PostgreSQL Source Code git master
postinit.c
Go to the documentation of this file.
1/*-------------------------------------------------------------------------
2 *
3 * postinit.c
4 * postgres initialization utilities
5 *
6 * Portions Copyright (c) 1996-2025, PostgreSQL Global Development Group
7 * Portions Copyright (c) 1994, Regents of the University of California
8 *
9 *
10 * IDENTIFICATION
11 * src/backend/utils/init/postinit.c
12 *
13 *
14 *-------------------------------------------------------------------------
15 */
16#include "postgres.h"
17
18#include <ctype.h>
19#include <fcntl.h>
20#include <unistd.h>
21
22#include "access/genam.h"
23#include "access/heapam.h"
24#include "access/htup_details.h"
25#include "access/session.h"
26#include "access/tableam.h"
27#include "access/xact.h"
28#include "access/xlog.h"
29#include "access/xloginsert.h"
30#include "catalog/namespace.h"
31#include "catalog/pg_authid.h"
33#include "catalog/pg_database.h"
36#include "libpq/auth.h"
37#include "libpq/libpq-be.h"
38#include "mb/pg_wchar.h"
39#include "miscadmin.h"
40#include "pgstat.h"
43#include "replication/slot.h"
46#include "storage/aio_subsys.h"
47#include "storage/bufmgr.h"
48#include "storage/fd.h"
49#include "storage/ipc.h"
50#include "storage/lmgr.h"
51#include "storage/proc.h"
52#include "storage/procarray.h"
53#include "storage/procnumber.h"
54#include "storage/procsignal.h"
55#include "storage/sinvaladt.h"
56#include "storage/smgr.h"
57#include "storage/sync.h"
59#include "tcop/tcopprot.h"
60#include "utils/acl.h"
61#include "utils/builtins.h"
62#include "utils/fmgroids.h"
63#include "utils/guc_hooks.h"
65#include "utils/memutils.h"
66#include "utils/pg_locale.h"
67#include "utils/portal.h"
68#include "utils/ps_status.h"
69#include "utils/snapmgr.h"
70#include "utils/syscache.h"
71#include "utils/timeout.h"
72
73static HeapTuple GetDatabaseTuple(const char *dbname);
75static void PerformAuthentication(Port *port);
76static void CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections);
77static void ShutdownPostgres(int code, Datum arg);
78static void StatementTimeoutHandler(void);
79static void LockTimeoutHandler(void);
81static void TransactionTimeoutHandler(void);
82static void IdleSessionTimeoutHandler(void);
83static void IdleStatsUpdateTimeoutHandler(void);
84static void ClientCheckTimeoutHandler(void);
85static bool ThereIsAtLeastOneRole(void);
86static void process_startup_options(Port *port, bool am_superuser);
87static void process_settings(Oid databaseid, Oid roleid);
88
89
90/*** InitPostgres support ***/
91
92
93/*
94 * GetDatabaseTuple -- fetch the pg_database row for a database
95 *
96 * This is used during backend startup when we don't yet have any access to
97 * system catalogs in general. In the worst case, we can seqscan pg_database
98 * using nothing but the hard-wired descriptor that relcache.c creates for
99 * pg_database. In more typical cases, relcache.c was able to load
100 * descriptors for both pg_database and its indexes from the shared relcache
101 * cache file, and so we can do an indexscan. criticalSharedRelcachesBuilt
102 * tells whether we got the cached descriptors.
103 */
104static HeapTuple
106{
107 HeapTuple tuple;
108 Relation relation;
109 SysScanDesc scan;
110 ScanKeyData key[1];
111
112 /*
113 * form a scan key
114 */
115 ScanKeyInit(&key[0],
116 Anum_pg_database_datname,
117 BTEqualStrategyNumber, F_NAMEEQ,
119
120 /*
121 * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
122 * built the critical shared relcache entries (i.e., we're starting up
123 * without a shared relcache cache file).
124 */
125 relation = table_open(DatabaseRelationId, AccessShareLock);
126 scan = systable_beginscan(relation, DatabaseNameIndexId,
128 NULL,
129 1, key);
130
131 tuple = systable_getnext(scan);
132
133 /* Must copy tuple before releasing buffer */
134 if (HeapTupleIsValid(tuple))
135 tuple = heap_copytuple(tuple);
136
137 /* all done */
138 systable_endscan(scan);
139 table_close(relation, AccessShareLock);
140
141 return tuple;
142}
143
144/*
145 * GetDatabaseTupleByOid -- as above, but search by database OID
146 */
147static HeapTuple
149{
150 HeapTuple tuple;
151 Relation relation;
152 SysScanDesc scan;
153 ScanKeyData key[1];
154
155 /*
156 * form a scan key
157 */
158 ScanKeyInit(&key[0],
159 Anum_pg_database_oid,
160 BTEqualStrategyNumber, F_OIDEQ,
161 ObjectIdGetDatum(dboid));
162
163 /*
164 * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
165 * built the critical shared relcache entries (i.e., we're starting up
166 * without a shared relcache cache file).
167 */
168 relation = table_open(DatabaseRelationId, AccessShareLock);
169 scan = systable_beginscan(relation, DatabaseOidIndexId,
171 NULL,
172 1, key);
173
174 tuple = systable_getnext(scan);
175
176 /* Must copy tuple before releasing buffer */
177 if (HeapTupleIsValid(tuple))
178 tuple = heap_copytuple(tuple);
179
180 /* all done */
181 systable_endscan(scan);
182 table_close(relation, AccessShareLock);
183
184 return tuple;
185}
186
187
188/*
189 * PerformAuthentication -- authenticate a remote client
190 *
191 * returns: nothing. Will not return at all if there's any failure.
192 */
193static void
195{
196 /* This should be set already, but let's make sure */
197 ClientAuthInProgress = true; /* limit visibility of log messages */
198
199 /*
200 * In EXEC_BACKEND case, we didn't inherit the contents of pg_hba.conf
201 * etcetera from the postmaster, and have to load them ourselves.
202 *
203 * FIXME: [fork/exec] Ugh. Is there a way around this overhead?
204 */
205#ifdef EXEC_BACKEND
206
207 /*
208 * load_hba() and load_ident() want to work within the PostmasterContext,
209 * so create that if it doesn't exist (which it won't). We'll delete it
210 * again later, in PostgresMain.
211 */
212 if (PostmasterContext == NULL)
214 "Postmaster",
216
217 if (!load_hba())
218 {
219 /*
220 * It makes no sense to continue if we fail to load the HBA file,
221 * since there is no way to connect to the database in this case.
222 */
224 /* translator: %s is a configuration file */
225 (errmsg("could not load %s", HbaFileName)));
226 }
227
228 if (!load_ident())
229 {
230 /*
231 * It is ok to continue if we fail to load the IDENT file, although it
232 * means that you cannot log in using any of the authentication
233 * methods that need a user name mapping. load_ident() already logged
234 * the details of error to the log.
235 */
236 }
237#endif
238
239 /* Capture authentication start time for logging */
241
242 /*
243 * Set up a timeout in case a buggy or malicious client fails to respond
244 * during authentication. Since we're inside a transaction and might do
245 * database access, we have to use the statement_timeout infrastructure.
246 */
248
249 /*
250 * Now perform authentication exchange.
251 */
252 set_ps_display("authentication");
253 ClientAuthentication(port); /* might not return, if failure */
254
255 /*
256 * Done with authentication. Disable the timeout, and log if needed.
257 */
259
260 /* Capture authentication end time for logging */
262
264 {
265 StringInfoData logmsg;
266
267 initStringInfo(&logmsg);
268 if (am_walsender)
269 appendStringInfo(&logmsg, _("replication connection authorized: user=%s"),
270 port->user_name);
271 else
272 appendStringInfo(&logmsg, _("connection authorized: user=%s"),
273 port->user_name);
274 if (!am_walsender)
275 appendStringInfo(&logmsg, _(" database=%s"), port->database_name);
276
277 if (port->application_name != NULL)
278 appendStringInfo(&logmsg, _(" application_name=%s"),
279 port->application_name);
280
281#ifdef USE_SSL
282 if (port->ssl_in_use)
283 appendStringInfo(&logmsg, _(" SSL enabled (protocol=%s, cipher=%s, bits=%d)"),
287#endif
288#ifdef ENABLE_GSS
289 if (port->gss)
290 {
291 const char *princ = be_gssapi_get_princ(port);
292
293 if (princ)
294 appendStringInfo(&logmsg,
295 _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s, principal=%s)"),
296 be_gssapi_get_auth(port) ? _("yes") : _("no"),
297 be_gssapi_get_enc(port) ? _("yes") : _("no"),
298 be_gssapi_get_delegation(port) ? _("yes") : _("no"),
299 princ);
300 else
301 appendStringInfo(&logmsg,
302 _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s)"),
303 be_gssapi_get_auth(port) ? _("yes") : _("no"),
304 be_gssapi_get_enc(port) ? _("yes") : _("no"),
305 be_gssapi_get_delegation(port) ? _("yes") : _("no"));
306 }
307#endif
308
309 ereport(LOG, errmsg_internal("%s", logmsg.data));
310 pfree(logmsg.data);
311 }
312
313 set_ps_display("startup");
314
315 ClientAuthInProgress = false; /* client_min_messages is active now */
316}
317
318
319/*
320 * CheckMyDatabase -- fetch information from the pg_database entry for our DB
321 */
322static void
323CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections)
324{
325 HeapTuple tup;
326 Form_pg_database dbform;
327 Datum datum;
328 bool isnull;
329 char *collate;
330 char *ctype;
331
332 /* Fetch our pg_database row normally, via syscache */
333 tup = SearchSysCache1(DATABASEOID, ObjectIdGetDatum(MyDatabaseId));
334 if (!HeapTupleIsValid(tup))
335 elog(ERROR, "cache lookup failed for database %u", MyDatabaseId);
336 dbform = (Form_pg_database) GETSTRUCT(tup);
337
338 /* This recheck is strictly paranoia */
339 if (strcmp(name, NameStr(dbform->datname)) != 0)
341 (errcode(ERRCODE_UNDEFINED_DATABASE),
342 errmsg("database \"%s\" has disappeared from pg_database",
343 name),
344 errdetail("Database OID %u now seems to belong to \"%s\".",
345 MyDatabaseId, NameStr(dbform->datname))));
346
347 /*
348 * Check permissions to connect to the database.
349 *
350 * These checks are not enforced when in standalone mode, so that there is
351 * a way to recover from disabling all access to all databases, for
352 * example "UPDATE pg_database SET datallowconn = false;".
353 */
355 {
356 /*
357 * Check that the database is currently allowing connections.
358 * (Background processes can override this test and the next one by
359 * setting override_allow_connections.)
360 */
361 if (!dbform->datallowconn && !override_allow_connections)
363 (errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
364 errmsg("database \"%s\" is not currently accepting connections",
365 name)));
366
367 /*
368 * Check privilege to connect to the database. (The am_superuser test
369 * is redundant, but since we have the flag, might as well check it
370 * and save a few cycles.)
371 */
372 if (!am_superuser && !override_allow_connections &&
373 object_aclcheck(DatabaseRelationId, MyDatabaseId, GetUserId(),
376 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
377 errmsg("permission denied for database \"%s\"", name),
378 errdetail("User does not have CONNECT privilege.")));
379
380 /*
381 * Check connection limit for this database. We enforce the limit
382 * only for regular backends, since other process types have their own
383 * PGPROC pools.
384 *
385 * There is a race condition here --- we create our PGPROC before
386 * checking for other PGPROCs. If two backends did this at about the
387 * same time, they might both think they were over the limit, while
388 * ideally one should succeed and one fail. Getting that to work
389 * exactly seems more trouble than it is worth, however; instead we
390 * just document that the connection limit is approximate.
391 */
392 if (dbform->datconnlimit >= 0 &&
394 !am_superuser &&
395 CountDBConnections(MyDatabaseId) > dbform->datconnlimit)
397 (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
398 errmsg("too many connections for database \"%s\"",
399 name)));
400 }
401
402 /*
403 * OK, we're golden. Next to-do item is to save the encoding info out of
404 * the pg_database tuple.
405 */
406 SetDatabaseEncoding(dbform->encoding);
407 /* Record it as a GUC internal option, too */
408 SetConfigOption("server_encoding", GetDatabaseEncodingName(),
410 /* If we have no other source of client_encoding, use server encoding */
411 SetConfigOption("client_encoding", GetDatabaseEncodingName(),
413
414 /* assign locale variables */
415 datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datcollate);
416 collate = TextDatumGetCString(datum);
417 datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datctype);
418 ctype = TextDatumGetCString(datum);
419
420 if (pg_perm_setlocale(LC_COLLATE, collate) == NULL)
422 (errmsg("database locale is incompatible with operating system"),
423 errdetail("The database was initialized with LC_COLLATE \"%s\", "
424 " which is not recognized by setlocale().", collate),
425 errhint("Recreate the database with another locale or install the missing locale.")));
426
427 if (pg_perm_setlocale(LC_CTYPE, ctype) == NULL)
429 (errmsg("database locale is incompatible with operating system"),
430 errdetail("The database was initialized with LC_CTYPE \"%s\", "
431 " which is not recognized by setlocale().", ctype),
432 errhint("Recreate the database with another locale or install the missing locale.")));
433
434 if (strcmp(ctype, "C") == 0 ||
435 strcmp(ctype, "POSIX") == 0)
436 database_ctype_is_c = true;
437
439
440 /*
441 * Check collation version. See similar code in
442 * pg_newlocale_from_collation(). Note that here we warn instead of error
443 * in any case, so that we don't prevent connecting.
444 */
445 datum = SysCacheGetAttr(DATABASEOID, tup, Anum_pg_database_datcollversion,
446 &isnull);
447 if (!isnull)
448 {
449 char *actual_versionstr;
450 char *collversionstr;
451 char *locale;
452
453 collversionstr = TextDatumGetCString(datum);
454
455 if (dbform->datlocprovider == COLLPROVIDER_LIBC)
456 locale = collate;
457 else
458 {
459 datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datlocale);
461 }
462
463 actual_versionstr = get_collation_actual_version(dbform->datlocprovider, locale);
464 if (!actual_versionstr)
465 /* should not happen */
467 "database \"%s\" has no actual collation version, but a version was recorded",
468 name);
469 else if (strcmp(actual_versionstr, collversionstr) != 0)
471 (errmsg("database \"%s\" has a collation version mismatch",
472 name),
473 errdetail("The database was created using collation version %s, "
474 "but the operating system provides version %s.",
475 collversionstr, actual_versionstr),
476 errhint("Rebuild all objects in this database that use the default collation and run "
477 "ALTER DATABASE %s REFRESH COLLATION VERSION, "
478 "or build PostgreSQL with the right library version.",
480 }
481
482 ReleaseSysCache(tup);
483}
484
485
486/*
487 * pg_split_opts -- split a string of options and append it to an argv array
488 *
489 * The caller is responsible for ensuring the argv array is large enough. The
490 * maximum possible number of arguments added by this routine is
491 * (strlen(optstr) + 1) / 2.
492 *
493 * Because some option values can contain spaces we allow escaping using
494 * backslashes, with \\ representing a literal backslash.
495 */
496void
497pg_split_opts(char **argv, int *argcp, const char *optstr)
498{
500
501 initStringInfo(&s);
502
503 while (*optstr)
504 {
505 bool last_was_escape = false;
506
507 resetStringInfo(&s);
508
509 /* skip over leading space */
510 while (isspace((unsigned char) *optstr))
511 optstr++;
512
513 if (*optstr == '\0')
514 break;
515
516 /*
517 * Parse a single option, stopping at the first space, unless it's
518 * escaped.
519 */
520 while (*optstr)
521 {
522 if (isspace((unsigned char) *optstr) && !last_was_escape)
523 break;
524
525 if (!last_was_escape && *optstr == '\\')
526 last_was_escape = true;
527 else
528 {
529 last_was_escape = false;
530 appendStringInfoChar(&s, *optstr);
531 }
532
533 optstr++;
534 }
535
536 /* now store the option in the next argv[] position */
537 argv[(*argcp)++] = pstrdup(s.data);
538 }
539
540 pfree(s.data);
541}
542
543/*
544 * Initialize MaxBackends value from config options.
545 *
546 * This must be called after modules have had the chance to alter GUCs in
547 * shared_preload_libraries and before shared memory size is determined.
548 *
549 * Note that in EXEC_BACKEND environment, the value is passed down from
550 * postmaster to subprocesses via BackendParameters in SubPostmasterMain; only
551 * postmaster itself and processes not under postmaster control should call
552 * this.
553 */
554void
556{
557 Assert(MaxBackends == 0);
558
559 /* Note that this does not include "auxiliary" processes */
562
565 (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
566 errmsg("too many server processes configured"),
567 errdetail("\"max_connections\" (%d) plus \"autovacuum_worker_slots\" (%d) plus \"max_worker_processes\" (%d) plus \"max_wal_senders\" (%d) must be less than %d.",
571}
572
573/*
574 * Initialize the number of fast-path lock slots in PGPROC.
575 *
576 * This must be called after modules have had the chance to alter GUCs in
577 * shared_preload_libraries and before shared memory size is determined.
578 */
579void
581{
582 /* Should be initialized only once. */
584
585 /*
586 * Based on the max_locks_per_transaction GUC, as that's a good indicator
587 * of the expected number of locks, figure out the value for
588 * FastPathLockGroupsPerBackend. This must be a power-of-two. We cap the
589 * value at FP_LOCK_GROUPS_PER_BACKEND_MAX and insist the value is at
590 * least 1.
591 *
592 * The default max_locks_per_transaction = 64 means 4 groups by default.
593 */
597
598 /* Validate we did get a power-of-two */
601}
602
603/*
604 * Early initialization of a backend (either standalone or under postmaster).
605 * This happens even before InitPostgres.
606 *
607 * This is separate from InitPostgres because it is also called by auxiliary
608 * processes, such as the background writer process, which may not call
609 * InitPostgres at all.
610 */
611void
613{
614 Assert(MyProc != NULL);
615
616 /*
617 * Initialize our input/output/debugging file descriptors.
618 */
620
621 /*
622 * Initialize file access. Done early so other subsystems can access
623 * files.
624 */
626
627 /*
628 * Initialize statistics reporting. This needs to happen early to ensure
629 * that pgstat's shutdown callback runs after the shutdown callbacks of
630 * all subsystems that can produce stats (like e.g. transaction commits
631 * can).
632 */
634
635 /*
636 * Initialize AIO before infrastructure that might need to actually
637 * execute AIO.
638 */
640
641 /* Do local initialization of storage and buffer managers */
642 InitSync();
643 smgrinit();
645
646 /*
647 * Initialize temporary file access after pgstat, so that the temporary
648 * file shutdown hook can report temporary file statistics.
649 */
651
652 /*
653 * Initialize local buffers for WAL record construction, in case we ever
654 * try to insert XLOG.
655 */
657
658 /* Initialize lock manager's local structs */
660
661 /*
662 * Initialize replication slots after pgstat. The exit hook might need to
663 * drop ephemeral slots, which in turn triggers stats reporting.
664 */
666}
667
668
669/* --------------------------------
670 * InitPostgres
671 * Initialize POSTGRES.
672 *
673 * Parameters:
674 * in_dbname, dboid: specify database to connect to, as described below
675 * username, useroid: specify role to connect as, as described below
676 * flags:
677 * - INIT_PG_LOAD_SESSION_LIBS to honor [session|local]_preload_libraries.
678 * - INIT_PG_OVERRIDE_ALLOW_CONNS to connect despite !datallowconn.
679 * - INIT_PG_OVERRIDE_ROLE_LOGIN to connect despite !rolcanlogin.
680 * out_dbname: optional output parameter, see below; pass NULL if not used
681 *
682 * The database can be specified by name, using the in_dbname parameter, or by
683 * OID, using the dboid parameter. Specify NULL or InvalidOid respectively
684 * for the unused parameter. If dboid is provided, the actual database
685 * name can be returned to the caller in out_dbname. If out_dbname isn't
686 * NULL, it must point to a buffer of size NAMEDATALEN.
687 *
688 * Similarly, the role can be passed by name, using the username parameter,
689 * or by OID using the useroid parameter.
690 *
691 * In bootstrap mode the database and username parameters are NULL/InvalidOid.
692 * The autovacuum launcher process doesn't specify these parameters either,
693 * because it only goes far enough to be able to read pg_database; it doesn't
694 * connect to any particular database. An autovacuum worker specifies a
695 * database but not a username; conversely, a physical walsender specifies
696 * username but not database.
697 *
698 * By convention, INIT_PG_LOAD_SESSION_LIBS should be passed in "flags" in
699 * "interactive" sessions (including standalone backends), but not in
700 * background processes such as autovacuum. Note in particular that it
701 * shouldn't be true in parallel worker processes; those have another
702 * mechanism for replicating their leader's set of loaded libraries.
703 *
704 * We expect that InitProcess() was already called, so we already have a
705 * PGPROC struct ... but it's not completely filled in yet.
706 *
707 * Note:
708 * Be very careful with the order of calls in the InitPostgres function.
709 * --------------------------------
710 */
711void
712InitPostgres(const char *in_dbname, Oid dboid,
713 const char *username, Oid useroid,
714 bits32 flags,
715 char *out_dbname)
716{
717 bool bootstrap = IsBootstrapProcessingMode();
718 bool am_superuser;
719 char *fullpath;
720 char dbname[NAMEDATALEN];
721 int nfree = 0;
722
723 elog(DEBUG3, "InitPostgres");
724
725 /*
726 * Add my PGPROC struct to the ProcArray.
727 *
728 * Once I have done this, I am visible to other backends!
729 */
731
732 /* Initialize status reporting */
734
735 /*
736 * And initialize an entry in the PgBackendStatus array. That way, if
737 * LWLocks or third-party authentication should happen to hang, it is
738 * possible to retrieve some information about what is going on.
739 */
740 if (!bootstrap)
741 {
743 INJECTION_POINT("init-pre-auth", NULL);
744 }
745
746 /*
747 * Initialize my entry in the shared-invalidation manager's array of
748 * per-backend data.
749 */
751
753
754 /*
755 * Also set up timeout handlers needed for backend operation. We need
756 * these in every case except bootstrap.
757 */
758 if (!bootstrap)
759 {
770 }
771
772 /*
773 * If this is either a bootstrap process or a standalone backend, start up
774 * the XLOG machinery, and register to have it closed down at exit. In
775 * other cases, the startup process is responsible for starting up the
776 * XLOG machinery, and the checkpointer for closing it down.
777 */
779 {
780 /*
781 * We don't yet have an aux-process resource owner, but StartupXLOG
782 * and ShutdownXLOG will need one. Hence, create said resource owner
783 * (and register a callback to clean it up after ShutdownXLOG runs).
784 */
786
787 StartupXLOG();
788 /* Release (and warn about) any buffer pins leaked in StartupXLOG */
790 /* Reset CurrentResourceOwner to nothing for the moment */
792
793 /*
794 * Use before_shmem_exit() so that ShutdownXLOG() can rely on DSM
795 * segments etc to work (which in turn is required for pgstats).
796 */
799 }
800
801 /*
802 * Initialize the relation cache and the system catalog caches. Note that
803 * no catalog access happens here; we only set up the hashtable structure.
804 * We must do this before starting a transaction because transaction abort
805 * would try to touch these hashtables.
806 */
810
811 /* Initialize portal manager */
813
814 /*
815 * Load relcache entries for the shared system catalogs. This must create
816 * at least entries for pg_database and catalogs used for authentication.
817 */
819
820 /*
821 * Set up process-exit callback to do pre-shutdown cleanup. This is the
822 * one of the first before_shmem_exit callbacks we register; thus, this
823 * will be one the last things we do before low-level modules like the
824 * buffer manager begin to close down. We need to have this in place
825 * before we begin our first transaction --- if we fail during the
826 * initialization transaction, as is entirely possible, we need the
827 * AbortTransaction call to clean up.
828 */
830
831 /* The autovacuum launcher is done here */
833 {
834 /* fill in the remainder of this entry in the PgBackendStatus array */
836
837 return;
838 }
839
840 /*
841 * Start a new transaction here before first access to db.
842 */
843 if (!bootstrap)
844 {
845 /* statement_timestamp must be set for timeouts to work correctly */
848
849 /*
850 * transaction_isolation will have been set to the default by the
851 * above. If the default is "serializable", and we are in hot
852 * standby, we will fail if we don't change it to something lower.
853 * Fortunately, "read committed" is plenty good enough.
854 */
856 }
857
858 /*
859 * Perform client authentication if necessary, then figure out our
860 * postgres user ID, and see if we are a superuser.
861 *
862 * In standalone mode, autovacuum worker processes and slot sync worker
863 * process, we use a fixed ID, otherwise we figure it out from the
864 * authenticated user name.
865 */
867 {
869 am_superuser = true;
870 }
871 else if (!IsUnderPostmaster)
872 {
874 am_superuser = true;
877 (errcode(ERRCODE_UNDEFINED_OBJECT),
878 errmsg("no roles are defined in this database system"),
879 errhint("You should immediately run CREATE USER \"%s\" SUPERUSER;.",
880 username != NULL ? username : "postgres")));
881 }
882 else if (AmBackgroundWorkerProcess())
883 {
884 if (username == NULL && !OidIsValid(useroid))
885 {
887 am_superuser = true;
888 }
889 else
890 {
892 (flags & INIT_PG_OVERRIDE_ROLE_LOGIN) != 0);
893 am_superuser = superuser();
894 }
895 }
896 else
897 {
898 /* normal multiuser case */
899 Assert(MyProcPort != NULL);
901 InitializeSessionUserId(username, useroid, false);
902 /* ensure that auth_method is actually valid, aka authn_id is not NULL */
906 am_superuser = superuser();
907 }
908
909 /* Report any SSL/GSS details for the session. */
910 if (MyProcPort != NULL)
911 {
912 Assert(!bootstrap);
913
915 }
916
917 /*
918 * Binary upgrades only allowed super-user connections
919 */
920 if (IsBinaryUpgrade && !am_superuser)
921 {
923 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
924 errmsg("must be superuser to connect in binary upgrade mode")));
925 }
926
927 /*
928 * The last few regular connection slots are reserved for superusers and
929 * roles with privileges of pg_use_reserved_connections. We do not apply
930 * these limits to background processes, since they all have their own
931 * pools of PGPROC slots.
932 *
933 * Note: At this point, the new backend has already claimed a proc struct,
934 * so we must check whether the number of free slots is strictly less than
935 * the reserved connection limits.
936 */
937 if (AmRegularBackendProcess() && !am_superuser &&
940 {
943 (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
944 errmsg("remaining connection slots are reserved for roles with the %s attribute",
945 "SUPERUSER")));
946
947 if (!has_privs_of_role(GetUserId(), ROLE_PG_USE_RESERVED_CONNECTIONS))
949 (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
950 errmsg("remaining connection slots are reserved for roles with privileges of the \"%s\" role",
951 "pg_use_reserved_connections")));
952 }
953
954 /* Check replication permissions needed for walsender processes. */
955 if (am_walsender)
956 {
957 Assert(!bootstrap);
958
961 (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
962 errmsg("permission denied to start WAL sender"),
963 errdetail("Only roles with the %s attribute may start a WAL sender process.",
964 "REPLICATION")));
965 }
966
967 /*
968 * If this is a plain walsender only supporting physical replication, we
969 * don't want to connect to any particular database. Just finish the
970 * backend startup by processing any options from the startup packet, and
971 * we're done.
972 */
974 {
975 /* process any options passed in the startup packet */
976 if (MyProcPort != NULL)
977 process_startup_options(MyProcPort, am_superuser);
978
979 /* Apply PostAuthDelay as soon as we've read all options */
980 if (PostAuthDelay > 0)
981 pg_usleep(PostAuthDelay * 1000000L);
982
983 /* initialize client encoding */
985
986 /* fill in the remainder of this entry in the PgBackendStatus array */
988
989 /* close the transaction we started above */
991
992 return;
993 }
994
995 /*
996 * Set up the global variables holding database id and default tablespace.
997 * But note we won't actually try to touch the database just yet.
998 *
999 * We take a shortcut in the bootstrap case, otherwise we have to look up
1000 * the db's entry in pg_database.
1001 */
1002 if (bootstrap)
1003 {
1004 dboid = Template1DbOid;
1005 MyDatabaseTableSpace = DEFAULTTABLESPACE_OID;
1006 }
1007 else if (in_dbname != NULL)
1008 {
1009 HeapTuple tuple;
1010 Form_pg_database dbform;
1011
1012 tuple = GetDatabaseTuple(in_dbname);
1013 if (!HeapTupleIsValid(tuple))
1014 ereport(FATAL,
1015 (errcode(ERRCODE_UNDEFINED_DATABASE),
1016 errmsg("database \"%s\" does not exist", in_dbname)));
1017 dbform = (Form_pg_database) GETSTRUCT(tuple);
1018 dboid = dbform->oid;
1019 }
1020 else if (!OidIsValid(dboid))
1021 {
1022 /*
1023 * If this is a background worker not bound to any particular
1024 * database, we're done now. Everything that follows only makes sense
1025 * if we are bound to a specific database. We do need to close the
1026 * transaction we started before returning.
1027 */
1028 if (!bootstrap)
1029 {
1032 }
1033 return;
1034 }
1035
1036 /*
1037 * Now, take a writer's lock on the database we are trying to connect to.
1038 * If there is a concurrently running DROP DATABASE on that database, this
1039 * will block us until it finishes (and has committed its update of
1040 * pg_database).
1041 *
1042 * Note that the lock is not held long, only until the end of this startup
1043 * transaction. This is OK since we will advertise our use of the
1044 * database in the ProcArray before dropping the lock (in fact, that's the
1045 * next thing to do). Anyone trying a DROP DATABASE after this point will
1046 * see us in the array once they have the lock. Ordering is important for
1047 * this because we don't want to advertise ourselves as being in this
1048 * database until we have the lock; otherwise we create what amounts to a
1049 * deadlock with CountOtherDBBackends().
1050 *
1051 * Note: use of RowExclusiveLock here is reasonable because we envision
1052 * our session as being a concurrent writer of the database. If we had a
1053 * way of declaring a session as being guaranteed-read-only, we could use
1054 * AccessShareLock for such sessions and thereby not conflict against
1055 * CREATE DATABASE.
1056 */
1057 if (!bootstrap)
1058 LockSharedObject(DatabaseRelationId, dboid, 0, RowExclusiveLock);
1059
1060 /*
1061 * Recheck pg_database to make sure the target database hasn't gone away.
1062 * If there was a concurrent DROP DATABASE, this ensures we will die
1063 * cleanly without creating a mess.
1064 */
1065 if (!bootstrap)
1066 {
1067 HeapTuple tuple;
1068 Form_pg_database datform;
1069
1070 tuple = GetDatabaseTupleByOid(dboid);
1071 if (HeapTupleIsValid(tuple))
1072 datform = (Form_pg_database) GETSTRUCT(tuple);
1073
1074 if (!HeapTupleIsValid(tuple) ||
1075 (in_dbname && namestrcmp(&datform->datname, in_dbname)))
1076 {
1077 if (in_dbname)
1078 ereport(FATAL,
1079 (errcode(ERRCODE_UNDEFINED_DATABASE),
1080 errmsg("database \"%s\" does not exist", in_dbname),
1081 errdetail("It seems to have just been dropped or renamed.")));
1082 else
1083 ereport(FATAL,
1084 (errcode(ERRCODE_UNDEFINED_DATABASE),
1085 errmsg("database %u does not exist", dboid)));
1086 }
1087
1088 strlcpy(dbname, NameStr(datform->datname), sizeof(dbname));
1089
1090 if (database_is_invalid_form(datform))
1091 {
1092 ereport(FATAL,
1093 errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
1094 errmsg("cannot connect to invalid database \"%s\"", dbname),
1095 errhint("Use DROP DATABASE to drop invalid databases."));
1096 }
1097
1098 MyDatabaseTableSpace = datform->dattablespace;
1099 MyDatabaseHasLoginEventTriggers = datform->dathasloginevt;
1100 /* pass the database name back to the caller */
1101 if (out_dbname)
1102 strcpy(out_dbname, dbname);
1103 }
1104
1105 /*
1106 * Now that we rechecked, we are certain to be connected to a database and
1107 * thus can set MyDatabaseId.
1108 *
1109 * It is important that MyDatabaseId only be set once we are sure that the
1110 * target database can no longer be concurrently dropped or renamed. For
1111 * example, without this guarantee, pgstat_update_dbstats() could create
1112 * entries for databases that were just dropped in the pgstat shutdown
1113 * callback, which could confuse other code paths like the autovacuum
1114 * scheduler.
1115 */
1116 MyDatabaseId = dboid;
1117
1118 /*
1119 * Now we can mark our PGPROC entry with the database ID.
1120 *
1121 * We assume this is an atomic store so no lock is needed; though actually
1122 * things would work fine even if it weren't atomic. Anyone searching the
1123 * ProcArray for this database's ID should hold the database lock, so they
1124 * would not be executing concurrently with this store. A process looking
1125 * for another database's ID could in theory see a chance match if it read
1126 * a partially-updated databaseId value; but as long as all such searches
1127 * wait and retry, as in CountOtherDBBackends(), they will certainly see
1128 * the correct value on their next try.
1129 */
1131
1132 /*
1133 * We established a catalog snapshot while reading pg_authid and/or
1134 * pg_database; but until we have set up MyDatabaseId, we won't react to
1135 * incoming sinval messages for unshared catalogs, so we won't realize it
1136 * if the snapshot has been invalidated. Assume it's no good anymore.
1137 */
1139
1140 /*
1141 * Now we should be able to access the database directory safely. Verify
1142 * it's there and looks reasonable.
1143 */
1145
1146 if (!bootstrap)
1147 {
1148 if (access(fullpath, F_OK) == -1)
1149 {
1150 if (errno == ENOENT)
1151 ereport(FATAL,
1152 (errcode(ERRCODE_UNDEFINED_DATABASE),
1153 errmsg("database \"%s\" does not exist",
1154 dbname),
1155 errdetail("The database subdirectory \"%s\" is missing.",
1156 fullpath)));
1157 else
1158 ereport(FATAL,
1160 errmsg("could not access directory \"%s\": %m",
1161 fullpath)));
1162 }
1163
1164 ValidatePgVersion(fullpath);
1165 }
1166
1167 SetDatabasePath(fullpath);
1168 pfree(fullpath);
1169
1170 /*
1171 * It's now possible to do real access to the system catalogs.
1172 *
1173 * Load relcache entries for the system catalogs. This must create at
1174 * least the minimum set of "nailed-in" cache entries.
1175 */
1177
1178 /* set up ACL framework (so CheckMyDatabase can check permissions) */
1180
1181 /*
1182 * Re-read the pg_database row for our database, check permissions and set
1183 * up database-specific GUC settings. We can't do this until all the
1184 * database-access infrastructure is up. (Also, it wants to know if the
1185 * user is a superuser, so the above stuff has to happen first.)
1186 */
1187 if (!bootstrap)
1188 CheckMyDatabase(dbname, am_superuser,
1189 (flags & INIT_PG_OVERRIDE_ALLOW_CONNS) != 0);
1190
1191 /*
1192 * Now process any command-line switches and any additional GUC variable
1193 * settings passed in the startup packet. We couldn't do this before
1194 * because we didn't know if client is a superuser.
1195 */
1196 if (MyProcPort != NULL)
1197 process_startup_options(MyProcPort, am_superuser);
1198
1199 /* Process pg_db_role_setting options */
1201
1202 /* Apply PostAuthDelay as soon as we've read all options */
1203 if (PostAuthDelay > 0)
1204 pg_usleep(PostAuthDelay * 1000000L);
1205
1206 /*
1207 * Initialize various default states that can't be set up until we've
1208 * selected the active user and gotten the right GUC settings.
1209 */
1210
1211 /* set default namespace search path */
1213
1214 /* initialize client encoding */
1216
1217 /* Initialize this backend's session state. */
1219
1220 /*
1221 * If this is an interactive session, load any libraries that should be
1222 * preloaded at backend start. Since those are determined by GUCs, this
1223 * can't happen until GUC settings are complete, but we want it to happen
1224 * during the initial transaction in case anything that requires database
1225 * access needs to be done.
1226 */
1227 if ((flags & INIT_PG_LOAD_SESSION_LIBS) != 0)
1229
1230 /* fill in the remainder of this entry in the PgBackendStatus array */
1231 if (!bootstrap)
1233
1234 /* close the transaction we started above */
1235 if (!bootstrap)
1237}
1238
1239/*
1240 * Process any command-line switches and any additional GUC variable
1241 * settings passed in the startup packet.
1242 */
1243static void
1245{
1246 GucContext gucctx;
1247 ListCell *gucopts;
1248
1249 gucctx = am_superuser ? PGC_SU_BACKEND : PGC_BACKEND;
1250
1251 /*
1252 * First process any command-line switches that were included in the
1253 * startup packet, if we are in a regular backend.
1254 */
1255 if (port->cmdline_options != NULL)
1256 {
1257 /*
1258 * The maximum possible number of commandline arguments that could
1259 * come from port->cmdline_options is (strlen + 1) / 2; see
1260 * pg_split_opts().
1261 */
1262 char **av;
1263 int maxac;
1264 int ac;
1265
1266 maxac = 2 + (strlen(port->cmdline_options) + 1) / 2;
1267
1268 av = (char **) palloc(maxac * sizeof(char *));
1269 ac = 0;
1270
1271 av[ac++] = "postgres";
1272
1273 pg_split_opts(av, &ac, port->cmdline_options);
1274
1275 av[ac] = NULL;
1276
1277 Assert(ac < maxac);
1278
1279 (void) process_postgres_switches(ac, av, gucctx, NULL);
1280 }
1281
1282 /*
1283 * Process any additional GUC variable settings passed in startup packet.
1284 * These are handled exactly like command-line variables.
1285 */
1286 gucopts = list_head(port->guc_options);
1287 while (gucopts)
1288 {
1289 char *name;
1290 char *value;
1291
1292 name = lfirst(gucopts);
1293 gucopts = lnext(port->guc_options, gucopts);
1294
1295 value = lfirst(gucopts);
1296 gucopts = lnext(port->guc_options, gucopts);
1297
1299 }
1300}
1301
1302/*
1303 * Load GUC settings from pg_db_role_setting.
1304 *
1305 * We try specific settings for the database/role combination, as well as
1306 * general for this database and for this user.
1307 */
1308static void
1309process_settings(Oid databaseid, Oid roleid)
1310{
1311 Relation relsetting;
1312 Snapshot snapshot;
1313
1314 if (!IsUnderPostmaster)
1315 return;
1316
1317 relsetting = table_open(DbRoleSettingRelationId, AccessShareLock);
1318
1319 /* read all the settings under the same snapshot for efficiency */
1320 snapshot = RegisterSnapshot(GetCatalogSnapshot(DbRoleSettingRelationId));
1321
1322 /* Later settings are ignored if set earlier. */
1323 ApplySetting(snapshot, databaseid, roleid, relsetting, PGC_S_DATABASE_USER);
1324 ApplySetting(snapshot, InvalidOid, roleid, relsetting, PGC_S_USER);
1325 ApplySetting(snapshot, databaseid, InvalidOid, relsetting, PGC_S_DATABASE);
1326 ApplySetting(snapshot, InvalidOid, InvalidOid, relsetting, PGC_S_GLOBAL);
1327
1328 UnregisterSnapshot(snapshot);
1329 table_close(relsetting, AccessShareLock);
1330}
1331
1332/*
1333 * Backend-shutdown callback. Do cleanup that we want to be sure happens
1334 * before all the supporting modules begin to nail their doors shut via
1335 * their own callbacks.
1336 *
1337 * User-level cleanup, such as temp-relation removal and UNLISTEN, happens
1338 * via separate callbacks that execute before this one. We don't combine the
1339 * callbacks because we still want this one to happen if the user-level
1340 * cleanup fails.
1341 */
1342static void
1344{
1345 /* Make sure we've killed any active transaction */
1347
1348 /*
1349 * User locks are not released by transaction end, so be sure to release
1350 * them explicitly.
1351 */
1353}
1354
1355
1356/*
1357 * STATEMENT_TIMEOUT handler: trigger a query-cancel interrupt.
1358 */
1359static void
1361{
1362 int sig = SIGINT;
1363
1364 /*
1365 * During authentication the timeout is used to deal with
1366 * authentication_timeout - we want to quit in response to such timeouts.
1367 */
1369 sig = SIGTERM;
1370
1371#ifdef HAVE_SETSID
1372 /* try to signal whole process group */
1373 kill(-MyProcPid, sig);
1374#endif
1375 kill(MyProcPid, sig);
1376}
1377
1378/*
1379 * LOCK_TIMEOUT handler: trigger a query-cancel interrupt.
1380 */
1381static void
1383{
1384#ifdef HAVE_SETSID
1385 /* try to signal whole process group */
1386 kill(-MyProcPid, SIGINT);
1387#endif
1388 kill(MyProcPid, SIGINT);
1389}
1390
1391static void
1393{
1395 InterruptPending = true;
1397}
1398
1399static void
1401{
1403 InterruptPending = true;
1405}
1406
1407static void
1409{
1411 InterruptPending = true;
1413}
1414
1415static void
1417{
1419 InterruptPending = true;
1421}
1422
1423static void
1425{
1427 InterruptPending = true;
1429}
1430
1431/*
1432 * Returns true if at least one role is defined in this database cluster.
1433 */
1434static bool
1436{
1437 Relation pg_authid_rel;
1438 TableScanDesc scan;
1439 bool result;
1440
1441 pg_authid_rel = table_open(AuthIdRelationId, AccessShareLock);
1442
1443 scan = table_beginscan_catalog(pg_authid_rel, 0, NULL);
1444 result = (heap_getnext(scan, ForwardScanDirection) != NULL);
1445
1446 table_endscan(scan);
1447 table_close(pg_authid_rel, AccessShareLock);
1448
1449 return result;
1450}
void initialize_acl(void)
Definition: acl.c:5024
bool has_privs_of_role(Oid member, Oid role)
Definition: acl.c:5268
@ ACLCHECK_OK
Definition: acl.h:183
AclResult object_aclcheck(Oid classid, Oid objectid, Oid roleid, AclMode mode)
Definition: aclchk.c:3821
void pgaio_init_backend(void)
Definition: aio_init.c:222
void ClientAuthentication(Port *port)
Definition: auth.c:371
int autovacuum_worker_slots
Definition: autovacuum.c:119
TimestampTz GetCurrentTimestamp(void)
Definition: timestamp.c:1645
uint32 log_connections
ConnectionTiming conn_timing
@ LOG_CONNECTION_AUTHORIZATION
void pgstat_bestart_security(void)
void pgstat_bestart_initial(void)
void pgstat_beinit(void)
void pgstat_bestart_final(void)
bool be_gssapi_get_auth(Port *port)
bool be_gssapi_get_enc(Port *port)
const char * be_gssapi_get_princ(Port *port)
bool be_gssapi_get_delegation(Port *port)
const char * be_tls_get_version(Port *port)
int be_tls_get_cipher_bits(Port *port)
const char * be_tls_get_cipher(Port *port)
void InitBufferManagerAccess(void)
Definition: bufmgr.c:4013
#define TextDatumGetCString(d)
Definition: builtins.h:98
#define NameStr(name)
Definition: c.h:717
#define Min(x, y)
Definition: c.h:975
#define Max(x, y)
Definition: c.h:969
uint32 bits32
Definition: c.h:511
#define OidIsValid(objectId)
Definition: c.h:746
bool database_is_invalid_form(Form_pg_database datform)
Definition: dbcommands.c:3212
int errmsg_internal(const char *fmt,...)
Definition: elog.c:1158
void DebugFileOpen(void)
Definition: elog.c:2116
int errcode_for_file_access(void)
Definition: elog.c:877
int errdetail(const char *fmt,...)
Definition: elog.c:1204
int errhint(const char *fmt,...)
Definition: elog.c:1318
int errcode(int sqlerrcode)
Definition: elog.c:854
int errmsg(const char *fmt,...)
Definition: elog.c:1071
#define _(x)
Definition: elog.c:91
#define LOG
Definition: elog.h:31
#define DEBUG3
Definition: elog.h:28
#define FATAL
Definition: elog.h:41
#define WARNING
Definition: elog.h:36
#define ERROR
Definition: elog.h:39
#define elog(elevel,...)
Definition: elog.h:225
#define ereport(elevel,...)
Definition: elog.h:149
void InitFileAccess(void)
Definition: fd.c:903
void InitTemporaryFileAccess(void)
Definition: fd.c:933
void systable_endscan(SysScanDesc sysscan)
Definition: genam.c:603
HeapTuple systable_getnext(SysScanDesc sysscan)
Definition: genam.c:514
SysScanDesc systable_beginscan(Relation heapRelation, Oid indexId, bool indexOK, Snapshot snapshot, int nkeys, ScanKey key)
Definition: genam.c:388
volatile sig_atomic_t IdleStatsUpdateTimeoutPending
Definition: globals.c:42
bool MyDatabaseHasLoginEventTriggers
Definition: globals.c:98
volatile sig_atomic_t InterruptPending
Definition: globals.c:32
int MyCancelKeyLength
Definition: globals.c:53
volatile sig_atomic_t IdleSessionTimeoutPending
Definition: globals.c:39
bool IsBinaryUpgrade
Definition: globals.c:121
volatile sig_atomic_t IdleInTransactionSessionTimeoutPending
Definition: globals.c:37
volatile sig_atomic_t TransactionTimeoutPending
Definition: globals.c:38
int MyProcPid
Definition: globals.c:47
bool IsUnderPostmaster
Definition: globals.c:120
int MaxConnections
Definition: globals.c:143
Oid MyDatabaseTableSpace
Definition: globals.c:96
int MaxBackends
Definition: globals.c:146
uint8 MyCancelKey[MAX_CANCEL_KEY_LENGTH]
Definition: globals.c:52
struct Port * MyProcPort
Definition: globals.c:51
struct Latch * MyLatch
Definition: globals.c:63
volatile sig_atomic_t CheckClientConnectionPending
Definition: globals.c:35
int max_worker_processes
Definition: globals.c:144
Oid MyDatabaseId
Definition: globals.c:94
void SetConfigOption(const char *name, const char *value, GucContext context, GucSource source)
Definition: guc.c:4332
@ PGC_S_DYNAMIC_DEFAULT
Definition: guc.h:114
@ PGC_S_GLOBAL
Definition: guc.h:118
@ PGC_S_DATABASE
Definition: guc.h:119
@ PGC_S_CLIENT
Definition: guc.h:122
@ PGC_S_DATABASE_USER
Definition: guc.h:121
@ PGC_S_USER
Definition: guc.h:120
GucContext
Definition: guc.h:72
@ PGC_INTERNAL
Definition: guc.h:73
@ PGC_SU_BACKEND
Definition: guc.h:76
@ PGC_BACKEND
Definition: guc.h:77
char * HbaFileName
Definition: guc_tables.c:556
Assert(PointerIsAligned(start, uint64))
bool load_ident(void)
Definition: hba.c:3021
bool load_hba(void)
Definition: hba.c:2645
const char * hba_authname(UserAuth auth_method)
Definition: hba.c:3123
HeapTuple heap_getnext(TableScanDesc sscan, ScanDirection direction)
Definition: heapam.c:1314
HeapTuple heap_copytuple(HeapTuple tuple)
Definition: heaptuple.c:778
#define HeapTupleIsValid(tuple)
Definition: htup.h:78
static void * GETSTRUCT(const HeapTupleData *tuple)
Definition: htup_details.h:728
static struct @165 value
static char * username
Definition: initdb.c:153
static char * locale
Definition: initdb.c:140
#define INJECTION_POINT(name, arg)
void before_shmem_exit(pg_on_exit_callback function, Datum arg)
Definition: ipc.c:337
void SetLatch(Latch *latch)
Definition: latch.c:288
void LockSharedObject(Oid classid, Oid objid, uint16 objsubid, LOCKMODE lockmode)
Definition: lmgr.c:1082
void InitLockManagerAccess(void)
Definition: lock.c:504
void LockReleaseAll(LOCKMETHODID lockmethodid, bool allLocks)
Definition: lock.c:2275
int max_locks_per_xact
Definition: lock.c:53
int FastPathLockGroupsPerBackend
Definition: lock.c:202
#define USER_LOCKMETHOD
Definition: lock.h:127
#define AccessShareLock
Definition: lockdefs.h:36
#define RowExclusiveLock
Definition: lockdefs.h:38
void InitializeClientEncoding(void)
Definition: mbutils.c:282
const char * GetDatabaseEncodingName(void)
Definition: mbutils.c:1268
void SetDatabaseEncoding(int encoding)
Definition: mbutils.c:1162
char * pstrdup(const char *in)
Definition: mcxt.c:1703
void pfree(void *pointer)
Definition: mcxt.c:1528
MemoryContext TopMemoryContext
Definition: mcxt.c:149
void * palloc(Size size)
Definition: mcxt.c:1321
MemoryContext PostmasterContext
Definition: mcxt.c:151
#define AllocSetContextCreate
Definition: memutils.h:129
#define ALLOCSET_DEFAULT_SIZES
Definition: memutils.h:160
#define IsBootstrapProcessingMode()
Definition: miscadmin.h:476
#define INIT_PG_LOAD_SESSION_LIBS
Definition: miscadmin.h:498
#define AmAutoVacuumWorkerProcess()
Definition: miscadmin.h:382
#define AmBackgroundWorkerProcess()
Definition: miscadmin.h:383
#define AmLogicalSlotSyncWorkerProcess()
Definition: miscadmin.h:385
#define AmAutoVacuumLauncherProcess()
Definition: miscadmin.h:381
#define AmRegularBackendProcess()
Definition: miscadmin.h:380
#define INIT_PG_OVERRIDE_ROLE_LOGIN
Definition: miscadmin.h:500
#define INIT_PG_OVERRIDE_ALLOW_CONNS
Definition: miscadmin.h:499
void InitializeSessionUserId(const char *rolename, Oid roleid, bool bypass_login_check)
Definition: miscinit.c:761
void InitializeSystemUser(const char *authn_id, const char *auth_method)
Definition: miscinit.c:925
void InitializeSessionUserIdStandalone(void)
Definition: miscinit.c:891
void process_session_preload_libraries(void)
Definition: miscinit.c:1916
Oid GetUserId(void)
Definition: miscinit.c:520
Oid GetSessionUserId(void)
Definition: miscinit.c:559
void SetDatabasePath(const char *path)
Definition: miscinit.c:334
ClientConnectionInfo MyClientConnectionInfo
Definition: miscinit.c:1069
bool has_rolreplication(Oid roleid)
Definition: miscinit.c:739
void ValidatePgVersion(const char *path)
Definition: miscinit.c:1769
int namestrcmp(Name name, const char *str)
Definition: name.c:247
void InitializeSearchPath(void)
Definition: namespace.c:4736
#define ACL_CONNECT
Definition: parsenodes.h:87
void * arg
static uint32 pg_nextpower2_32(uint32 num)
Definition: pg_bitutils.h:189
#define NAMEDATALEN
static int sig
Definition: pg_ctl.c:80
FormData_pg_database * Form_pg_database
Definition: pg_database.h:96
void ApplySetting(Snapshot snapshot, Oid databaseid, Oid roleid, Relation relsetting, GucSource source)
#define lfirst(lc)
Definition: pg_list.h:172
static ListCell * list_head(const List *l)
Definition: pg_list.h:128
static ListCell * lnext(const List *l, const ListCell *c)
Definition: pg_list.h:343
char * get_collation_actual_version(char collprovider, const char *collcollate)
Definition: pg_locale.c:1240
bool database_ctype_is_c
Definition: pg_locale.c:129
char * pg_perm_setlocale(int category, const char *locale)
Definition: pg_locale.c:191
void init_database_collation(void)
Definition: pg_locale.c:1147
static int port
Definition: pg_regress.c:115
void pgstat_initialize(void)
Definition: pgstat.c:638
void pgstat_before_server_shutdown(int code, Datum arg)
Definition: pgstat.c:559
void InitPlanCache(void)
Definition: plancache.c:146
size_t strlcpy(char *dst, const char *src, size_t siz)
Definition: strlcpy.c:45
void EnablePortalManager(void)
Definition: portalmem.c:104
void process_postgres_switches(int argc, char *argv[], GucContext ctx, const char **dbname)
Definition: postgres.c:3790
int PostAuthDelay
Definition: postgres.c:99
uintptr_t Datum
Definition: postgres.h:69
static Datum ObjectIdGetDatum(Oid X)
Definition: postgres.h:257
static Datum CStringGetDatum(const char *X)
Definition: postgres.h:355
#define InvalidOid
Definition: postgres_ext.h:35
unsigned int Oid
Definition: postgres_ext.h:30
static void ShutdownPostgres(int code, Datum arg)
Definition: postinit.c:1343
static void IdleInTransactionSessionTimeoutHandler(void)
Definition: postinit.c:1400
static void LockTimeoutHandler(void)
Definition: postinit.c:1382
void InitializeMaxBackends(void)
Definition: postinit.c:555
void pg_split_opts(char **argv, int *argcp, const char *optstr)
Definition: postinit.c:497
static void IdleStatsUpdateTimeoutHandler(void)
Definition: postinit.c:1416
static void process_settings(Oid databaseid, Oid roleid)
Definition: postinit.c:1309
void BaseInit(void)
Definition: postinit.c:612
static void IdleSessionTimeoutHandler(void)
Definition: postinit.c:1408
static void process_startup_options(Port *port, bool am_superuser)
Definition: postinit.c:1244
static void StatementTimeoutHandler(void)
Definition: postinit.c:1360
static void CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections)
Definition: postinit.c:323
static bool ThereIsAtLeastOneRole(void)
Definition: postinit.c:1435
static void PerformAuthentication(Port *port)
Definition: postinit.c:194
void InitializeFastPathLocks(void)
Definition: postinit.c:580
static void ClientCheckTimeoutHandler(void)
Definition: postinit.c:1424
static HeapTuple GetDatabaseTuple(const char *dbname)
Definition: postinit.c:105
void InitPostgres(const char *in_dbname, Oid dboid, const char *username, Oid useroid, bits32 flags, char *out_dbname)
Definition: postinit.c:712
static HeapTuple GetDatabaseTupleByOid(Oid dboid)
Definition: postinit.c:148
static void TransactionTimeoutHandler(void)
Definition: postinit.c:1392
int ReservedConnections
Definition: postmaster.c:230
bool ClientAuthInProgress
Definition: postmaster.c:372
int AuthenticationTimeout
Definition: postmaster.c:241
int SuperuserReservedConnections
Definition: postmaster.c:229
short access
Definition: preproc-type.c:36
#define FP_LOCK_GROUPS_PER_BACKEND_MAX
Definition: proc.h:91
#define FP_LOCK_SLOTS_PER_GROUP
Definition: proc.h:92
#define NUM_SPECIAL_WORKER_PROCS
Definition: proc.h:442
int CountDBConnections(Oid databaseid)
Definition: procarray.c:3628
#define MAX_BACKENDS
Definition: procnumber.h:39
void ProcSignalInit(const uint8 *cancel_key, int cancel_key_len)
Definition: procsignal.c:166
static void set_ps_display(const char *activity)
Definition: ps_status.h:40
bool criticalSharedRelcachesBuilt
Definition: relcache.c:146
void RelationCacheInitializePhase3(void)
Definition: relcache.c:4107
void RelationCacheInitialize(void)
Definition: relcache.c:4002
void RelationCacheInitializePhase2(void)
Definition: relcache.c:4048
char * GetDatabasePath(Oid dbOid, Oid spcOid)
Definition: relpath.c:110
void ReleaseAuxProcessResources(bool isCommit)
Definition: resowner.c:1019
ResourceOwner CurrentResourceOwner
Definition: resowner.c:173
void CreateAuxProcessResourceOwner(void)
Definition: resowner.c:999
const char * quote_identifier(const char *ident)
Definition: ruleutils.c:13029
void ScanKeyInit(ScanKey entry, AttrNumber attributeNumber, StrategyNumber strategy, RegProcedure procedure, Datum argument)
Definition: scankey.c:76
@ ForwardScanDirection
Definition: sdir.h:28
struct @10::@11 av[32]
void InitializeSession(void)
Definition: session.c:54
void pg_usleep(long microsec)
Definition: signal.c:53
void SharedInvalBackendInit(bool sendOnly)
Definition: sinvaladt.c:272
void ReplicationSlotInitialize(void)
Definition: slot.c:239
void smgrinit(void)
Definition: smgr.c:188
Snapshot GetCatalogSnapshot(Oid relid)
Definition: snapmgr.c:373
void UnregisterSnapshot(Snapshot snapshot)
Definition: snapmgr.c:853
Snapshot RegisterSnapshot(Snapshot snapshot)
Definition: snapmgr.c:811
void InvalidateCatalogSnapshot(void)
Definition: snapmgr.c:443
PGPROC * MyProc
Definition: proc.c:66
bool HaveNFreeProcs(int n, int *nfree)
Definition: proc.c:782
void CheckDeadLockAlert(void)
Definition: proc.c:1873
void InitProcessPhase2(void)
Definition: proc.c:580
#define BTEqualStrategyNumber
Definition: stratnum.h:31
char * dbname
Definition: streamutil.c:49
void resetStringInfo(StringInfo str)
Definition: stringinfo.c:126
void appendStringInfo(StringInfo str, const char *fmt,...)
Definition: stringinfo.c:145
void appendStringInfoChar(StringInfo str, char ch)
Definition: stringinfo.c:242
void initStringInfo(StringInfo str)
Definition: stringinfo.c:97
const char * authn_id
Definition: libpq-be.h:99
UserAuth auth_method
Definition: libpq-be.h:105
TimestampTz auth_start
TimestampTz auth_end
Oid databaseId
Definition: proc.h:216
Definition: libpq-be.h:129
bool superuser(void)
Definition: superuser.c:46
void InitSync(void)
Definition: sync.c:124
void InitCatalogCache(void)
Definition: syscache.c:110
void ReleaseSysCache(HeapTuple tuple)
Definition: syscache.c:269
HeapTuple SearchSysCache1(int cacheId, Datum key1)
Definition: syscache.c:221
Datum SysCacheGetAttr(int cacheId, HeapTuple tup, AttrNumber attributeNumber, bool *isNull)
Definition: syscache.c:600
Datum SysCacheGetAttrNotNull(int cacheId, HeapTuple tup, AttrNumber attributeNumber)
Definition: syscache.c:631
void table_close(Relation relation, LOCKMODE lockmode)
Definition: table.c:126
Relation table_open(Oid relationId, LOCKMODE lockmode)
Definition: table.c:40
TableScanDesc table_beginscan_catalog(Relation relation, int nkeys, struct ScanKeyData *key)
Definition: tableam.c:113
static void table_endscan(TableScanDesc scan)
Definition: tableam.h:979
void enable_timeout_after(TimeoutId id, int delay_ms)
Definition: timeout.c:560
void disable_timeout(TimeoutId id, bool keep_indicator)
Definition: timeout.c:685
TimeoutId RegisterTimeout(TimeoutId id, timeout_handler_proc handler)
Definition: timeout.c:505
@ IDLE_SESSION_TIMEOUT
Definition: timeout.h:35
@ IDLE_IN_TRANSACTION_SESSION_TIMEOUT
Definition: timeout.h:33
@ LOCK_TIMEOUT
Definition: timeout.h:28
@ STATEMENT_TIMEOUT
Definition: timeout.h:29
@ DEADLOCK_TIMEOUT
Definition: timeout.h:27
@ TRANSACTION_TIMEOUT
Definition: timeout.h:34
@ IDLE_STATS_UPDATE_TIMEOUT
Definition: timeout.h:36
@ CLIENT_CONNECTION_CHECK_TIMEOUT
Definition: timeout.h:37
const char * name
bool am_walsender
Definition: walsender.c:120
bool am_db_walsender
Definition: walsender.c:123
int max_wal_senders
Definition: walsender.c:126
#define kill(pid, sig)
Definition: win32_port.h:493
void StartTransactionCommand(void)
Definition: xact.c:3059
int XactIsoLevel
Definition: xact.c:79
void SetCurrentStatementStartTimestamp(void)
Definition: xact.c:914
void CommitTransactionCommand(void)
Definition: xact.c:3157
void AbortOutOfAnyTransaction(void)
Definition: xact.c:4862
#define XACT_READ_COMMITTED
Definition: xact.h:37
void StartupXLOG(void)
Definition: xlog.c:5614
void ShutdownXLOG(int code, Datum arg)
Definition: xlog.c:6790
void InitXLogInsert(void)
Definition: xloginsert.c:1348