Age Owner Branch data TLA Line data Source code
1 : : /*-------------------------------------------------------------------------
2 : : *
3 : : * postinit.c
4 : : * postgres initialization utilities
5 : : *
6 : : * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
7 : : * Portions Copyright (c) 1994, Regents of the University of California
8 : : *
9 : : *
10 : : * IDENTIFICATION
11 : : * src/backend/utils/init/postinit.c
12 : : *
13 : : *
14 : : *-------------------------------------------------------------------------
15 : : */
16 : : #include "postgres.h"
17 : :
18 : : #include <ctype.h>
19 : : #include <fcntl.h>
20 : : #include <unistd.h>
21 : :
22 : : #include "access/genam.h"
23 : : #include "access/heapam.h"
24 : : #include "access/htup_details.h"
25 : : #include "access/session.h"
26 : : #include "access/tableam.h"
27 : : #include "access/xact.h"
28 : : #include "access/xlog.h"
29 : : #include "access/xloginsert.h"
30 : : #include "catalog/namespace.h"
31 : : #include "catalog/pg_authid.h"
32 : : #include "catalog/pg_collation.h"
33 : : #include "catalog/pg_database.h"
34 : : #include "catalog/pg_db_role_setting.h"
35 : : #include "catalog/pg_tablespace.h"
36 : : #include "libpq/auth.h"
37 : : #include "libpq/libpq-be.h"
38 : : #include "mb/pg_wchar.h"
39 : : #include "miscadmin.h"
40 : : #include "pgstat.h"
41 : : #include "port/pg_bitutils.h"
42 : : #include "postmaster/autovacuum.h"
43 : : #include "postmaster/postmaster.h"
44 : : #include "replication/slot.h"
45 : : #include "replication/slotsync.h"
46 : : #include "replication/walsender.h"
47 : : #include "storage/aio_subsys.h"
48 : : #include "storage/bufmgr.h"
49 : : #include "storage/fd.h"
50 : : #include "storage/ipc.h"
51 : : #include "storage/lmgr.h"
52 : : #include "storage/proc.h"
53 : : #include "storage/procarray.h"
54 : : #include "storage/procnumber.h"
55 : : #include "storage/procsignal.h"
56 : : #include "storage/sinvaladt.h"
57 : : #include "storage/smgr.h"
58 : : #include "storage/sync.h"
59 : : #include "tcop/backend_startup.h"
60 : : #include "tcop/tcopprot.h"
61 : : #include "utils/acl.h"
62 : : #include "utils/builtins.h"
63 : : #include "utils/fmgroids.h"
64 : : #include "utils/guc_hooks.h"
65 : : #include "utils/injection_point.h"
66 : : #include "utils/memutils.h"
67 : : #include "utils/pg_locale.h"
68 : : #include "utils/portal.h"
69 : : #include "utils/ps_status.h"
70 : : #include "utils/snapmgr.h"
71 : : #include "utils/syscache.h"
72 : : #include "utils/timeout.h"
73 : :
74 : : /* has this backend called EmitConnectionWarnings()? */
75 : : static bool ConnectionWarningsEmitted;
76 : :
77 : : /* content of warnings to send via EmitConnectionWarnings() */
78 : : static List *ConnectionWarningMessages;
79 : : static List *ConnectionWarningDetails;
80 : :
81 : : static HeapTuple GetDatabaseTuple(const char *dbname);
82 : : static HeapTuple GetDatabaseTupleByOid(Oid dboid);
83 : : static void PerformAuthentication(Port *port);
84 : : static void CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections);
85 : : static void ShutdownPostgres(int code, Datum arg);
86 : : static void StatementTimeoutHandler(void);
87 : : static void LockTimeoutHandler(void);
88 : : static void IdleInTransactionSessionTimeoutHandler(void);
89 : : static void TransactionTimeoutHandler(void);
90 : : static void IdleSessionTimeoutHandler(void);
91 : : static void IdleStatsUpdateTimeoutHandler(void);
92 : : static void ClientCheckTimeoutHandler(void);
93 : : static bool ThereIsAtLeastOneRole(void);
94 : : static void process_startup_options(Port *port, bool am_superuser);
95 : : static void process_settings(Oid databaseid, Oid roleid);
96 : : static void EmitConnectionWarnings(void);
97 : :
98 : :
99 : : /*** InitPostgres support ***/
100 : :
101 : :
102 : : /*
103 : : * GetDatabaseTuple -- fetch the pg_database row for a database
104 : : *
105 : : * This is used during backend startup when we don't yet have any access to
106 : : * system catalogs in general. In the worst case, we can seqscan pg_database
107 : : * using nothing but the hard-wired descriptor that relcache.c creates for
108 : : * pg_database. In more typical cases, relcache.c was able to load
109 : : * descriptors for both pg_database and its indexes from the shared relcache
110 : : * cache file, and so we can do an indexscan. criticalSharedRelcachesBuilt
111 : : * tells whether we got the cached descriptors.
112 : : */
113 : : static HeapTuple
6110 tgl@sss.pgh.pa.us 114 :CBC 14204 : GetDatabaseTuple(const char *dbname)
115 : : {
116 : : HeapTuple tuple;
117 : : Relation relation;
118 : : SysScanDesc scan;
119 : : ScanKeyData key[1];
120 : :
121 : : /*
122 : : * form a scan key
123 : : */
124 : 14204 : ScanKeyInit(&key[0],
125 : : Anum_pg_database_datname,
126 : : BTEqualStrategyNumber, F_NAMEEQ,
127 : : CStringGetDatum(dbname));
128 : :
129 : : /*
130 : : * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
131 : : * built the critical shared relcache entries (i.e., we're starting up
132 : : * without a shared relcache cache file).
133 : : */
2661 andres@anarazel.de 134 : 14204 : relation = table_open(DatabaseRelationId, AccessShareLock);
6110 tgl@sss.pgh.pa.us 135 : 14204 : scan = systable_beginscan(relation, DatabaseNameIndexId,
136 : : criticalSharedRelcachesBuilt,
137 : : NULL,
138 : : 1, key);
139 : :
140 : 14204 : tuple = systable_getnext(scan);
141 : :
142 : : /* Must copy tuple before releasing buffer */
143 [ + + ]: 14204 : if (HeapTupleIsValid(tuple))
144 : 14198 : tuple = heap_copytuple(tuple);
145 : :
146 : : /* all done */
147 : 14204 : systable_endscan(scan);
2661 andres@anarazel.de 148 : 14204 : table_close(relation, AccessShareLock);
149 : :
6110 tgl@sss.pgh.pa.us 150 : 14204 : return tuple;
151 : : }
152 : :
153 : : /*
154 : : * GetDatabaseTupleByOid -- as above, but search by database OID
155 : : */
156 : : static HeapTuple
157 : 16891 : GetDatabaseTupleByOid(Oid dboid)
158 : : {
159 : : HeapTuple tuple;
160 : : Relation relation;
161 : : SysScanDesc scan;
162 : : ScanKeyData key[1];
163 : :
164 : : /*
165 : : * form a scan key
166 : : */
167 : 16891 : ScanKeyInit(&key[0],
168 : : Anum_pg_database_oid,
169 : : BTEqualStrategyNumber, F_OIDEQ,
170 : : ObjectIdGetDatum(dboid));
171 : :
172 : : /*
173 : : * Open pg_database and fetch a tuple. Force heap scan if we haven't yet
174 : : * built the critical shared relcache entries (i.e., we're starting up
175 : : * without a shared relcache cache file).
176 : : */
2661 andres@anarazel.de 177 : 16891 : relation = table_open(DatabaseRelationId, AccessShareLock);
6110 tgl@sss.pgh.pa.us 178 : 16891 : scan = systable_beginscan(relation, DatabaseOidIndexId,
179 : : criticalSharedRelcachesBuilt,
180 : : NULL,
181 : : 1, key);
182 : :
183 : 16891 : tuple = systable_getnext(scan);
184 : :
185 : : /* Must copy tuple before releasing buffer */
186 [ + - ]: 16891 : if (HeapTupleIsValid(tuple))
187 : 16891 : tuple = heap_copytuple(tuple);
188 : :
189 : : /* all done */
190 : 16891 : systable_endscan(scan);
2661 andres@anarazel.de 191 : 16891 : table_close(relation, AccessShareLock);
192 : :
6110 tgl@sss.pgh.pa.us 193 : 16891 : return tuple;
194 : : }
195 : :
196 : :
197 : : /*
198 : : * PerformAuthentication -- authenticate a remote client
199 : : *
200 : : * returns: nothing. Will not return at all if there's any failure.
201 : : */
202 : : static void
6093 203 : 14844 : PerformAuthentication(Port *port)
204 : : {
205 : : /* This should be set already, but let's make sure */
206 : 14844 : ClientAuthInProgress = true; /* limit visibility of log messages */
207 : :
208 : : /*
209 : : * In EXEC_BACKEND case, we didn't inherit the contents of pg_hba.conf
210 : : * etcetera from the postmaster, and have to load them ourselves.
211 : : *
212 : : * FIXME: [fork/exec] Ugh. Is there a way around this overhead?
213 : : */
214 : : #ifdef EXEC_BACKEND
215 : :
216 : : /*
217 : : * load_hba() and load_ident() want to work within the PostmasterContext,
218 : : * so create that if it doesn't exist (which it won't). We'll delete it
219 : : * again later, in PostgresMain.
220 : : */
221 : : if (PostmasterContext == NULL)
222 : : PostmasterContext = AllocSetContextCreate(TopMemoryContext,
223 : : "Postmaster",
224 : : ALLOCSET_DEFAULT_SIZES);
225 : :
226 : : if (!load_hba())
227 : : {
228 : : /*
229 : : * It makes no sense to continue if we fail to load the HBA file,
230 : : * since there is no way to connect to the database in this case.
231 : : */
232 : : ereport(FATAL,
233 : : /* translator: %s is a configuration file */
234 : : (errmsg("could not load %s", HbaFileName)));
235 : : }
236 : :
237 : : if (!load_ident())
238 : : {
239 : : /*
240 : : * It is ok to continue if we fail to load the IDENT file, although it
241 : : * means that you cannot log in using any of the authentication
242 : : * methods that need a user name mapping. load_ident() already logged
243 : : * the details of error to the log.
244 : : */
245 : : }
246 : : #endif
247 : :
248 : : /* Capture authentication start time for logging */
419 melanieplageman@gmai 249 : 14844 : conn_timing.auth_start = GetCurrentTimestamp();
250 : :
251 : : /*
252 : : * Set up a timeout in case a buggy or malicious client fails to respond
253 : : * during authentication. Since we're inside a transaction and might do
254 : : * database access, we have to use the statement_timeout infrastructure.
255 : : */
5041 alvherre@alvh.no-ip. 256 : 14844 : enable_timeout_after(STATEMENT_TIMEOUT, AuthenticationTimeout * 1000);
257 : :
258 : : /*
259 : : * Now perform authentication exchange.
260 : : */
2246 peter@eisentraut.org 261 : 14844 : set_ps_display("authentication");
6093 tgl@sss.pgh.pa.us 262 : 14844 : ClientAuthentication(port); /* might not return, if failure */
263 : :
264 : : /*
265 : : * Done with authentication. Disable the timeout, and log if needed.
266 : : */
5041 alvherre@alvh.no-ip. 267 : 14637 : disable_timeout(STATEMENT_TIMEOUT, false);
268 : :
269 : : /* Capture authentication end time for logging */
419 melanieplageman@gmai 270 : 14637 : conn_timing.auth_end = GetCurrentTimestamp();
271 : :
272 [ + + ]: 14637 : if (log_connections & LOG_CONNECTION_AUTHORIZATION)
273 : : {
274 : : StringInfoData logmsg;
275 : :
1980 sfrost@snowman.net 276 : 404 : initStringInfo(&logmsg);
5586 magnus@hagander.net 277 [ - + ]: 404 : if (am_walsender)
1980 sfrost@snowman.net 278 :UBC 0 : appendStringInfo(&logmsg, _("replication connection authorized: user=%s"),
279 : : port->user_name);
280 : : else
1980 sfrost@snowman.net 281 :CBC 404 : appendStringInfo(&logmsg, _("connection authorized: user=%s"),
282 : : port->user_name);
283 [ + - ]: 404 : if (!am_walsender)
284 : 404 : appendStringInfo(&logmsg, _(" database=%s"), port->database_name);
285 : :
286 [ + + ]: 404 : if (port->application_name != NULL)
287 : 401 : appendStringInfo(&logmsg, _(" application_name=%s"),
288 : : port->application_name);
289 : :
290 : : #ifdef USE_SSL
291 [ + + ]: 404 : if (port->ssl_in_use)
1883 michael@paquier.xyz 292 : 128 : appendStringInfo(&logmsg, _(" SSL enabled (protocol=%s, cipher=%s, bits=%d)"),
293 : : be_tls_get_version(port),
294 : : be_tls_get_cipher(port),
295 : : be_tls_get_cipher_bits(port));
296 : : #endif
297 : : #ifdef ENABLE_GSS
1954 tgl@sss.pgh.pa.us 298 [ + + ]: 404 : if (port->gss)
299 : : {
300 : 90 : const char *princ = be_gssapi_get_princ(port);
301 : :
302 [ + + ]: 90 : if (princ)
303 [ + + + + : 117 : appendStringInfo(&logmsg,
+ - ]
1080 304 : 39 : _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s, principal=%s)"),
1954 305 : 78 : be_gssapi_get_auth(port) ? _("yes") : _("no"),
306 : 78 : be_gssapi_get_enc(port) ? _("yes") : _("no"),
1081 bruce@momjian.us 307 : 78 : be_gssapi_get_delegation(port) ? _("yes") : _("no"),
308 : : princ);
309 : : else
1954 tgl@sss.pgh.pa.us 310 [ - + + - : 153 : appendStringInfo(&logmsg,
- + ]
1080 311 : 51 : _(" GSS (authenticated=%s, encrypted=%s, delegated_credentials=%s)"),
1954 312 : 102 : be_gssapi_get_auth(port) ? _("yes") : _("no"),
1118 sfrost@snowman.net 313 : 102 : be_gssapi_get_enc(port) ? _("yes") : _("no"),
1081 bruce@momjian.us 314 : 102 : be_gssapi_get_delegation(port) ? _("yes") : _("no"));
315 : : }
316 : : #endif
317 : :
1980 sfrost@snowman.net 318 [ + - ]: 404 : ereport(LOG, errmsg_internal("%s", logmsg.data));
319 : 404 : pfree(logmsg.data);
320 : : }
321 : :
2246 peter@eisentraut.org 322 : 14637 : set_ps_display("startup");
323 : :
3240 tgl@sss.pgh.pa.us 324 : 14637 : ClientAuthInProgress = false; /* client_min_messages is active now */
6093 325 : 14637 : }
326 : :
327 : :
328 : : /*
329 : : * CheckMyDatabase -- fetch information from the pg_database entry for our DB
330 : : */
331 : : static void
2952 magnus@hagander.net 332 : 16885 : CheckMyDatabase(const char *name, bool am_superuser, bool override_allow_connections)
333 : : {
334 : : HeapTuple tup;
335 : : Form_pg_database dbform;
336 : : Datum datum;
337 : : bool isnull;
338 : : char *collate;
339 : : char *ctype;
340 : :
341 : : /* Fetch our pg_database row normally, via syscache */
5924 rhaas@postgresql.org 342 : 16885 : tup = SearchSysCache1(DATABASEOID, ObjectIdGetDatum(MyDatabaseId));
7306 tgl@sss.pgh.pa.us 343 [ - + ]: 16885 : if (!HeapTupleIsValid(tup))
7306 tgl@sss.pgh.pa.us 344 [ # # ]:UBC 0 : elog(ERROR, "cache lookup failed for database %u", MyDatabaseId);
7306 tgl@sss.pgh.pa.us 345 :CBC 16885 : dbform = (Form_pg_database) GETSTRUCT(tup);
346 : :
347 : : /* This recheck is strictly paranoia */
348 [ - + ]: 16885 : if (strcmp(name, NameStr(dbform->datname)) != 0)
8320 tgl@sss.pgh.pa.us 349 [ # # ]:UBC 0 : ereport(FATAL,
350 : : (errcode(ERRCODE_UNDEFINED_DATABASE),
351 : : errmsg("database \"%s\" has disappeared from pg_database",
352 : : name),
353 : : errdetail("Database OID %u now seems to belong to \"%s\".",
354 : : MyDatabaseId, NameStr(dbform->datname))));
355 : :
356 : : /*
357 : : * Check permissions to connect to the database.
358 : : *
359 : : * These checks are not enforced when in standalone mode, so that there is
360 : : * a way to recover from disabling all access to all databases, for
361 : : * example "UPDATE pg_database SET datallowconn = false;".
362 : : */
493 tgl@sss.pgh.pa.us 363 [ + + ]:CBC 16885 : if (IsUnderPostmaster)
364 : : {
365 : : /*
366 : : * Check that the database is currently allowing connections.
367 : : * (Background processes can override this test and the next one by
368 : : * setting override_allow_connections.)
369 : : */
2952 magnus@hagander.net 370 [ + + + + ]: 16809 : if (!dbform->datallowconn && !override_allow_connections)
7583 tgl@sss.pgh.pa.us 371 [ + - ]: 1 : ereport(FATAL,
372 : : (errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
373 : : errmsg("database \"%s\" is not currently accepting connections",
374 : : name)));
375 : :
376 : : /*
377 : : * Check privilege to connect to the database. (The am_superuser test
378 : : * is redundant, but since we have the flag, might as well check it
379 : : * and save a few cycles.)
380 : : */
493 381 [ + + + + : 17251 : if (!am_superuser && !override_allow_connections &&
- + ]
1269 peter@eisentraut.org 382 : 443 : object_aclcheck(DatabaseRelationId, MyDatabaseId, GetUserId(),
383 : : ACL_CONNECT) != ACLCHECK_OK)
7310 tgl@sss.pgh.pa.us 384 [ # # ]:UBC 0 : ereport(FATAL,
385 : : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
386 : : errmsg("permission denied for database \"%s\"", name),
387 : : errdetail("User does not have CONNECT privilege.")));
388 : :
389 : : /*
390 : : * Check connection limit for this database. We enforce the limit
391 : : * only for regular backends, since other process types have their own
392 : : * PGPROC pools.
393 : : *
394 : : * There is a race condition here --- we create our PGPROC before
395 : : * checking for other PGPROCs. If two backends did this at about the
396 : : * same time, they might both think they were over the limit, while
397 : : * ideally one should succeed and one fail. Getting that to work
398 : : * exactly seems more trouble than it is worth, however; instead we
399 : : * just document that the connection limit is approximate.
400 : : */
7583 tgl@sss.pgh.pa.us 401 [ - + ]:CBC 16808 : if (dbform->datconnlimit >= 0 &&
493 tgl@sss.pgh.pa.us 402 [ # # ]:UBC 0 : AmRegularBackendProcess() &&
7310 403 [ # # ]: 0 : !am_superuser &&
3380 andrew@dunslane.net 404 [ # # ]: 0 : CountDBConnections(MyDatabaseId) > dbform->datconnlimit)
7583 tgl@sss.pgh.pa.us 405 [ # # ]: 0 : ereport(FATAL,
406 : : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
407 : : errmsg("too many connections for database \"%s\"",
408 : : name)));
409 : : }
410 : :
411 : : /*
412 : : * OK, we're golden. Next to-do item is to save the encoding info out of
413 : : * the pg_database tuple.
414 : : */
9303 tgl@sss.pgh.pa.us 415 :CBC 16884 : SetDatabaseEncoding(dbform->encoding);
416 : : /* Record it as a GUC internal option, too */
8411 417 : 16884 : SetConfigOption("server_encoding", GetDatabaseEncodingName(),
418 : : PGC_INTERNAL, PGC_S_DYNAMIC_DEFAULT);
419 : : /* If we have no other source of client_encoding, use server encoding */
8754 420 : 16884 : SetConfigOption("client_encoding", GetDatabaseEncodingName(),
421 : : PGC_BACKEND, PGC_S_DYNAMIC_DEFAULT);
422 : :
423 : : /* assign locale variables */
1137 dgustafsson@postgres 424 : 16884 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datcollate);
1559 peter@eisentraut.org 425 : 16884 : collate = TextDatumGetCString(datum);
1137 dgustafsson@postgres 426 : 16884 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datctype);
1559 peter@eisentraut.org 427 : 16884 : ctype = TextDatumGetCString(datum);
428 : :
429 : : /*
430 : : * Historically, we set LC_COLLATE from datcollate, as well. That's no
431 : : * longer necessary because all collation behavior is handled through
432 : : * pg_locale_t.
433 : : */
434 : :
6145 heikki.linnakangas@i 435 [ - + ]: 16884 : if (pg_perm_setlocale(LC_CTYPE, ctype) == NULL)
6172 bruce@momjian.us 436 [ # # ]:UBC 0 : ereport(FATAL,
437 : : (errmsg("database locale is incompatible with operating system"),
438 : : errdetail("The database was initialized with LC_CTYPE \"%s\", "
439 : : " which is not recognized by setlocale().", ctype),
440 : : errhint("Recreate the database with another locale or install the missing locale.")));
441 : :
646 jdavis@postgresql.or 442 :CBC 16884 : init_database_collation();
443 : :
444 : : /*
445 : : * Check collation version. See similar code in
446 : : * pg_newlocale_from_collation(). Note that here we warn instead of error
447 : : * in any case, so that we don't prevent connecting.
448 : : */
1541 peter@eisentraut.org 449 : 16882 : datum = SysCacheGetAttr(DATABASEOID, tup, Anum_pg_database_datcollversion,
450 : : &isnull);
451 [ + + ]: 16882 : if (!isnull)
452 : : {
453 : : char *actual_versionstr;
454 : : char *collversionstr;
455 : : char *locale;
456 : :
457 : 936 : collversionstr = TextDatumGetCString(datum);
458 : :
783 jdavis@postgresql.or 459 [ - + ]: 936 : if (dbform->datlocprovider == COLLPROVIDER_LIBC)
783 jdavis@postgresql.or 460 :UBC 0 : locale = collate;
461 : : else
462 : : {
646 jdavis@postgresql.or 463 :CBC 936 : datum = SysCacheGetAttrNotNull(DATABASEOID, tup, Anum_pg_database_datlocale);
464 : 936 : locale = TextDatumGetCString(datum);
465 : : }
466 : :
783 467 : 936 : actual_versionstr = get_collation_actual_version(dbform->datlocprovider, locale);
1541 peter@eisentraut.org 468 [ - + ]: 936 : if (!actual_versionstr)
469 : : /* should not happen */
1336 alvherre@alvh.no-ip. 470 [ # # ]:UBC 0 : elog(WARNING,
471 : : "database \"%s\" has no actual collation version, but a version was recorded",
472 : : name);
1534 peter@eisentraut.org 473 [ - + ]:CBC 936 : else if (strcmp(actual_versionstr, collversionstr) != 0)
1541 peter@eisentraut.org 474 [ # # ]:UBC 0 : ereport(WARNING,
475 : : (errmsg("database \"%s\" has a collation version mismatch",
476 : : name),
477 : : errdetail("The database was created using collation version %s, "
478 : : "but the operating system provides version %s.",
479 : : collversionstr, actual_versionstr),
480 : : errhint("Rebuild all objects in this database that use the default collation and run "
481 : : "ALTER DATABASE %s REFRESH COLLATION VERSION, "
482 : : "or build PostgreSQL with the right library version.",
483 : : quote_identifier(name))));
484 : : }
485 : :
7306 tgl@sss.pgh.pa.us 486 :CBC 16882 : ReleaseSysCache(tup);
9720 487 : 16882 : }
488 : :
489 : :
490 : : /*
491 : : * pg_split_opts -- split a string of options and append it to an argv array
492 : : *
493 : : * The caller is responsible for ensuring the argv array is large enough. The
494 : : * maximum possible number of arguments added by this routine is
495 : : * (strlen(optstr) + 1) / 2.
496 : : *
497 : : * Because some option values can contain spaces we allow escaping using
498 : : * backslashes, with \\ representing a literal backslash.
499 : : */
500 : : void
3963 501 : 4212 : pg_split_opts(char **argv, int *argcp, const char *optstr)
502 : : {
503 : : StringInfoData s;
504 : :
4268 andres@anarazel.de 505 : 4212 : initStringInfo(&s);
506 : :
6093 tgl@sss.pgh.pa.us 507 [ + + ]: 15445 : while (*optstr)
508 : : {
4252 509 : 11233 : bool last_was_escape = false;
510 : :
4268 andres@anarazel.de 511 : 11233 : resetStringInfo(&s);
512 : :
513 : : /* skip over leading space */
6093 tgl@sss.pgh.pa.us 514 [ + + ]: 21466 : while (isspace((unsigned char) *optstr))
515 : 10233 : optstr++;
516 : :
517 [ - + ]: 11233 : if (*optstr == '\0')
6093 tgl@sss.pgh.pa.us 518 :UBC 0 : break;
519 : :
520 : : /*
521 : : * Parse a single option, stopping at the first space, unless it's
522 : : * escaped.
523 : : */
4268 andres@anarazel.de 524 [ + + ]:CBC 171564 : while (*optstr)
525 : : {
4264 tgl@sss.pgh.pa.us 526 [ + + + + ]: 167352 : if (isspace((unsigned char) *optstr) && !last_was_escape)
4268 andres@anarazel.de 527 : 7021 : break;
528 : :
529 [ + + + + ]: 160331 : if (!last_was_escape && *optstr == '\\')
530 : 20 : last_was_escape = true;
531 : : else
532 : : {
533 : 160311 : last_was_escape = false;
534 : 160311 : appendStringInfoChar(&s, *optstr);
535 : : }
536 : :
6093 tgl@sss.pgh.pa.us 537 : 160331 : optstr++;
538 : : }
539 : :
540 : : /* now store the option in the next argv[] position */
4268 andres@anarazel.de 541 : 11233 : argv[(*argcp)++] = pstrdup(s.data);
542 : : }
543 : :
3963 tgl@sss.pgh.pa.us 544 : 4212 : pfree(s.data);
6093 545 : 4212 : }
546 : :
547 : : /*
548 : : * Initialize MaxBackends value from config options.
549 : : *
550 : : * This must be called after modules have had the chance to alter GUCs in
551 : : * shared_preload_libraries and before shared memory size is determined.
552 : : *
553 : : * Note that in EXEC_BACKEND environment, the value is passed down from
554 : : * postmaster to subprocesses via BackendParameters in SubPostmasterMain; only
555 : : * postmaster itself and processes not under postmaster control should call
556 : : * this.
557 : : */
558 : : void
4871 alvherre@alvh.no-ip. 559 : 1239 : InitializeMaxBackends(void)
560 : : {
1484 rhaas@postgresql.org 561 [ - + ]: 1239 : Assert(MaxBackends == 0);
562 : :
563 : : /* Note that this does not include "auxiliary" processes */
484 nathan@postgresql.or 564 : 1239 : MaxBackends = MaxConnections + autovacuum_worker_slots +
493 tgl@sss.pgh.pa.us 565 : 1239 : max_worker_processes + max_wal_senders + NUM_SPECIAL_WORKER_PROCS;
566 : :
1484 rhaas@postgresql.org 567 [ - + ]: 1239 : if (MaxBackends > MAX_BACKENDS)
669 nathan@postgresql.or 568 [ # # ]:UBC 0 : ereport(ERROR,
569 : : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
570 : : errmsg("too many server processes configured"),
571 : : errdetail("\"max_connections\" (%d) plus \"autovacuum_worker_slots\" (%d) plus \"max_worker_processes\" (%d) plus \"max_wal_senders\" (%d) must be less than %d.",
572 : : MaxConnections, autovacuum_worker_slots,
573 : : max_worker_processes, max_wal_senders,
574 : : MAX_BACKENDS - (NUM_SPECIAL_WORKER_PROCS - 1))));
1330 tgl@sss.pgh.pa.us 575 :CBC 1239 : }
576 : :
577 : : /*
578 : : * Initialize the number of fast-path lock slots in PGPROC.
579 : : *
580 : : * This must be called after modules have had the chance to alter GUCs in
581 : : * shared_preload_libraries and before shared memory size is determined.
582 : : */
583 : : void
591 tomas.vondra@postgre 584 : 1239 : InitializeFastPathLocks(void)
585 : : {
586 : : /* Should be initialized only once. */
587 [ - + ]: 1239 : Assert(FastPathLockGroupsPerBackend == 0);
588 : :
589 : : /*
590 : : * Based on the max_locks_per_transaction GUC, as that's a good indicator
591 : : * of the expected number of locks, figure out the value for
592 : : * FastPathLockGroupsPerBackend. This must be a power-of-two. We cap the
593 : : * value at FP_LOCK_GROUPS_PER_BACKEND_MAX and insist the value is at
594 : : * least 1.
595 : : *
596 : : * The default max_locks_per_transaction = 128 means 8 groups by default.
597 : : */
373 drowley@postgresql.o 598 : 1239 : FastPathLockGroupsPerBackend =
599 [ + - + - : 1239 : Max(Min(pg_nextpower2_32(max_locks_per_xact) / FP_LOCK_SLOTS_PER_GROUP,
+ - ]
600 : : FP_LOCK_GROUPS_PER_BACKEND_MAX), 1);
601 : :
602 : : /* Validate we did get a power-of-two */
603 [ - + ]: 1239 : Assert(FastPathLockGroupsPerBackend ==
604 : : pg_nextpower2_32(FastPathLockGroupsPerBackend));
591 tomas.vondra@postgre 605 : 1239 : }
606 : :
607 : : /*
608 : : * Early initialization of a backend (either standalone or under postmaster).
609 : : * This happens even before InitPostgres.
610 : : *
611 : : * This is separate from InitPostgres because it is also called by auxiliary
612 : : * processes, such as the background writer process, which may not call
613 : : * InitPostgres at all.
614 : : */
615 : : void
9269 tgl@sss.pgh.pa.us 616 : 23064 : BaseInit(void)
617 : : {
1734 andres@anarazel.de 618 [ - + ]: 23064 : Assert(MyProc != NULL);
619 : :
620 : : /*
621 : : * Initialize our input/output/debugging file descriptors.
622 : : */
9269 tgl@sss.pgh.pa.us 623 : 23064 : DebugFileOpen();
624 : :
625 : : /*
626 : : * Initialize file access. Done early so other subsystems can access
627 : : * files.
628 : : */
1732 andres@anarazel.de 629 : 23064 : InitFileAccess();
630 : :
631 : : /*
632 : : * Initialize statistics reporting. This needs to happen early to ensure
633 : : * that pgstat's shutdown callback runs after the shutdown callbacks of
634 : : * all subsystems that can produce stats (like e.g. transaction commits
635 : : * can).
636 : : */
1733 637 : 23064 : pgstat_initialize();
638 : :
639 : : /*
640 : : * Initialize AIO before infrastructure that might need to actually
641 : : * execute AIO.
642 : : */
414 643 : 23064 : pgaio_init_backend();
644 : :
645 : : /* Do local initialization of storage and buffer managers */
2588 tmunro@postgresql.or 646 : 23064 : InitSync();
9269 tgl@sss.pgh.pa.us 647 : 23064 : smgrinit();
614 heikki.linnakangas@i 648 : 23064 : InitBufferManagerAccess();
649 : :
650 : : /*
651 : : * Initialize temporary file access after pgstat, so that the temporary
652 : : * file shutdown hook can report temporary file statistics.
653 : : */
1732 andres@anarazel.de 654 : 23064 : InitTemporaryFileAccess();
655 : :
656 : : /*
657 : : * Initialize local buffers for WAL record construction, in case we ever
658 : : * try to insert XLOG.
659 : : */
1631 rhaas@postgresql.org 660 : 23064 : InitXLogInsert();
661 : :
662 : : /* Initialize lock manager's local structs */
614 heikki.linnakangas@i 663 : 23064 : InitLockManagerAccess();
664 : :
665 : : /* Initialize logical info WAL logging state */
133 msawada@postgresql.o 666 :GNC 23064 : InitializeProcessXLogLogicalInfo();
667 : :
668 : : /*
669 : : * Initialize replication slots after pgstat. The exit hook might need to
670 : : * drop ephemeral slots, which in turn triggers stats reporting.
671 : : */
1541 andres@anarazel.de 672 :CBC 23064 : ReplicationSlotInitialize();
9269 tgl@sss.pgh.pa.us 673 : 23064 : }
674 : :
675 : :
676 : : /* --------------------------------
677 : : * InitPostgres
678 : : * Initialize POSTGRES.
679 : : *
680 : : * Parameters:
681 : : * in_dbname, dboid: specify database to connect to, as described below
682 : : * username, useroid: specify role to connect as, as described below
683 : : * flags:
684 : : * - INIT_PG_LOAD_SESSION_LIBS to honor [session|local]_preload_libraries.
685 : : * - INIT_PG_OVERRIDE_ALLOW_CONNS to connect despite !datallowconn.
686 : : * - INIT_PG_OVERRIDE_ROLE_LOGIN to connect despite !rolcanlogin.
687 : : * out_dbname: optional output parameter, see below; pass NULL if not used
688 : : *
689 : : * The database can be specified by name, using the in_dbname parameter, or by
690 : : * OID, using the dboid parameter. Specify NULL or InvalidOid respectively
691 : : * for the unused parameter. If dboid is provided, the actual database
692 : : * name can be returned to the caller in out_dbname. If out_dbname isn't
693 : : * NULL, it must point to a buffer of size NAMEDATALEN.
694 : : *
695 : : * Similarly, the role can be passed by name, using the username parameter,
696 : : * or by OID using the useroid parameter.
697 : : *
698 : : * In bootstrap mode the database and username parameters are NULL/InvalidOid.
699 : : * The autovacuum launcher process doesn't specify these parameters either,
700 : : * because it only goes far enough to be able to read pg_database; it doesn't
701 : : * connect to any particular database. An autovacuum worker specifies a
702 : : * database but not a username; conversely, a physical walsender specifies
703 : : * username but not database.
704 : : *
705 : : * By convention, INIT_PG_LOAD_SESSION_LIBS should be passed in "flags" in
706 : : * "interactive" sessions (including standalone backends), but not in
707 : : * background processes such as autovacuum. Note in particular that it
708 : : * shouldn't be true in parallel worker processes; those have another
709 : : * mechanism for replicating their leader's set of loaded libraries.
710 : : *
711 : : * We expect that InitProcess() was already called, so we already have a
712 : : * PGPROC struct ... but it's not completely filled in yet.
713 : : *
714 : : * Note:
715 : : * Be very careful with the order of calls in the InitPostgres function.
716 : : * --------------------------------
717 : : */
718 : : void
1380 719 : 18680 : InitPostgres(const char *in_dbname, Oid dboid,
720 : : const char *username, Oid useroid,
721 : : uint32 flags,
722 : : char *out_dbname)
723 : : {
9609 peter_e@gmx.net 724 : 18680 : bool bootstrap = IsBootstrapProcessingMode();
725 : : bool am_superuser;
726 : : char *fullpath;
727 : : char dbname[NAMEDATALEN];
1201 rhaas@postgresql.org 728 : 18680 : int nfree = 0;
729 : :
6093 tgl@sss.pgh.pa.us 730 [ + + ]: 18680 : elog(DEBUG3, "InitPostgres");
731 : :
732 : : /*
733 : : * Add my PGPROC struct to the ProcArray.
734 : : *
735 : : * Once I have done this, I am visible to other backends!
736 : : */
7426 737 : 18680 : InitProcessPhase2();
738 : :
739 : : /* Initialize status reporting */
427 michael@paquier.xyz 740 : 18680 : pgstat_beinit();
741 : :
742 : : /*
743 : : * And initialize an entry in the PgBackendStatus array. That way, if
744 : : * LWLocks or third-party authentication should happen to hang, it is
745 : : * possible to retrieve some information about what is going on.
746 : : */
747 [ + + ]: 18680 : if (!bootstrap)
748 : : {
749 : 18623 : pgstat_bestart_initial();
360 750 : 18623 : INJECTION_POINT("init-pre-auth", NULL);
751 : : }
752 : :
753 : : /*
754 : : * Initialize my entry in the shared-invalidation manager's array of
755 : : * per-backend data.
756 : : */
5981 simon@2ndQuadrant.co 757 : 18680 : SharedInvalBackendInit(false);
758 : :
759 : : /*
760 : : * Prevent consuming interrupts between setting ProcSignalInit and setting
761 : : * the initial local data checksum value. If a barrier is emitted, and
762 : : * absorbed, before local cached state is initialized the state transition
763 : : * can be invalid.
764 : : */
5 dgustafsson@postgres 765 :GNC 18680 : HOLD_INTERRUPTS();
766 : :
398 heikki.linnakangas@i 767 :CBC 18680 : ProcSignalInit(MyCancelKey, MyCancelKeyLength);
768 : :
769 : : /*
770 : : * Initialize a local cache of the data_checksum_version, to be updated by
771 : : * the procsignal-based barriers.
772 : : *
773 : : * This intentionally happens after initializing the procsignal, otherwise
774 : : * we might miss a state change. This means we can get a barrier for the
775 : : * state we've just initialized.
776 : : *
777 : : * The postmaster (which is what gets forked into the new child process)
778 : : * does not handle barriers, therefore it may not have the current value
779 : : * of LocalDataChecksumVersion value (it'll have the value read from the
780 : : * control file, which may be arbitrarily old).
781 : : *
782 : : * NB: Even if the postmaster handled barriers, the value might still be
783 : : * stale, as it might have changed after this process forked.
784 : : */
32 dgustafsson@postgres 785 :GNC 18680 : InitLocalDataChecksumState();
786 : :
5 787 [ - + ]: 18680 : RESUME_INTERRUPTS();
788 : :
789 : : /*
790 : : * Also set up timeout handlers needed for backend operation. We need
791 : : * these in every case except bootstrap.
792 : : */
5041 alvherre@alvh.no-ip. 793 [ + + ]:CBC 18680 : if (!bootstrap)
794 : : {
4109 andres@anarazel.de 795 : 18623 : RegisterTimeout(DEADLOCK_TIMEOUT, CheckDeadLockAlert);
5041 alvherre@alvh.no-ip. 796 : 18623 : RegisterTimeout(STATEMENT_TIMEOUT, StatementTimeoutHandler);
4798 tgl@sss.pgh.pa.us 797 : 18623 : RegisterTimeout(LOCK_TIMEOUT, LockTimeoutHandler);
3702 rhaas@postgresql.org 798 : 18623 : RegisterTimeout(IDLE_IN_TRANSACTION_SESSION_TIMEOUT,
799 : : IdleInTransactionSessionTimeoutHandler);
810 akorotkov@postgresql 800 : 18623 : RegisterTimeout(TRANSACTION_TIMEOUT, TransactionTimeoutHandler);
1945 tgl@sss.pgh.pa.us 801 : 18623 : RegisterTimeout(IDLE_SESSION_TIMEOUT, IdleSessionTimeoutHandler);
1858 tmunro@postgresql.or 802 : 18623 : RegisterTimeout(CLIENT_CONNECTION_CHECK_TIMEOUT, ClientCheckTimeoutHandler);
1490 andres@anarazel.de 803 : 18623 : RegisterTimeout(IDLE_STATS_UPDATE_TIMEOUT,
804 : : IdleStatsUpdateTimeoutHandler);
805 : : }
806 : :
807 : : /*
808 : : * If this is either a bootstrap process or a standalone backend, start up
809 : : * the XLOG machinery, and register to have it closed down at exit. In
810 : : * other cases, the startup process is responsible for starting up the
811 : : * XLOG machinery, and the checkpointer for closing it down.
812 : : */
1604 rhaas@postgresql.org 813 [ + + ]: 18680 : if (!IsUnderPostmaster)
814 : : {
815 : : /*
816 : : * We don't yet have an aux-process resource owner, but StartupXLOG
817 : : * and ShutdownXLOG will need one. Hence, create said resource owner
818 : : * (and register a callback to clean it up after ShutdownXLOG runs).
819 : : */
2848 tgl@sss.pgh.pa.us 820 : 133 : CreateAuxProcessResourceOwner();
821 : :
5859 822 : 133 : StartupXLOG();
823 : : /* Release (and warn about) any buffer pins leaked in StartupXLOG */
2848 824 : 133 : ReleaseAuxProcessResources(true);
825 : : /* Reset CurrentResourceOwner to nothing for the moment */
826 : 133 : CurrentResourceOwner = NULL;
827 : :
828 : : /*
829 : : * Use before_shmem_exit() so that ShutdownXLOG() can rely on DSM
830 : : * segments etc to work (which in turn is required for pgstats).
831 : : */
1490 andres@anarazel.de 832 : 133 : before_shmem_exit(pgstat_before_server_shutdown, 0);
1866 833 : 133 : before_shmem_exit(ShutdownXLOG, 0);
834 : : }
835 : :
836 : : /*
837 : : * Initialize the relation cache and the system catalog caches. Note that
838 : : * no catalog access happens here; we only set up the hashtable structure.
839 : : * We must do this before starting a transaction because transaction abort
840 : : * would try to touch these hashtables.
841 : : */
9019 tgl@sss.pgh.pa.us 842 : 18680 : RelationCacheInitialize();
10467 bruce@momjian.us 843 : 18680 : InitCatalogCache();
6993 tgl@sss.pgh.pa.us 844 : 18680 : InitPlanCache();
845 : :
846 : : /* Initialize portal manager */
9089 847 : 18680 : EnablePortalManager();
848 : :
849 : : /*
850 : : * Load relcache entries for the shared system catalogs. This must create
851 : : * at least entries for pg_database and catalogs used for authentication.
852 : : */
6091 853 : 18680 : RelationCacheInitializePhase2();
854 : :
855 : : /*
856 : : * Set up process-exit callback to do pre-shutdown cleanup. This is one
857 : : * of the first before_shmem_exit callbacks we register; thus, this will
858 : : * be one of the last things we do before low-level modules like the
859 : : * buffer manager begin to close down. We need to have this in place
860 : : * before we begin our first transaction --- if we fail during the
861 : : * initialization transaction, as is entirely possible, we need the
862 : : * AbortTransaction call to clean up.
863 : : */
4521 rhaas@postgresql.org 864 : 18680 : before_shmem_exit(ShutdownPostgres, 0);
865 : :
866 : : /* The autovacuum launcher is done here */
792 heikki.linnakangas@i 867 [ + + ]: 18680 : if (AmAutoVacuumLauncherProcess())
868 : : {
869 : : /* fill in the remainder of this entry in the PgBackendStatus array */
427 michael@paquier.xyz 870 : 477 : pgstat_bestart_final();
871 : :
6090 tgl@sss.pgh.pa.us 872 : 1511 : return;
873 : : }
874 : :
875 : : /*
876 : : * Start a new transaction here before first access to db.
877 : : */
9631 inoue@tpf.co.jp 878 [ + + ]: 18203 : if (!bootstrap)
879 : : {
880 : : /* statement_timestamp must be set for timeouts to work correctly */
5379 tgl@sss.pgh.pa.us 881 : 18146 : SetCurrentStatementStartTimestamp();
8392 882 : 18146 : StartTransactionCommand();
883 : :
884 : : /*
885 : : * transaction_isolation will have been set to the default by the
886 : : * above. If the default is "serializable", and we are in hot
887 : : * standby, we will fail if we don't change it to something lower.
888 : : * Fortunately, "read committed" is plenty good enough.
889 : : */
5002 890 : 18146 : XactIsoLevel = XACT_READ_COMMITTED;
891 : : }
892 : :
893 : : /*
894 : : * Perform client authentication if necessary, then figure out our
895 : : * postgres user ID, and see if we are a superuser.
896 : : *
897 : : * In standalone mode, autovacuum worker processes and slot sync worker
898 : : * process, we use a fixed ID, otherwise we figure it out from the
899 : : * authenticated user name.
900 : : */
792 heikki.linnakangas@i 901 [ + + + + : 18203 : if (bootstrap || AmAutoVacuumWorkerProcess() || AmLogicalSlotSyncWorkerProcess())
+ + ]
902 : : {
5859 tgl@sss.pgh.pa.us 903 : 123 : InitializeSessionUserIdStandalone();
904 : 123 : am_superuser = true;
905 : : }
906 [ + + ]: 18080 : else if (!IsUnderPostmaster)
907 : : {
908 : 76 : InitializeSessionUserIdStandalone();
909 : 76 : am_superuser = true;
910 [ - + ]: 76 : if (!ThereIsAtLeastOneRole())
5859 tgl@sss.pgh.pa.us 911 [ # # # # ]:UBC 0 : ereport(WARNING,
912 : : (errcode(ERRCODE_UNDEFINED_OBJECT),
913 : : errmsg("no roles are defined in this database system"),
914 : : errhint("You should immediately run CREATE USER \"%s\" SUPERUSER;.",
915 : : username != NULL ? username : "postgres")));
916 : : }
32 dgustafsson@postgres 917 [ + + + + :GNC 18004 : else if (AmBackgroundWorkerProcess() || AmDataChecksumsWorkerProcess())
+ + ]
918 : : {
4110 rhaas@postgresql.org 919 [ + - + + ]:CBC 3160 : if (username == NULL && !OidIsValid(useroid))
920 : : {
4898 alvherre@alvh.no-ip. 921 : 552 : InitializeSessionUserIdStandalone();
922 : 552 : am_superuser = true;
923 : : }
924 : : else
925 : : {
936 michael@paquier.xyz 926 : 2608 : InitializeSessionUserId(username, useroid,
927 : 2608 : (flags & INIT_PG_OVERRIDE_ROLE_LOGIN) != 0);
493 tgl@sss.pgh.pa.us 928 : 2606 : am_superuser = superuser();
929 : : }
930 : : }
931 : : else
932 : : {
933 : : /* normal multiuser case */
5859 934 [ - + ]: 14844 : Assert(MyProcPort != NULL);
935 : 14844 : PerformAuthentication(MyProcPort);
936 michael@paquier.xyz 936 : 14637 : InitializeSessionUserId(username, useroid, false);
937 : : /* ensure that auth_method is actually valid, aka authn_id is not NULL */
1314 938 [ + + ]: 14633 : if (MyClientConnectionInfo.authn_id)
939 : 187 : InitializeSystemUser(MyClientConnectionInfo.authn_id,
940 : : hba_authname(MyClientConnectionInfo.auth_method));
5859 tgl@sss.pgh.pa.us 941 : 14633 : am_superuser = superuser();
942 : : }
943 : :
944 : : /* Report any SSL/GSS details for the session. */
427 michael@paquier.xyz 945 [ + + ]: 17990 : if (MyProcPort != NULL)
946 : : {
947 [ - + ]: 14633 : Assert(!bootstrap);
948 : :
949 : 14633 : pgstat_bestart_security();
950 : : }
951 : :
952 : : /*
953 : : * Binary upgrades only allowed super-user connections
954 : : */
5489 bruce@momjian.us 955 [ + + - + ]: 17990 : if (IsBinaryUpgrade && !am_superuser)
956 : : {
5444 bruce@momjian.us 957 [ # # ]:UBC 0 : ereport(FATAL,
958 : : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
959 : : errmsg("must be superuser to connect in binary upgrade mode")));
960 : : }
961 : :
962 : : /*
963 : : * The last few regular connection slots are reserved for superusers and
964 : : * roles with privileges of pg_use_reserved_connections. We do not apply
965 : : * these limits to background processes, since they all have their own
966 : : * pools of PGPROC slots.
967 : : *
968 : : * Note: At this point, the new backend has already claimed a proc struct,
969 : : * so we must check whether the number of free slots is strictly less than
970 : : * the reserved connection limits.
971 : : */
493 tgl@sss.pgh.pa.us 972 [ + + + + ]:CBC 17990 : if (AmRegularBackendProcess() && !am_superuser &&
1201 rhaas@postgresql.org 973 [ + - ]: 410 : (SuperuserReservedConnections + ReservedConnections) > 0 &&
974 [ + + ]: 410 : !HaveNFreeProcs(SuperuserReservedConnections + ReservedConnections, &nfree))
975 : : {
976 [ + + ]: 4 : if (nfree < SuperuserReservedConnections)
977 [ + - ]: 1 : ereport(FATAL,
978 : : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
979 : : errmsg("remaining connection slots are reserved for roles with the %s attribute",
980 : : "SUPERUSER")));
981 : :
982 [ + + ]: 3 : if (!has_privs_of_role(GetUserId(), ROLE_PG_USE_RESERVED_CONNECTIONS))
983 [ + - ]: 1 : ereport(FATAL,
984 : : (errcode(ERRCODE_TOO_MANY_CONNECTIONS),
985 : : errmsg("remaining connection slots are reserved for roles with privileges of the \"%s\" role",
986 : : "pg_use_reserved_connections")));
987 : : }
988 : :
989 : : /* Check replication permissions needed for walsender processes. */
5859 tgl@sss.pgh.pa.us 990 [ + + ]: 17988 : if (am_walsender)
991 : : {
992 [ - + ]: 1289 : Assert(!bootstrap);
993 : :
1146 peter@eisentraut.org 994 [ - + ]: 1289 : if (!has_rolreplication(GetUserId()))
5858 tgl@sss.pgh.pa.us 995 [ # # ]:UBC 0 : ereport(FATAL,
996 : : (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
997 : : errmsg("permission denied to start WAL sender"),
998 : : errdetail("Only roles with the %s attribute may start a WAL sender process.",
999 : : "REPLICATION")));
1000 : : }
1001 : :
1002 : : /*
1003 : : * If this is a plain walsender only supporting physical replication, we
1004 : : * don't want to connect to any particular database. Just finish the
1005 : : * backend startup by processing any options from the startup packet, and
1006 : : * we're done.
1007 : : */
4439 rhaas@postgresql.org 1008 [ + + + + ]:CBC 17988 : if (am_walsender && !am_db_walsender)
1009 : : {
1010 : : /* process any options passed in the startup packet */
5713 heikki.linnakangas@i 1011 [ + - ]: 509 : if (MyProcPort != NULL)
1012 : 509 : process_startup_options(MyProcPort, am_superuser);
1013 : :
1014 : : /* Apply PostAuthDelay as soon as we've read all options */
1015 [ - + ]: 509 : if (PostAuthDelay > 0)
5713 heikki.linnakangas@i 1016 :UBC 0 : pg_usleep(PostAuthDelay * 1000000L);
1017 : :
1018 : : /* initialize client encoding */
5713 heikki.linnakangas@i 1019 :CBC 509 : InitializeClientEncoding();
1020 : :
1021 : : /* fill in the remainder of this entry in the PgBackendStatus array */
427 michael@paquier.xyz 1022 : 509 : pgstat_bestart_final();
1023 : :
1024 : : /* close the transaction we started above */
5859 tgl@sss.pgh.pa.us 1025 : 509 : CommitTransactionCommand();
1026 : :
1027 : : /* send any WARNINGs we've accumulated during initialization */
83 nathan@postgresql.or 1028 :GNC 509 : EmitConnectionWarnings();
1029 : :
5859 tgl@sss.pgh.pa.us 1030 :CBC 509 : return;
1031 : : }
1032 : :
1033 : : /*
1034 : : * Set up the global variables holding database id and default tablespace.
1035 : : * But note we won't actually try to touch the database just yet.
1036 : : *
1037 : : * We take a shortcut in the bootstrap case, otherwise we have to look up
1038 : : * the db's entry in pg_database.
1039 : : */
1040 [ + + ]: 17479 : if (bootstrap)
1041 : : {
974 michael@paquier.xyz 1042 : 57 : dboid = Template1DbOid;
6110 tgl@sss.pgh.pa.us 1043 : 57 : MyDatabaseTableSpace = DEFAULTTABLESPACE_OID;
1044 : : }
1045 [ + + ]: 17422 : else if (in_dbname != NULL)
1046 : : {
1047 : : HeapTuple tuple;
1048 : : Form_pg_database dbform;
1049 : :
1050 : 14204 : tuple = GetDatabaseTuple(in_dbname);
1051 [ + + ]: 14204 : if (!HeapTupleIsValid(tuple))
1052 [ + - ]: 6 : ereport(FATAL,
1053 : : (errcode(ERRCODE_UNDEFINED_DATABASE),
1054 : : errmsg("database \"%s\" does not exist", in_dbname)));
1055 : 14198 : dbform = (Form_pg_database) GETSTRUCT(tuple);
974 michael@paquier.xyz 1056 : 14198 : dboid = dbform->oid;
1057 : : }
1058 [ + + ]: 3218 : else if (!OidIsValid(dboid))
1059 : : {
1060 : : /*
1061 : : * If this is a background worker not bound to any particular
1062 : : * database, we're done now. Everything that follows only makes sense
1063 : : * if we are bound to a specific database. We do need to close the
1064 : : * transaction we started before returning.
1065 : : */
3967 rhaas@postgresql.org 1066 [ + - ]: 525 : if (!bootstrap)
1067 : : {
427 michael@paquier.xyz 1068 : 525 : pgstat_bestart_final();
3967 rhaas@postgresql.org 1069 : 525 : CommitTransactionCommand();
1070 : : }
1071 : 525 : return;
1072 : : }
1073 : :
1074 : : /*
1075 : : * Now, take a writer's lock on the database we are trying to connect to.
1076 : : * If there is a concurrently running DROP DATABASE on that database, this
1077 : : * will block us until it finishes (and has committed its update of
1078 : : * pg_database).
1079 : : *
1080 : : * Note that the lock is not held long, only until the end of this startup
1081 : : * transaction. This is OK since we will advertise our use of the
1082 : : * database in the ProcArray before dropping the lock (in fact, that's the
1083 : : * next thing to do). Anyone trying a DROP DATABASE after this point will
1084 : : * see us in the array once they have the lock. Ordering is important for
1085 : : * this because we don't want to advertise ourselves as being in this
1086 : : * database until we have the lock; otherwise we create what amounts to a
1087 : : * deadlock with CountOtherDBBackends().
1088 : : *
1089 : : * Note: use of RowExclusiveLock here is reasonable because we envision
1090 : : * our session as being a concurrent writer of the database. If we had a
1091 : : * way of declaring a session as being guaranteed-read-only, we could use
1092 : : * AccessShareLock for such sessions and thereby not conflict against
1093 : : * CREATE DATABASE.
1094 : : */
5859 tgl@sss.pgh.pa.us 1095 [ + + ]: 16948 : if (!bootstrap)
974 michael@paquier.xyz 1096 : 16891 : LockSharedObject(DatabaseRelationId, dboid, 0, RowExclusiveLock);
1097 : :
1098 : : /*
1099 : : * Recheck pg_database to make sure the target database hasn't gone away.
1100 : : * If there was a concurrent DROP DATABASE, this ensures we will die
1101 : : * cleanly without creating a mess.
1102 : : */
1103 [ + + ]: 16948 : if (!bootstrap)
1104 : : {
1105 : : HeapTuple tuple;
1106 : : Form_pg_database datform;
1107 : :
1108 : 16891 : tuple = GetDatabaseTupleByOid(dboid);
1109 [ + - ]: 16891 : if (HeapTupleIsValid(tuple))
1110 : 16891 : datform = (Form_pg_database) GETSTRUCT(tuple);
1111 : :
1112 [ + - + + ]: 16891 : if (!HeapTupleIsValid(tuple) ||
1113 [ - + ]: 14198 : (in_dbname && namestrcmp(&datform->datname, in_dbname)))
1114 : : {
974 michael@paquier.xyz 1115 [ # # ]:UBC 0 : if (in_dbname)
1116 [ # # ]: 0 : ereport(FATAL,
1117 : : (errcode(ERRCODE_UNDEFINED_DATABASE),
1118 : : errmsg("database \"%s\" does not exist", in_dbname),
1119 : : errdetail("It seems to have just been dropped or renamed.")));
1120 : : else
1121 [ # # ]: 0 : ereport(FATAL,
1122 : : (errcode(ERRCODE_UNDEFINED_DATABASE),
1123 : : errmsg("database %u does not exist", dboid)));
1124 : : }
1125 : :
974 michael@paquier.xyz 1126 :CBC 16891 : strlcpy(dbname, NameStr(datform->datname), sizeof(dbname));
1127 : :
1128 [ + + ]: 16891 : if (database_is_invalid_form(datform))
1129 : : {
1130 [ + - ]: 4 : ereport(FATAL,
1131 : : errcode(ERRCODE_OBJECT_NOT_IN_PREREQUISITE_STATE),
1132 : : errmsg("cannot connect to invalid database \"%s\"", dbname),
1133 : : errhint("Use DROP DATABASE to drop invalid databases."));
1134 : : }
1135 : :
1136 : 16887 : MyDatabaseTableSpace = datform->dattablespace;
932 akorotkov@postgresql 1137 : 16887 : MyDatabaseHasLoginEventTriggers = datform->dathasloginevt;
1138 : : /* pass the database name back to the caller */
974 michael@paquier.xyz 1139 [ + + ]: 16887 : if (out_dbname)
1140 : 60 : strcpy(out_dbname, dbname);
1141 : : }
1142 : :
1143 : : /*
1144 : : * Now that we rechecked, we are certain to be connected to a database and
1145 : : * thus can set MyDatabaseId.
1146 : : *
1147 : : * It is important that MyDatabaseId only be set once we are sure that the
1148 : : * target database can no longer be concurrently dropped or renamed. For
1149 : : * example, without this guarantee, pgstat_update_dbstats() could create
1150 : : * entries for databases that were just dropped in the pgstat shutdown
1151 : : * callback, which could confuse other code paths like the autovacuum
1152 : : * scheduler.
1153 : : */
1154 : 16944 : MyDatabaseId = dboid;
1155 : :
1156 : : /*
1157 : : * Now we can mark our PGPROC entry with the database ID.
1158 : : *
1159 : : * We assume this is an atomic store so no lock is needed; though actually
1160 : : * things would work fine even if it weren't atomic. Anyone searching the
1161 : : * ProcArray for this database's ID should hold the database lock, so they
1162 : : * would not be executing concurrently with this store. A process looking
1163 : : * for another database's ID could in theory see a chance match if it read
1164 : : * a partially-updated databaseId value; but as long as all such searches
1165 : : * wait and retry, as in CountOtherDBBackends(), they will certainly see
1166 : : * the correct value on their next try.
1167 : : */
3987 tgl@sss.pgh.pa.us 1168 : 16944 : MyProc->databaseId = MyDatabaseId;
1169 : :
1170 : : /*
1171 : : * We established a catalog snapshot while reading pg_authid and/or
1172 : : * pg_database; but until we have set up MyDatabaseId, we won't react to
1173 : : * incoming sinval messages for unshared catalogs, so we won't realize it
1174 : : * if the snapshot has been invalidated. Assume it's no good anymore.
1175 : : */
1176 : 16944 : InvalidateCatalogSnapshot();
1177 : :
1178 : : /*
1179 : : * Now we should be able to access the database directory safely. Verify
1180 : : * it's there and looks reasonable.
1181 : : */
6110 1182 : 16944 : fullpath = GetDatabasePath(MyDatabaseId, MyDatabaseTableSpace);
1183 : :
5859 1184 [ + + ]: 16944 : if (!bootstrap)
1185 : : {
7306 1186 [ - + ]: 16887 : if (access(fullpath, F_OK) == -1)
1187 : : {
7306 tgl@sss.pgh.pa.us 1188 [ # # ]:UBC 0 : if (errno == ENOENT)
1189 [ # # ]: 0 : ereport(FATAL,
1190 : : (errcode(ERRCODE_UNDEFINED_DATABASE),
1191 : : errmsg("database \"%s\" does not exist",
1192 : : dbname),
1193 : : errdetail("The database subdirectory \"%s\" is missing.",
1194 : : fullpath)));
1195 : : else
1196 [ # # ]: 0 : ereport(FATAL,
1197 : : (errcode_for_file_access(),
1198 : : errmsg("could not access directory \"%s\": %m",
1199 : : fullpath)));
1200 : : }
1201 : :
7306 tgl@sss.pgh.pa.us 1202 :CBC 16887 : ValidatePgVersion(fullpath);
1203 : : }
1204 : :
6110 1205 : 16944 : SetDatabasePath(fullpath);
1471 alvherre@alvh.no-ip. 1206 : 16944 : pfree(fullpath);
1207 : :
1208 : : /*
1209 : : * It's now possible to do real access to the system catalogs.
1210 : : *
1211 : : * Load relcache entries for the system catalogs. This must create at
1212 : : * least the minimum set of "nailed-in" cache entries.
1213 : : */
6110 tgl@sss.pgh.pa.us 1214 : 16944 : RelationCacheInitializePhase3();
1215 : :
1216 : : /* set up ACL framework (so CheckMyDatabase can check permissions) */
7310 1217 : 16942 : initialize_acl();
1218 : :
1219 : : /*
1220 : : * Re-read the pg_database row for our database, check permissions and set
1221 : : * up database-specific GUC settings. We can't do this until all the
1222 : : * database-access infrastructure is up. (Also, it wants to know if the
1223 : : * user is a superuser, so the above stuff has to happen first.)
1224 : : */
5859 1225 [ + + ]: 16942 : if (!bootstrap)
937 michael@paquier.xyz 1226 : 16885 : CheckMyDatabase(dbname, am_superuser,
1227 : 16885 : (flags & INIT_PG_OVERRIDE_ALLOW_CONNS) != 0);
1228 : :
1229 : : /*
1230 : : * Now process any command-line switches and any additional GUC variable
1231 : : * settings passed in the startup packet. We couldn't do this before
1232 : : * because we didn't know if client is a superuser.
1233 : : */
5713 heikki.linnakangas@i 1234 [ + + ]: 16939 : if (MyProcPort != NULL)
1235 : 14112 : process_startup_options(MyProcPort, am_superuser);
1236 : :
1237 : : /* Process pg_db_role_setting options */
1238 : 16939 : process_settings(MyDatabaseId, GetSessionUserId());
1239 : :
1240 : : /* Apply PostAuthDelay as soon as we've read all options */
1241 [ - + ]: 16937 : if (PostAuthDelay > 0)
5713 heikki.linnakangas@i 1242 :UBC 0 : pg_usleep(PostAuthDelay * 1000000L);
1243 : :
1244 : : /*
1245 : : * Initialize various default states that can't be set up until we've
1246 : : * selected the active user and gotten the right GUC settings.
1247 : : */
1248 : :
1249 : : /* set default namespace search path */
5713 heikki.linnakangas@i 1250 :CBC 16937 : InitializeSearchPath();
1251 : :
1252 : : /* initialize client encoding */
1253 : 16937 : InitializeClientEncoding();
1254 : :
1255 : : /* Initialize this backend's session state. */
3155 andres@anarazel.de 1256 : 16937 : InitializeSession();
1257 : :
1258 : : /*
1259 : : * If this is an interactive session, load any libraries that should be
1260 : : * preloaded at backend start. Since those are determined by GUCs, this
1261 : : * can't happen until GUC settings are complete, but we want it to happen
1262 : : * during the initial transaction in case anything that requires database
1263 : : * access needs to be done.
1264 : : */
937 michael@paquier.xyz 1265 [ + + ]: 16937 : if ((flags & INIT_PG_LOAD_SESSION_LIBS) != 0)
1380 tgl@sss.pgh.pa.us 1266 : 13406 : process_session_preload_libraries();
1267 : :
1268 : : /* fill in the remainder of this entry in the PgBackendStatus array */
5713 heikki.linnakangas@i 1269 [ + + ]: 16937 : if (!bootstrap)
427 michael@paquier.xyz 1270 : 16880 : pgstat_bestart_final();
1271 : :
1272 : : /* close the transaction we started above */
5713 heikki.linnakangas@i 1273 [ + + ]: 16937 : if (!bootstrap)
1274 : 16880 : CommitTransactionCommand();
1275 : :
1276 : : /* send any WARNINGs we've accumulated during initialization */
83 nathan@postgresql.or 1277 :GNC 16937 : EmitConnectionWarnings();
1278 : : }
1279 : :
1280 : : /*
1281 : : * Process any command-line switches and any additional GUC variable
1282 : : * settings passed in the startup packet.
1283 : : */
1284 : : static void
5713 heikki.linnakangas@i 1285 :CBC 14621 : process_startup_options(Port *port, bool am_superuser)
1286 : : {
1287 : : GucContext gucctx;
1288 : : ListCell *gucopts;
1289 : :
4252 tgl@sss.pgh.pa.us 1290 [ + + ]: 14621 : gucctx = am_superuser ? PGC_SU_BACKEND : PGC_BACKEND;
1291 : :
1292 : : /*
1293 : : * First process any command-line switches that were included in the
1294 : : * startup packet, if we are in a regular backend.
1295 : : */
5713 heikki.linnakangas@i 1296 [ + + ]: 14621 : if (port->cmdline_options != NULL)
1297 : : {
1298 : : /*
1299 : : * The maximum possible number of commandline arguments that could
1300 : : * come from port->cmdline_options is (strlen + 1) / 2; see
1301 : : * pg_split_opts().
1302 : : */
1303 : : char **av;
1304 : : int maxac;
1305 : : int ac;
1306 : :
1307 : 4212 : maxac = 2 + (strlen(port->cmdline_options) + 1) / 2;
1308 : :
146 michael@paquier.xyz 1309 :GNC 4212 : av = palloc_array(char *, maxac);
6090 tgl@sss.pgh.pa.us 1310 :CBC 4212 : ac = 0;
1311 : :
1312 : 4212 : av[ac++] = "postgres";
1313 : :
5713 heikki.linnakangas@i 1314 : 4212 : pg_split_opts(av, &ac, port->cmdline_options);
1315 : :
6090 tgl@sss.pgh.pa.us 1316 : 4212 : av[ac] = NULL;
1317 : :
1318 [ - + ]: 4212 : Assert(ac < maxac);
1319 : :
4782 1320 : 4212 : (void) process_postgres_switches(ac, av, gucctx, NULL);
1321 : : }
1322 : :
1323 : : /*
1324 : : * Process any additional GUC variable settings passed in startup packet.
1325 : : * These are handled exactly like command-line variables.
1326 : : */
5713 heikki.linnakangas@i 1327 : 14621 : gucopts = list_head(port->guc_options);
1328 [ + + ]: 35130 : while (gucopts)
1329 : : {
1330 : : char *name;
1331 : : char *value;
1332 : :
1333 : 20509 : name = lfirst(gucopts);
2486 tgl@sss.pgh.pa.us 1334 : 20509 : gucopts = lnext(port->guc_options, gucopts);
1335 : :
5713 heikki.linnakangas@i 1336 : 20509 : value = lfirst(gucopts);
2486 tgl@sss.pgh.pa.us 1337 : 20509 : gucopts = lnext(port->guc_options, gucopts);
1338 : :
5713 heikki.linnakangas@i 1339 : 20509 : SetConfigOption(name, value, gucctx, PGC_S_CLIENT);
1340 : : }
9269 tgl@sss.pgh.pa.us 1341 : 14621 : }
1342 : :
1343 : : /*
1344 : : * Load GUC settings from pg_db_role_setting.
1345 : : *
1346 : : * We try specific settings for the database/role combination, as well as
1347 : : * general for this database and for this user.
1348 : : */
1349 : : static void
6054 alvherre@alvh.no-ip. 1350 : 16939 : process_settings(Oid databaseid, Oid roleid)
1351 : : {
1352 : : Relation relsetting;
1353 : : Snapshot snapshot;
1354 : :
1355 [ + + ]: 16939 : if (!IsUnderPostmaster)
1356 : 131 : return;
1357 : :
2661 andres@anarazel.de 1358 : 16808 : relsetting = table_open(DbRoleSettingRelationId, AccessShareLock);
1359 : :
1360 : : /* read all the settings under the same snapshot for efficiency */
4690 rhaas@postgresql.org 1361 : 16808 : snapshot = RegisterSnapshot(GetCatalogSnapshot(DbRoleSettingRelationId));
1362 : :
1363 : : /* Later settings are ignored if set earlier. */
1364 : 16808 : ApplySetting(snapshot, databaseid, roleid, relsetting, PGC_S_DATABASE_USER);
1365 : 16806 : ApplySetting(snapshot, InvalidOid, roleid, relsetting, PGC_S_USER);
1366 : 16806 : ApplySetting(snapshot, databaseid, InvalidOid, relsetting, PGC_S_DATABASE);
1367 : 16806 : ApplySetting(snapshot, InvalidOid, InvalidOid, relsetting, PGC_S_GLOBAL);
1368 : :
1369 : 16806 : UnregisterSnapshot(snapshot);
2661 andres@anarazel.de 1370 : 16806 : table_close(relsetting, AccessShareLock);
1371 : : }
1372 : :
1373 : : /*
1374 : : * Backend-shutdown callback. Do cleanup that we want to be sure happens
1375 : : * before all the supporting modules begin to nail their doors shut via
1376 : : * their own callbacks.
1377 : : *
1378 : : * User-level cleanup, such as temp-relation removal and UNLISTEN, happens
1379 : : * via separate callbacks that execute before this one. We don't combine the
1380 : : * callbacks because we still want this one to happen if the user-level
1381 : : * cleanup fails.
1382 : : */
1383 : : static void
8180 peter_e@gmx.net 1384 : 18680 : ShutdownPostgres(int code, Datum arg)
1385 : : {
1386 : : /* Make sure we've killed any active transaction */
7575 tgl@sss.pgh.pa.us 1387 : 18680 : AbortOutOfAnyTransaction();
1388 : :
1389 : : /*
1390 : : * User locks are not released by transaction end, so be sure to release
1391 : : * them explicitly.
1392 : : */
1393 : 18680 : LockReleaseAll(USER_LOCKMETHOD, true);
9708 vadim4o@yahoo.com 1394 : 18680 : }
1395 : :
1396 : :
1397 : : /*
1398 : : * STATEMENT_TIMEOUT handler: trigger a query-cancel interrupt.
1399 : : */
1400 : : static void
5041 alvherre@alvh.no-ip. 1401 : 6 : StatementTimeoutHandler(void)
1402 : : {
4000 bruce@momjian.us 1403 : 6 : int sig = SIGINT;
1404 : :
1405 : : /*
1406 : : * During authentication the timeout is used to deal with
1407 : : * authentication_timeout - we want to quit in response to such timeouts.
1408 : : */
4109 andres@anarazel.de 1409 [ - + ]: 6 : if (ClientAuthInProgress)
4109 andres@anarazel.de 1410 :UBC 0 : sig = SIGTERM;
1411 : :
1412 : : #ifdef HAVE_SETSID
1413 : : /* try to signal whole process group */
4109 andres@anarazel.de 1414 :CBC 6 : kill(-MyProcPid, sig);
1415 : : #endif
1416 : 6 : kill(MyProcPid, sig);
5041 alvherre@alvh.no-ip. 1417 : 6 : }
1418 : :
1419 : : /*
1420 : : * LOCK_TIMEOUT handler: trigger a query-cancel interrupt.
1421 : : */
1422 : : static void
4798 tgl@sss.pgh.pa.us 1423 : 4 : LockTimeoutHandler(void)
1424 : : {
1425 : : #ifdef HAVE_SETSID
1426 : : /* try to signal whole process group */
1427 : 4 : kill(-MyProcPid, SIGINT);
1428 : : #endif
1429 : 4 : kill(MyProcPid, SIGINT);
1430 : 4 : }
1431 : :
1432 : : static void
810 akorotkov@postgresql 1433 : 1 : TransactionTimeoutHandler(void)
1434 : : {
1435 : 1 : TransactionTimeoutPending = true;
1436 : 1 : InterruptPending = true;
1437 : 1 : SetLatch(MyLatch);
1438 : 1 : }
1439 : :
1440 : : static void
3702 rhaas@postgresql.org 1441 : 1 : IdleInTransactionSessionTimeoutHandler(void)
1442 : : {
1443 : 1 : IdleInTransactionSessionTimeoutPending = true;
1444 : 1 : InterruptPending = true;
1445 : 1 : SetLatch(MyLatch);
1446 : 1 : }
1447 : :
1448 : : static void
1945 tgl@sss.pgh.pa.us 1449 : 1 : IdleSessionTimeoutHandler(void)
1450 : : {
1451 : 1 : IdleSessionTimeoutPending = true;
1452 : 1 : InterruptPending = true;
1453 : 1 : SetLatch(MyLatch);
1454 : 1 : }
1455 : :
1456 : : static void
1490 andres@anarazel.de 1457 : 24 : IdleStatsUpdateTimeoutHandler(void)
1458 : : {
1459 : 24 : IdleStatsUpdateTimeoutPending = true;
1460 : 24 : InterruptPending = true;
1461 : 24 : SetLatch(MyLatch);
1462 : 24 : }
1463 : :
1464 : : static void
1858 tmunro@postgresql.or 1465 :UBC 0 : ClientCheckTimeoutHandler(void)
1466 : : {
1467 : 0 : CheckClientConnectionPending = true;
1468 : 0 : InterruptPending = true;
1469 : 0 : SetLatch(MyLatch);
1470 : 0 : }
1471 : :
1472 : : /*
1473 : : * Returns true if at least one role is defined in this database cluster.
1474 : : */
1475 : : static bool
7616 tgl@sss.pgh.pa.us 1476 :CBC 76 : ThereIsAtLeastOneRole(void)
1477 : : {
1478 : : Relation pg_authid_rel;
1479 : : TableScanDesc scan;
1480 : : bool result;
1481 : :
2661 andres@anarazel.de 1482 : 76 : pg_authid_rel = table_open(AuthIdRelationId, AccessShareLock);
1483 : :
2612 1484 : 76 : scan = table_beginscan_catalog(pg_authid_rel, 0, NULL);
8751 tgl@sss.pgh.pa.us 1485 : 76 : result = (heap_getnext(scan, ForwardScanDirection) != NULL);
1486 : :
2612 andres@anarazel.de 1487 : 76 : table_endscan(scan);
2661 1488 : 76 : table_close(pg_authid_rel, AccessShareLock);
1489 : :
9005 peter_e@gmx.net 1490 : 76 : return result;
1491 : : }
1492 : :
1493 : : /*
1494 : : * Stores a warning message to be sent later via EmitConnectionWarnings().
1495 : : * Both msg and detail must be non-NULL.
1496 : : *
1497 : : * NB: Caller should ensure the strings are allocated in a long-lived context
1498 : : * like TopMemoryContext.
1499 : : */
1500 : : void
83 nathan@postgresql.or 1501 :GNC 2 : StoreConnectionWarning(char *msg, char *detail)
1502 : : {
1503 : : MemoryContext oldcontext;
1504 : :
1505 [ - + ]: 2 : Assert(msg);
1506 [ - + ]: 2 : Assert(detail);
1507 : :
1508 [ - + ]: 2 : if (ConnectionWarningsEmitted)
83 nathan@postgresql.or 1509 [ # # ]:UNC 0 : elog(ERROR, "StoreConnectionWarning() called after EmitConnectionWarnings()");
1510 : :
83 nathan@postgresql.or 1511 :GNC 2 : oldcontext = MemoryContextSwitchTo(TopMemoryContext);
1512 : :
1513 : 2 : ConnectionWarningMessages = lappend(ConnectionWarningMessages, msg);
1514 : 2 : ConnectionWarningDetails = lappend(ConnectionWarningDetails, detail);
1515 : :
1516 : 2 : MemoryContextSwitchTo(oldcontext);
1517 : 2 : }
1518 : :
1519 : : /*
1520 : : * Sends the warning messages saved via StoreConnectionWarning() and frees the
1521 : : * strings and lists.
1522 : : *
1523 : : * NB: This can only be called once per backend.
1524 : : */
1525 : : static void
1526 : 17446 : EmitConnectionWarnings(void)
1527 : : {
1528 : : ListCell *lc_msg;
1529 : : ListCell *lc_detail;
1530 : :
1531 [ - + ]: 17446 : if (ConnectionWarningsEmitted)
83 nathan@postgresql.or 1532 [ # # ]:UNC 0 : elog(ERROR, "EmitConnectionWarnings() called more than once");
1533 : : else
83 nathan@postgresql.or 1534 :GNC 17446 : ConnectionWarningsEmitted = true;
1535 : :
1536 [ + + + + : 17448 : forboth(lc_msg, ConnectionWarningMessages,
+ + + + +
+ + - +
+ ]
1537 : : lc_detail, ConnectionWarningDetails)
1538 : : {
1539 [ + - ]: 2 : ereport(WARNING,
1540 : : (errmsg("%s", (char *) lfirst(lc_msg)),
1541 : : errdetail("%s", (char *) lfirst(lc_detail))));
1542 : : }
1543 : :
1544 : 17446 : list_free_deep(ConnectionWarningMessages);
1545 : 17446 : list_free_deep(ConnectionWarningDetails);
1546 : 17446 : }
|