,
700 : * because it only goes far enough to be able to read pg_database; it doesn't
701 : * connect to any particular database. An autovacuum worker specifies a
702 : * database but not a username; conversely, a physical walsender specifies
703 : * username but not database.
704 : *
705 : * By convention, INIT_PG_LOAD_SESSION_LIBS should be passed in "flags" in
706 : * "interactive" sessions (including standalone backends), but not in
707 : * background processes such as autovacuum. Note in particular that it
708 : * shouldn't be true in parallel worker processes; those have another
709 : * mechanism for replicating their leader's set of loaded libraries.
710 : *
711 : * We expect that InitProcess() was already called, so we already have a
712 : * PGPROC struct ... but it's not completely filled in yet.
713 : *
714 : * Note:
715 : * Be very careful with the order of calls in the InitPostgres function.
716 : * --------------------------------
717 : */
718 : void
719 20135 : InitPostgres(const char *in_dbname, Oid dboid,
720 : const char *username, Oid useroid,
721 : uint32 flags,
722 : char *out_dbname)
723 : {
724 20135 : bool bootstrap = IsBootstrapProcessingMode();
725 : bool am_superuser;
726 : char *fullpath;
727 : char dbname[NAMEDATALEN];
728 20135 : int nfree = 0;
729 :
730 20135 : elog(DEBUG3, "InitPostgres");
731 :
732 : /*
733 : * Add my PGPROC struct to the ProcArray.
734 : *
735 : * Once I have done this, I am visible to other backends!
736 : */
737 20135 : InitProcessPhase2();
738 :
739 : /* Initialize status reporting */
740 20135 : pgstat_beinit();
741 :
742 : /*
743 : * And initialize an entry in the PgBackendStatus array. That way, if
744 : * LWLocks or third-party authentication should happen to hang, it is
745 : * possible to retrieve some information about what is going on.
746 : */
747 20135 : if (!bootstrap)
748 : {
749 20078 : pgstat_bestart_initial();
750 20078 : INJECTION_POINT("init-pre-auth", NULL);
751 : }
752 :
753 : /*
754 : * Initialize my entry in the shared-invalidation manager's array of
755 : * per-backend data.
756 : */
757 20135 : SharedInvalBackendInit(false);
758 :
759 : /*
760 : * Prevent consuming interrupts between setting ProcSignalInit and setting
761 : * the initial local data checksum value. If a barrier is emitted, and
762 : * absorbed, before local cached state is initialized the state transition
763 : * can be invalid.
764 : */
765 20135 : HOLD_INTERRUPTS();
766 :
767 20135 : ProcSignalInit(MyCancelKey, MyCancelKeyLength);
768 :
769 : /*
770 : * Initialize a local cache of the data_checksum_version, to be updated by
771 : * the procsignal-based barriers.
772 : *
773 : * This intentionally happens after initializing the procsignal, otherwise
774 : * we might miss a state change. This means we can get a barrier for the
775 : * state we've just initialized.
776 : *
777 : * The postmaster (which is what gets forked into the new child process)
778 : * does not handle barriers, therefore it may not have the current value
779 : * of LocalDataChecksumVersion value (it'll have the value read from the
780 : * control file, which may be arbitrarily old).
781 : *
782 : * NB: Even if the postmaster handled barriers, the value might still be
783 : * stale, as it might have changed after this process forked.
784 : */
785 20135 : InitLocalDataChecksumState();
786 :
787 20135 : RESUME_INTERRUPTS();
788 :
789 : /*
790 : * Also set up timeout handlers needed for backend operation. We need
791 : * these in every case except bootstrap.
792 : */
793 20135 : if (!bootstrap)
794 : {
795 20078 : RegisterTimeout(DEADLOCK_TIMEOUT, CheckDeadLockAlert);
796 20078 : RegisterTimeout(STATEMENT_TIMEOUT, StatementTimeoutHandler);
797 20078 : RegisterTimeout(LOCK_TIMEOUT, LockTimeoutHandler);
798 20078 : RegisterTimeout(IDLE_IN_TRANSACTION_SESSION_TIMEOUT,
799 : IdleInTransactionSessionTimeoutHandler);
800 20078 : RegisterTimeout(TRANSACTION_TIMEOUT, TransactionTimeoutHandler);
801 20078 : RegisterTimeout(IDLE_SESSION_TIMEOUT, IdleSessionTimeoutHandler);
802 20078 : RegisterTimeout(CLIENT_CONNECTION_CHECK_TIMEOUT, ClientCheckTimeoutHandler);
803 20078 : RegisterTimeout(IDLE_STATS_UPDATE_TIMEOUT,
804 : IdleStatsUpdateTimeoutHandler);
805 : }
806 :
807 : /*
808 : * If this is either a bootstrap process or a standalone backend, start up
809 : * the XLOG machinery, and register to have it closed down at exit. In
810 : * other cases, the startup process is responsible for starting up the
811 : * XLOG machinery, and the checkpointer for closing it down.
812 : */
813 20135 : if (!IsUnderPostmaster)
814 : {
815 : /*
816 : * We don't yet have an aux-process resource owner, but StartupXLOG
817 : * and ShutdownXLOG will need one. Hence, create said resource owner
818 : * (and register a callback to clean it up after ShutdownXLOG runs).
819 : */
820 133 : CreateAuxProcessResourceOwner();
821 :
822 133 : StartupXLOG();
823 : /* Release (and warn about) any buffer pins leaked in StartupXLOG */
824 133 : ReleaseAuxProcessResources(true);
825 : /* Reset CurrentResourceOwner to nothing for the moment */
826 133 : CurrentResourceOwner = NULL;
827 :
828 : /*
829 : * Use before_shmem_exit() so that ShutdownXLOG() can rely on DSM
830 : * segments etc to work (which in turn is required for pgstats).
831 : */
832 133 : before_shmem_exit(pgstat_before_server_shutdown, 0);
833 133 : before_shmem_exit(ShutdownXLOG, 0);
834 : }
835 :
836 : /*
837 : * Initialize the relation cache and the system catalog caches. Note that
838 : * no catalog access happens here; we only set up the hashtable structure.
839 : * We must do this before starting a transaction because transaction abort
840 : * would try to touch these hashtables.
841 : */
842 20135 : RelationCacheInitialize();
843 20135 : InitCatalogCache();
844 20135 : InitPlanCache();
845 :
846 : /* Initialize portal manager */
847 20135 : EnablePortalManager();
848 :
849 : /*
850 : * Load relcache entries for the shared system catalogs. This must create
851 : * at least entries for pg_database and catalogs used for authentication.
852 : */
853 20135 : RelationCacheInitializePhase2();
854 :
855 : /*
856 : * Set up process-exit callback to do pre-shutdown cleanup. This is one
857 : * of the first before_shmem_exit callbacks we register; thus, this will
858 : * be one of the last things we do before low-level modules like the
859 : * buffer manager begin to close down. We need to have this in place
860 : * before we begin our first transaction --- if we fail during the
861 : * initialization transaction, as is entirely possible, we need the
862 : * AbortTransaction call to clean up.
863 : */
864 20135 : before_shmem_exit(ShutdownPostgres, 0);
865 :
866 : /* The autovacuum launcher is done here */
867 20135 : if (AmAutoVacuumLauncherProcess())
868 : {
869 : /* fill in the remainder of this entry in the PgBackendStatus array */
870 484 : pgstat_bestart_final();
871 :
872 1520 : return;
873 : }
874 :
875 : /*
876 : * Start a new transaction here before first access to db.
877 : */
878 19651 : if (!bootstrap)
879 : {
880 : /* statement_timestamp must be set for timeouts to work correctly */
881 19594 : SetCurrentStatementStartTimestamp();
882 19594 : StartTransactionCommand();
883 :
884 : /*
885 : * transaction_isolation will have been set to the default by the
886 : * above. If the default is "serializable", and we are in hot
887 : * standby, we will fail if we don't change it to something lower.
888 : * Fortunately, "read committed" is plenty good enough.
889 : */
890 19594 : XactIsoLevel = XACT_READ_COMMITTED;
891 : }
892 :
893 : /*
894 : * Perform client authentication if necessary, then figure out our
895 : * postgres user ID, and see if we are a superuser.
896 : *
897 : * In standalone mode, autovacuum worker processes and slot sync worker
898 : * process, we use a fixed ID, otherwise we figure it out from the
899 : * authenticated user name.
900 : */
901 19651 : if (bootstrap || AmAutoVacuumWorkerProcess() || AmLogicalSlotSyncWorkerProcess())
902 : {
903 1530 : InitializeSessionUserIdStandalone();
904 1530 : am_superuser = true;
905 : }
906 18121 : else if (!IsUnderPostmaster)
907 : {
908 76 : InitializeSessionUserIdStandalone();
909 76 : am_superuser = true;
910 76 : if (!ThereIsAtLeastOneRole())
911 0 : ereport(WARNING,
912 : (errcode(ERRCODE_UNDEFINED_OBJECT),
913 : errmsg("no roles are defined in this database system"),
914 : errhint("You should immediately run CREATE USER \"%s\" SUPERUSER;.",
915 : username != NULL ? username : "postgres")));
916 : }
917 18045 : else if (AmBackgroundWorkerProcess() || AmDataChecksumsWorkerProcess())
918 : {
919 3208 : if (username == NULL && !OidIsValid(useroid))
920 : {
921 564 : InitializeSessionUserIdStandalone();
922 564 : am_superuser = true;
923 : }
924 : else
925 : {
926 2644 : InitializeSessionUserId(username, useroid,
927 2644 : (flags & INIT_PG_OVERRIDE_ROLE_LOGIN) != 0);
928 2642 : am_superuser = superuser();
929 : }
930 : }
931 : else
932 : {
933 : /* normal multiuser case */
934 : Assert(MyProcPort != NULL);
935 14837 : PerformAuthentication(MyProcPort);
936 14763 : InitializeSessionUserId(username, useroid, false);
937 : /* ensure that auth_method is actually valid, aka authn_id is not NULL */
938 14759 : if (MyClientConnectionInfo.authn_id)
939 129 : InitializeSystemUser(MyClientConnectionInfo.authn_id,
940 : hba_authname(MyClientConnectionInfo.auth_method));
941 14759 : am_superuser = superuser();
942 : }
943 :
944 : /* Report any SSL/GSS details for the session. */
945 19571 : if (MyProcPort != NULL)
946 : {
947 : Assert(!bootstrap);
948 :
949 14759 : pgstat_bestart_security();
950 : }
951 :
952 : /*
953 : * Binary upgrades only allowed super-user connections
954 : */
955 19571 : if (IsBinaryUpgrade && !am_superuser)
956 : {
957 0 : ereport(FATAL,
958 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
959 : errmsg("must be superuser to connect in binary upgrade mode")));
960 : }
961 :
962 : /*
963 : * The last few regular connection slots are reserved for superusers and
964 : * roles with privileges of pg_use_reserved_connections. We do not apply
965 : * these limits to background processes, since they all have their own
966 : * pools of PGPROC slots.
967 : *
968 : * Note: At this point, the new backend has already claimed a proc struct,
969 : * so we must check whether the number of free slots is strictly less than
970 : * the reserved connection limits.
971 : */
972 19571 : if (AmRegularBackendProcess() && !am_superuser &&
973 276 : (SuperuserReservedConnections + ReservedConnections) > 0 &&
974 276 : !HaveNFreeProcs(SuperuserReservedConnections + ReservedConnections, &nfree))
975 : {
976 4 : if (nfree < SuperuserReservedConnections)
977 1 : ereport(FATAL,
978 : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
979 : errmsg("remaining connection slots are reserved for roles with the %s attribute",
980 : "SUPERUSER")));
981 :
982 3 : if (!has_privs_of_role(GetUserId(), ROLE_PG_USE_RESERVED_CONNECTIONS))
983 1 : ereport(FATAL,
984 : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
985 : errmsg("remaining connection slots are reserved for roles with privileges of the \"%s\" role",
986 : "pg_use_reserved_connections")));
987 : }
988 :
989 : /* Check replication permissions needed for walsender processes. */
990 19569 : if (am_walsender)
991 : {
992 : Assert(!bootstrap);
993 :
994 1304 : if (!has_rolreplication(GetUserId()))
995 0 : ereport(FATAL,
996 : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
997 : errmsg("permission denied to start WAL sender"),
998 : errdetail("Only roles with the %s attribute may start a WAL sender process.",
999 : "REPLICATION")));
1000 : }
1001 :
1002 : /*
1003 : * If this is a plain walsender only supporting physical replication, we
1004 : * don't want to connect to any particular database. Just finish the
1005 : * backend startup by processing any options from the startup packet, and
1006 : * we're done.
1007 : */
1008 19569 : if (am_walsender && !am_db_walsender)
1009 : {
1010 : /* process any options passed in the startup packet */
1011 502 : if (MyProcPort != NULL)
1012 502 : process_startup_options(MyProcPort, am_superuser);
1013 :
1014 : /* Apply PostAuthDelay as soon as we've read all options */
1015 502 : if (PostAuthDelay > 0)
1016 0 : pg_usleep(PostAuthDelay * 1000000L);
1017 :
1018 : /* initialize client encoding */
1019 502 : InitializeClientEncoding();
1020 :
1021 : /* fill in the remainder of this entry in the PgBackendStatus array */
1022 502 : pgstat_bestart_final();
1023 :
1024 : /* close the transaction we started above */
1025 502 : CommitTransactionCommand();
1026 :
1027 : /* send any WARNINGs we've accumulated during initialization */
1028 502 : EmitConnectionWarnings();
1029 :
1030 502 : return;
1031 : }
1032 :
1033 : /*
1034 : * Set up the global variables holding database id and default tablespace.
1035 : * But note we won't actually try to touch the database just yet.
1036 : *
1037 : * We take a shortcut in the bootstrap case, otherwise we have to look up
1038 : * the db's entry in pg_database.
1039 : */
1040 19067 : if (bootstrap)
1041 : {
1042 57 : dboid = Template1DbOid;
1043 57 : MyDatabaseTableSpace = DEFAULTTABLESPACE_OID;
1044 : }
1045 19010 : else if (in_dbname != NULL)
1046 : {
1047 : HeapTuple tuple;
1048 : Form_pg_database dbform;
1049 :
1050 14337 : tuple = GetDatabaseTuple(in_dbname);
1051 14337 : if (!HeapTupleIsValid(tuple))
1052 10 : ereport(FATAL,
1053 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1054 : errmsg("database \"%s\" does not exist", in_dbname)));
1055 14327 : dbform = (Form_pg_database) GETSTRUCT(tuple);
1056 14327 : dboid = dbform->oid;
1057 : }
1058 4673 : else if (!OidIsValid(dboid))
1059 : {
1060 : /*
1061 : * If this is a background worker not bound to any particular
1062 : * database, we're done now. Everything that follows only makes sense
1063 : * if we are bound to a specific database. We do need to close the
1064 : * transaction we started before returning.
1065 : */
1066 534 : if (!bootstrap)
1067 : {
1068 534 : pgstat_bestart_final();
1069 534 : CommitTransactionCommand();
1070 : }
1071 534 : return;
1072 : }
1073 :
1074 : /*
1075 : * Now, take a writer's lock on the database we are trying to connect to.
1076 : * If there is a concurrently running DROP DATABASE on that database, this
1077 : * will block us until it finishes (and has committed its update of
1078 : * pg_database).
1079 : *
1080 : * Note that the lock is not held long, only until the end of this startup
1081 : * transaction. This is OK since we will advertise our use of the
1082 : * database in the ProcArray before dropping the lock (in fact, that's the
1083 : * next thing to do). Anyone trying a DROP DATABASE after this point will
1084 : * see us in the array once they have the lock. Ordering is important for
1085 : * this because we don't want to advertise ourselves as being in this
1086 : * database until we have the lock; otherwise we create what amounts to a
1087 : * deadlock with CountOtherDBBackends().
1088 : *
1089 : * Note: use of RowExclusiveLock here is reasonable because we envision
1090 : * our session as being a concurrent writer of the database. If we had a
1091 : * way of declaring a session as being guaranteed-read-only, we could use
1092 : * AccessShareLock for such sessions and thereby not conflict against
1093 : * CREATE DATABASE.
1094 : */
1095 18523 : if (!bootstrap)
1096 18466 : LockSharedObject(DatabaseRelationId, dboid, 0, RowExclusiveLock);
1097 :
1098 : /*
1099 : * Recheck pg_database to make sure the target database hasn't gone away.
1100 : * If there was a concurrent DROP DATABASE, this ensures we will die
1101 : * cleanly without creating a mess.
1102 : */
1103 18523 : if (!bootstrap)
1104 : {
1105 : HeapTuple tuple;
1106 : Form_pg_database datform;
1107 :
1108 18466 : tuple = GetDatabaseTupleByOid(dboid);
1109 18466 : if (HeapTupleIsValid(tuple))
1110 18466 : datform = (Form_pg_database) GETSTRUCT(tuple);
1111 :
1112 18466 : if (!HeapTupleIsValid(tuple) ||
1113 14327 : (in_dbname && namestrcmp(&datform->datname, in_dbname)))
1114 : {
1115 0 : if (in_dbname)
1116 0 : ereport(FATAL,
1117 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1118 : errmsg("database \"%s\" does not exist", in_dbname),
1119 : errdetail("It seems to have just been dropped or renamed.")));
1120 : else
1121 0 : ereport(FATAL,
1122 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1123 : errmsg("database %u does not exist", dboid)));
1124 : }
1125 :
1126 18466 : strlcpy(dbname, NameStr(datform->datname), sizeof(dbname));
1127 :
1128 18466 : if (database_is_invalid_form(datform))
1129 : {
1130 6 : ereport(FATAL,
1131 : errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
1132 : errmsg("cannot connect to invalid database \"%s\"", dbname),
1133 : errhint("Use DROP DATABASE to drop invalid databases."));
1134 : }
1135 :
1136 18460 : MyDatabaseTableSpace = datform->dattablespace;
1137 18460 : MyDatabaseHasLoginEventTriggers = datform->dathasloginevt;
1138 : /* pass the database name back to the caller */
1139 18460 : if (out_dbname)
1140 1467 : strcpy(out_dbname, dbname);
1141 : }
1142 :
1143 : /*
1144 : * Now that we rechecked, we are certain to be connected to a database and
1145 : * thus can set MyDatabaseId.
1146 : *
1147 : * It is important that MyDatabaseId only be set once we are sure that the
1148 : * target database can no longer be concurrently dropped or renamed. For
1149 : * example, without this guarantee, pgstat_update_dbstats() could create
1150 : * entries for databases that were just dropped in the pgstat shutdown
1151 : * callback, which could confuse other code paths like the autovacuum
1152 : * scheduler.
1153 : */
1154 18517 : MyDatabaseId = dboid;
1155 :
1156 : /*
1157 : * Now we can mark our PGPROC entry with the database ID.
1158 : *
1159 : * We assume this is an atomic store so no lock is needed; though actually
1160 : * things would work fine even if it weren't atomic. Anyone searching the
1161 : * ProcArray for this database's ID should hold the database lock, so they
1162 : * would not be executing concurrently with this store. A process looking
1163 : * for another database's ID could in theory see a chance match if it read
1164 : * a partially-updated databaseId value; but as long as all such searches
1165 : * wait and retry, as in CountOtherDBBackends(), they will certainly see
1166 : * the correct value on their next try.
1167 : */
1168 18517 : MyProc->databaseId = MyDatabaseId;
1169 :
1170 : /*
1171 : * We established a catalog snapshot while reading pg_authid and/or
1172 : * pg_database; but until we have set up MyDatabaseId, we won't react to
1173 : * incoming sinval messages for unshared catalogs, so we won't realize it
1174 : * if the snapshot has been invalidated. Assume it's no good anymore.
1175 : */
1176 18517 : InvalidateCatalogSnapshot();
1177 :
1178 : /*
1179 : * Now we should be able to access the database directory safely. Verify
1180 : * it's there and looks reasonable.
1181 : */
1182 18517 : fullpath = GetDatabasePath(MyDatabaseId, MyDatabaseTableSpace);
1183 :
1184 18517 : if (!bootstrap)
1185 : {
1186 18460 : if (access(fullpath, F_OK) == -1)
1187 : {
1188 0 : if (errno == ENOENT)
1189 0 : ereport(FATAL,
1190 : (errcode(ERRCODE_UNDEFINED_DATABASE),
1191 : errmsg("database \"%s\" does not exist",
1192 : dbname),
1193 : errdetail("The database subdirectory \"%s\" is missing.",
1194 : fullpath)));
1195 : else
1196 0 : ereport(FATAL,
1197 : (errcode_for_file_access(),
1198 : errmsg("could not access directory \"%s\": %m",
1199 : fullpath)));
1200 : }
1201 :
1202 18460 : ValidatePgVersion(fullpath);
1203 : }
1204 :
1205 18517 : SetDatabasePath(fullpath);
1206 18517 : pfree(fullpath);
1207 :
1208 : /*
1209 : * It's now possible to do real access to the system catalogs.
1210 : *
1211 : * Load relcache entries for the system catalogs. This must create at
1212 : * least the minimum set of "nailed-in" cache entries.
1213 : */
1214 18517 : RelationCacheInitializePhase3();
1215 :
1216 : /* set up ACL framework (so CheckMyDatabase can check permissions) */
1217 18515 : initialize_acl();
1218 :
1219 : /*
1220 : * Re-read the pg_database row for our database, check permissions and set
1221 : * up database-specific GUC settings. We can't do this until all the
1222 : * database-access infrastructure is up. (Also, it wants to know if the
1223 : * user is a superuser, so the above stuff has to happen first.)
1224 : */
1225 18515 : if (!bootstrap)
1226 18458 : CheckMyDatabase(dbname, am_superuser,
1227 18458 : (flags & INIT_PG_OVERRIDE_ALLOW_CONNS) != 0);
1228 :
1229 : /*
1230 : * Now process any command-line switches and any additional GUC variable
1231 : * settings passed in the startup packet. We couldn't do this before
1232 : * because we didn't know if client is a superuser.
1233 : */
1234 18512 : if (MyProcPort != NULL)
1235 14239 : process_startup_options(MyProcPort, am_superuser);
1236 :
1237 : /* Process pg_db_role_setting options */
1238 18512 : process_settings(MyDatabaseId, GetSessionUserId());
1239 :
1240 : /* Apply PostAuthDelay as soon as we've read all options */
1241 18512 : if (PostAuthDelay > 0)
1242 0 : pg_usleep(PostAuthDelay * 1000000L);
1243 :
1244 : /*
1245 : * Initialize various default states that can't be set up until we've
1246 : * selected the active user and gotten the right GUC settings.
1247 : */
1248 :
1249 : /* set default namespace search path */
1250 18512 : InitializeSearchPath();
1251 :
1252 : /* initialize client encoding */
1253 18512 : InitializeClientEncoding();
1254 :
1255 : /* Initialize this backend's session state. */
1256 18512 : InitializeSession();
1257 :
1258 : /*
1259 : * If this is an interactive session, load any libraries that should be
1260 : * preloaded at backend start. Since those are determined by GUCs, this
1261 : * can't happen until GUC settings are complete, but we want it to happen
1262 : * during the initial transaction in case anything that requires database
1263 : * access needs to be done.
1264 : */
1265 18512 : if ((flags & INIT_PG_LOAD_SESSION_LIBS) != 0)
1266 13511 : process_session_preload_libraries();
1267 :
1268 : /* fill in the remainder of this entry in the PgBackendStatus array */
1269 18512 : if (!bootstrap)
1270 18455 : pgstat_bestart_final();
1271 :
1272 : /* close the transaction we started above */
1273 18512 : if (!bootstrap)
1274 18455 : CommitTransactionCommand();
1275 :
1276 : /* send any WARNINGs we've accumulated during initialization */
1277 18512 : EmitConnectionWarnings();
1278 : }
1279 :
1280 : /*
1281 : * Process any command-line switches and any additional GUC variable
1282 : * settings passed in the startup packet.
1283 : */
1284 : static void
1285 14741 : process_startup_options(Port *port, bool am_superuser)
1286 : {
1287 : GucContext gucctx;
1288 : ListCell *gucopts;
1289 :
1290 14741 : gucctx = am_superuser ? PGC_SU_BACKEND : PGC_BACKEND;
1291 :
1292 : /*
1293 : * First process any command-line switches that were included in the
1294 : * startup packet, if we are in a regular backend.
1295 : */
1296 14741 : if (port->cmdline_options != NULL)
1297 : {
1298 : /*
1299 : * The maximum possible number of commandline arguments that could
1300 : * come from port->cmdline_options is (strlen + 1) / 2; see
1301 : * pg_split_opts().
1302 : */
1303 : char **av;
1304 : int maxac;
1305 : int ac;
1306 :
1307 4373 : maxac = 2 + (strlen(port->cmdline_options) + 1) / 2;
1308 :
1309 4373 : av = palloc_array(char *, maxac);
1310 4373 : ac = 0;
1311 :
1312 4373 : av[ac++] = "postgres";
1313 :
1314 4373 : pg_split_opts(av, &ac, port->cmdline_options);
1315 :
1316 4373 : av[ac] = NULL;
1317 :
1318 : Assert(ac < maxac);
1319 :
1320 4373 : (void) process_postgres_switches(ac, av, gucctx, NULL);
1321 : }
1322 :
1323 : /*
1324 : * Process any additional GUC variable settings passed in startup packet.
1325 : * These are handled exactly like command-line variables.
1326 : */
1327 14741 : gucopts = list_head(port->guc_options);
1328 35672 : while (gucopts)
1329 : {
1330 : char *name;
1331 : char *value;
1332 :
1333 20931 : name = lfirst(gucopts);
1334 20931 : gucopts = lnext(port->guc_options, gucopts);
1335 :
1336 20931 : value = lfirst(gucopts);
1337 20931 : gucopts = lnext(port->guc_options, gucopts);
1338 :
1339 20931 : SetConfigOption(name, value, gucctx, PGC_S_CLIENT);
1340 : }
1341 14741 : }
1342 :
1343 : /*
1344 : * Load GUC settings from pg_db_role_setting.
1345 : *
1346 : * We try specific settings for the database/role combination, as well as
1347 : * general for this database and for this user.
1348 : */
1349 : static void
1350 18512 : process_settings(Oid databaseid, Oid roleid)
1351 : {
1352 : Relation relsetting;
1353 : Snapshot snapshot;
1354 :
1355 18512 : if (!IsUnderPostmaster)
1356 131 : return;
1357 :
1358 18381 : relsetting = table_open(DbRoleSettingRelationId, AccessShareLock);
1359 :
1360 : /* read all the settings under the same snapshot for efficiency */
1361 18381 : snapshot = RegisterSnapshot(GetCatalogSnapshot(DbRoleSettingRelationId));
1362 :
1363 : /* Later settings are ignored if set earlier. */
1364 18381 : ApplySetting(snapshot, databaseid, roleid, relsetting, PGC_S_DATABASE_USER);
1365 18381 : ApplySetting(snapshot, InvalidOid, roleid, relsetting, PGC_S_USER);
1366 18381 : ApplySetting(snapshot, databaseid, InvalidOid, relsetting, PGC_S_DATABASE);
1367 18381 : ApplySetting(snapshot, InvalidOid, InvalidOid, relsetting, PGC_S_GLOBAL);
1368 :
1369 18381 : UnregisterSnapshot(snapshot);
1370 18381 : table_close(relsetting, AccessShareLock);
1371 : }
1372 :
1373 : /*
1374 : * Backend-shutdown callback. Do cleanup that we want to be sure happens
1375 : * before all the supporting modules begin to nail their doors shut via
1376 : * their own callbacks.
1377 : *
1378 : * User-level cleanup, such as temp-relation removal and UNLISTEN, happens
1379 : * via separate callbacks that execute before this one. We don't combine the
1380 : * callbacks because we still want this one to happen if the user-level
1381 : * cleanup fails.
1382 : */
1383 : static void
1384 20135 : ShutdownPostgres(int code, Datum arg)
1385 : {
1386 : /* Make sure we've killed any active transaction */
1387 20135 : AbortOutOfAnyTransaction();
1388 :
1389 : /*
1390 : * User locks are not released by transaction end, so be sure to release
1391 : * them explicitly.
1392 : */
1393 20135 : LockReleaseAll(USER_LOCKMETHOD, true);
1394 20135 : }
1395 :
1396 :
1397 : /*
1398 : * STATEMENT_TIMEOUT handler: trigger a query-cancel interrupt.
1399 : */
1400 : static void
1401 6 : StatementTimeoutHandler(void)
1402 : {
1403 6 : int sig = SIGINT;
1404 :
1405 : /*
1406 : * During authentication the timeout is used to deal with
1407 : * authentication_timeout - we want to quit in response to such timeouts.
1408 : */
1409 6 : if (ClientAuthInProgress)
1410 0 : sig = SIGTERM;
1411 :
1412 : #ifdef HAVE_SETSID
1413 : /* try to signal whole process group */
1414 6 : kill(-MyProcPid, sig);
1415 : #endif
1416 6 : kill(MyProcPid, sig);
1417 6 : }
1418 :
1419 : /*
1420 : * LOCK_TIMEOUT handler: trigger a query-cancel interrupt.
1421 : */
1422 : static void
1423 4 : LockTimeoutHandler(void)
1424 : {
1425 : #ifdef HAVE_SETSID
1426 : /* try to signal whole process group */
1427 4 : kill(-MyProcPid, SIGINT);
1428 : #endif
1429 4 : kill(MyProcPid, SIGINT);
1430 4 : }
1431 :
1432 : static void
1433 1 : TransactionTimeoutHandler(void)
1434 : {
1435 1 : TransactionTimeoutPending = true;
1436 1 : InterruptPending = true;
1437 1 : SetLatch(MyLatch);
1438 1 : }
1439 :
1440 : static void
1441 1 : IdleInTransactionSessionTimeoutHandler(void)
1442 : {
1443 1 : IdleInTransactionSessionTimeoutPending = true;
1444 1 : InterruptPending = true;
1445 1 : SetLatch(MyLatch);
1446 1 : }
1447 :
1448 : static void
1449 1 : IdleSessionTimeoutHandler(void)
1450 : {
1451 1 : IdleSessionTimeoutPending = true;
1452 1 : InterruptPending = true;
1453 1 : SetLatch(MyLatch);
1454 1 : }
1455 :
1456 : static void
1457 14 : IdleStatsUpdateTimeoutHandler(void)
1458 : {
1459 14 : IdleStatsUpdateTimeoutPending = true;
1460 14 : InterruptPending = true;
1461 14 : SetLatch(MyLatch);
1462 14 : }
1463 :
1464 : static void
1465 0 : ClientCheckTimeoutHandler(void)
1466 : {
1467 0 : CheckClientConnectionPending = true;
1468 0 : InterruptPending = true;
1469 0 : SetLatch(MyLatch);
1470 0 : }
1471 :
1472 : /*
1473 : * Returns true if at least one role is defined in this database cluster.
1474 : */
1475 : static bool
1476 76 : ThereIsAtLeastOneRole(void)
1477 : {
1478 : Relation pg_authid_rel;
1479 : TableScanDesc scan;
1480 : bool result;
1481 :
1482 76 : pg_authid_rel = table_open(AuthIdRelationId, AccessShareLock);
1483 :
1484 76 : scan = table_beginscan_catalog(pg_authid_rel, 0, NULL);
1485 76 : result = (heap_getnext(scan, ForwardScanDirection) != NULL);
1486 :
1487 76 : table_endscan(scan);
1488 76 : table_close(pg_authid_rel, AccessShareLock);
1489 :
1490 76 : return result;
1491 : }
1492 :
1493 : /*
1494 : * Stores a warning message to be sent later via EmitConnectionWarnings().
1495 : * Both msg and detail must be non-NULL.
1496 : *
1497 : * NB: Caller should ensure the strings are allocated in a long-lived context
1498 : * like TopMemoryContext.
1499 : */
1500 : void
1501 2 : StoreConnectionWarning(char *msg, char *detail)
1502 : {
1503 : MemoryContext oldcontext;
1504 :
1505 : Assert(msg);
1506 : Assert(detail);
1507 :
1508 2 : if (ConnectionWarningsEmitted)
1509 0 : elog(ERROR, "StoreConnectionWarning() called after EmitConnectionWarnings()");
1510 :
1511 2 : oldcontext = MemoryContextSwitchTo(TopMemoryContext);
1512 :
1513 2 : ConnectionWarningMessages = lappend(ConnectionWarningMessages, msg);
1514 2 : ConnectionWarningDetails = lappend(ConnectionWarningDetails, detail);
1515 :
1516 2 : MemoryContextSwitchTo(oldcontext);
1517 2 : }
1518 :
1519 : /*
1520 : * Sends the warning messages saved via StoreConnectionWarning() and frees the
1521 : * strings and lists.
1522 : *
1523 : * NB: This can only be called once per backend.
1524 : */
1525 : static void
1526 19014 : EmitConnectionWarnings(void)
1527 : {
1528 : ListCell *lc_msg;
1529 : ListCell *lc_detail;
1530 :
1531 19014 : if (ConnectionWarningsEmitted)
1532 0 : elog(ERROR, "EmitConnectionWarnings() called more than once");
1533 : else
1534 19014 : ConnectionWarningsEmitted = true;
1535 :
1536 19016 : forboth(lc_msg, ConnectionWarningMessages,
1537 : lc_detail, ConnectionWarningDetails)
1538 : {
1539 2 : ereport(WARNING,
1540 : (errmsg("%s", (char *) lfirst(lc_msg)),
1541 : errdetail("%s", (char *) lfirst(lc_detail))));
1542 : }
1543 :
1544 19014 : list_free_deep(ConnectionWarningMessages);
1545 19014 : list_free_deep(ConnectionWarningDetails);
1546 19014 : }
|