1 /*-------------------------------------------------------------------------
4 * This file contains some support routines required for array functions.
6 * Portions Copyright (c) 1996-2022, PostgreSQL Global Development Group
7 * Portions Copyright (c) 1994, Regents of the University of California
11 * src/backend/utils/adt/arrayutils.c
13 *-------------------------------------------------------------------------
18 #include "catalog/pg_type.h"
19 #include "common/int.h"
20 #include "utils/array.h"
21 #include "utils/builtins.h"
22 #include "utils/memutils.h"
26 * Convert subscript list into linear element number (from 0)
28 * We assume caller has already range-checked the dimensions and subscripts,
29 * so no overflow is possible.
32 ArrayGetOffset(int n
, const int *dim
, const int *lb
, const int *indx
)
38 for (i
= n
- 1; i
>= 0; i
--)
40 offset
+= (indx
[i
] - lb
[i
]) * scale
;
47 * Same, but subscripts are assumed 0-based, and use a scale array
48 * instead of raw dimension data (see mda_get_prod to create scale array)
51 ArrayGetOffset0(int n
, const int *tup
, const int *scale
)
56 for (i
= 0; i
< n
; i
++)
57 lin
+= tup
[i
] * scale
[i
];
62 * Convert array dimensions into number of elements
64 * This must do overflow checking, since it is used to validate that a user
65 * dimensionality request doesn't overflow what we can handle.
67 * We limit array sizes to at most about a quarter billion elements,
68 * so that it's not necessary to check for overflow in quite so many
69 * places --- for instance when palloc'ing Datum arrays.
71 * The multiplication overflow check only works on machines that have int64
72 * arithmetic, but that is nearly all platforms these days, and doing check
73 * divides for those that don't seems way too expensive.
76 ArrayGetNItems(int ndim
, const int *dims
)
81 #define MaxArraySize ((Size) (MaxAllocSize / sizeof(Datum)))
86 for (i
= 0; i
< ndim
; i
++)
90 /* A negative dimension implies that UB-LB overflowed ... */
93 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED
),
94 errmsg("array size exceeds the maximum allowed (%d)",
95 (int) MaxArraySize
)));
97 prod
= (int64
) ret
* (int64
) dims
[i
];
100 if ((int64
) ret
!= prod
)
102 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED
),
103 errmsg("array size exceeds the maximum allowed (%d)",
104 (int) MaxArraySize
)));
107 if ((Size
) ret
> MaxArraySize
)
109 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED
),
110 errmsg("array size exceeds the maximum allowed (%d)",
111 (int) MaxArraySize
)));
116 * Verify sanity of proposed lower-bound values for an array
118 * The lower-bound values must not be so large as to cause overflow when
119 * calculating subscripts, e.g. lower bound 2147483640 with length 10
120 * must be disallowed. We actually insist that dims[i] + lb[i] be
121 * computable without overflow, meaning that an array with last subscript
122 * equal to INT_MAX will be disallowed.
124 * It is assumed that the caller already called ArrayGetNItems, so that
125 * overflowed (negative) dims[] values have been eliminated.
128 ArrayCheckBounds(int ndim
, const int *dims
, const int *lb
)
132 for (i
= 0; i
< ndim
; i
++)
134 /* PG_USED_FOR_ASSERTS_ONLY prevents variable-isn't-read warnings */
135 int32 sum PG_USED_FOR_ASSERTS_ONLY
;
137 if (pg_add_s32_overflow(dims
[i
], lb
[i
], &sum
))
139 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED
),
140 errmsg("array lower bound is too large: %d",
146 * Compute ranges (sub-array dimensions) for an array slice
148 * We assume caller has validated slice endpoints, so overflow is impossible
151 mda_get_range(int n
, int *span
, const int *st
, const int *endp
)
155 for (i
= 0; i
< n
; i
++)
156 span
[i
] = endp
[i
] - st
[i
] + 1;
160 * Compute products of array dimensions, ie, scale factors for subscripts
162 * We assume caller has validated dimensions, so overflow is impossible
165 mda_get_prod(int n
, const int *range
, int *prod
)
170 for (i
= n
- 2; i
>= 0; i
--)
171 prod
[i
] = prod
[i
+ 1] * range
[i
+ 1];
175 * From products of whole-array dimensions and spans of a sub-array,
176 * compute offset distances needed to step through subarray within array
178 * We assume caller has validated dimensions, so overflow is impossible
181 mda_get_offset_values(int n
, int *dist
, const int *prod
, const int *span
)
187 for (j
= n
- 2; j
>= 0; j
--)
189 dist
[j
] = prod
[j
] - 1;
190 for (i
= j
+ 1; i
< n
; i
++)
191 dist
[j
] -= (span
[i
] - 1) * prod
[i
];
196 * Generates the tuple that is lexicographically one greater than the current
197 * n-tuple in "curr", with the restriction that the i-th element of "curr" is
198 * less than the i-th element of "span".
200 * Returns -1 if no next tuple exists, else the subscript position (0..n-1)
201 * corresponding to the dimension to advance along.
203 * We assume caller has validated dimensions, so overflow is impossible
206 mda_next_tuple(int n
, int *curr
, const int *span
)
213 curr
[n
- 1] = (curr
[n
- 1] + 1) % span
[n
- 1];
214 for (i
= n
- 1; i
&& curr
[i
] == 0; i
--)
215 curr
[i
- 1] = (curr
[i
- 1] + 1) % span
[i
- 1];
226 * ArrayGetIntegerTypmods: verify that argument is a 1-D cstring array,
227 * and get the contents converted to integers. Returns a palloc'd array
228 * and places the length at *n.
231 ArrayGetIntegerTypmods(ArrayType
*arr
, int *n
)
237 if (ARR_ELEMTYPE(arr
) != CSTRINGOID
)
239 (errcode(ERRCODE_ARRAY_ELEMENT_ERROR
),
240 errmsg("typmod array must be type cstring[]")));
242 if (ARR_NDIM(arr
) != 1)
244 (errcode(ERRCODE_ARRAY_SUBSCRIPT_ERROR
),
245 errmsg("typmod array must be one-dimensional")));
247 if (array_contains_nulls(arr
))
249 (errcode(ERRCODE_NULL_VALUE_NOT_ALLOWED
),
250 errmsg("typmod array must not contain nulls")));
252 /* hardwired knowledge about cstring's representation details here */
253 deconstruct_array(arr
, CSTRINGOID
,
254 -2, false, TYPALIGN_CHAR
,
255 &elem_values
, NULL
, n
);
257 result
= (int32
*) palloc(*n
* sizeof(int32
));
259 for (i
= 0; i
< *n
; i
++)
260 result
[i
] = pg_strtoint32(DatumGetCString(elem_values
[i
]));