drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 1 | /* |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 2 | ** 2001 September 15 |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 3 | ** |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 4 | ** The author disclaims copyright to this source code. In place of |
| 5 | ** a legal notice, here is a blessing: |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 6 | ** |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 7 | ** May you do good and not evil. |
| 8 | ** May you find forgiveness for yourself and forgive others. |
| 9 | ** May you share freely, never taking more than you give. |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 10 | ** |
| 11 | ************************************************************************* |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 12 | ** The code in this file implements the function that runs the |
| 13 | ** bytecode of a prepared statement. |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 14 | ** |
drh | ac82fcf | 2002-09-08 17:23:41 +0000 | [diff] [blame] | 15 | ** Various scripts scan this source file in order to generate HTML |
| 16 | ** documentation, headers files, or other derived files. The formatting |
| 17 | ** of the code in this file is, therefore, important. See other comments |
| 18 | ** in this file for details. If in doubt, do not deviate from existing |
| 19 | ** commenting and indentation practices when changing or adding code. |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 20 | */ |
| 21 | #include "sqliteInt.h" |
drh | 9a32464 | 2003-09-06 20:12:01 +0000 | [diff] [blame] | 22 | #include "vdbeInt.h" |
drh | 8f619cc | 2002-09-08 00:04:50 +0000 | [diff] [blame] | 23 | |
| 24 | /* |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 25 | ** Invoke this macro on memory cells just prior to changing the |
| 26 | ** value of the cell. This macro verifies that shallow copies are |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 27 | ** not misused. A shallow copy of a string or blob just copies a |
| 28 | ** pointer to the string or blob, not the content. If the original |
| 29 | ** is changed while the copy is still in use, the string or blob might |
| 30 | ** be changed out from under the copy. This macro verifies that nothing |
drh | b6e8fd1 | 2014-03-06 01:56:33 +0000 | [diff] [blame] | 31 | ** like that ever happens. |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 32 | */ |
| 33 | #ifdef SQLITE_DEBUG |
drh | e4c88c0 | 2012-01-04 12:57:45 +0000 | [diff] [blame] | 34 | # define memAboutToChange(P,M) sqlite3VdbeMemAboutToChange(P,M) |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 35 | #else |
| 36 | # define memAboutToChange(P,M) |
| 37 | #endif |
| 38 | |
| 39 | /* |
drh | 487ab3c | 2001-11-08 00:45:21 +0000 | [diff] [blame] | 40 | ** The following global variable is incremented every time a cursor |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 41 | ** moves, either by the OP_SeekXX, OP_Next, or OP_Prev opcodes. The test |
drh | 487ab3c | 2001-11-08 00:45:21 +0000 | [diff] [blame] | 42 | ** procedures use this information to make sure that indices are |
drh | ac82fcf | 2002-09-08 17:23:41 +0000 | [diff] [blame] | 43 | ** working correctly. This variable has no function other than to |
| 44 | ** help verify the correct operation of the library. |
drh | 487ab3c | 2001-11-08 00:45:21 +0000 | [diff] [blame] | 45 | */ |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 46 | #ifdef SQLITE_TEST |
danielk1977 | 6f8a503 | 2004-05-10 10:34:51 +0000 | [diff] [blame] | 47 | int sqlite3_search_count = 0; |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 48 | #endif |
drh | 487ab3c | 2001-11-08 00:45:21 +0000 | [diff] [blame] | 49 | |
drh | f603871 | 2004-02-08 18:07:34 +0000 | [diff] [blame] | 50 | /* |
| 51 | ** When this global variable is positive, it gets decremented once before |
drh | e4c88c0 | 2012-01-04 12:57:45 +0000 | [diff] [blame] | 52 | ** each instruction in the VDBE. When it reaches zero, the u1.isInterrupted |
| 53 | ** field of the sqlite3 structure is set in order to simulate an interrupt. |
drh | f603871 | 2004-02-08 18:07:34 +0000 | [diff] [blame] | 54 | ** |
| 55 | ** This facility is used for testing purposes only. It does not function |
| 56 | ** in an ordinary build. |
| 57 | */ |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 58 | #ifdef SQLITE_TEST |
danielk1977 | 6f8a503 | 2004-05-10 10:34:51 +0000 | [diff] [blame] | 59 | int sqlite3_interrupt_count = 0; |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 60 | #endif |
drh | 1350b03 | 2002-02-27 19:00:20 +0000 | [diff] [blame] | 61 | |
danielk1977 | 7e18c25 | 2004-05-25 11:47:24 +0000 | [diff] [blame] | 62 | /* |
drh | 6bf8957 | 2004-11-03 16:27:01 +0000 | [diff] [blame] | 63 | ** The next global variable is incremented each type the OP_Sort opcode |
| 64 | ** is executed. The test procedures use this information to make sure that |
shane | 21e7feb | 2008-05-30 15:59:49 +0000 | [diff] [blame] | 65 | ** sorting is occurring or not occurring at appropriate times. This variable |
drh | 6bf8957 | 2004-11-03 16:27:01 +0000 | [diff] [blame] | 66 | ** has no function other than to help verify the correct operation of the |
| 67 | ** library. |
| 68 | */ |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 69 | #ifdef SQLITE_TEST |
drh | 6bf8957 | 2004-11-03 16:27:01 +0000 | [diff] [blame] | 70 | int sqlite3_sort_count = 0; |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 71 | #endif |
drh | 6bf8957 | 2004-11-03 16:27:01 +0000 | [diff] [blame] | 72 | |
| 73 | /* |
drh | ae7e151 | 2007-05-02 16:51:59 +0000 | [diff] [blame] | 74 | ** The next global variable records the size of the largest MEM_Blob |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 75 | ** or MEM_Str that has been used by a VDBE opcode. The test procedures |
drh | ae7e151 | 2007-05-02 16:51:59 +0000 | [diff] [blame] | 76 | ** use this information to make sure that the zero-blob functionality |
| 77 | ** is working correctly. This variable has no function other than to |
| 78 | ** help verify the correct operation of the library. |
| 79 | */ |
| 80 | #ifdef SQLITE_TEST |
| 81 | int sqlite3_max_blobsize = 0; |
drh | ca48c90 | 2008-01-18 14:08:24 +0000 | [diff] [blame] | 82 | static void updateMaxBlobsize(Mem *p){ |
| 83 | if( (p->flags & (MEM_Str|MEM_Blob))!=0 && p->n>sqlite3_max_blobsize ){ |
| 84 | sqlite3_max_blobsize = p->n; |
| 85 | } |
| 86 | } |
drh | ae7e151 | 2007-05-02 16:51:59 +0000 | [diff] [blame] | 87 | #endif |
| 88 | |
| 89 | /* |
drh | 9b1c62d | 2011-03-30 21:04:43 +0000 | [diff] [blame] | 90 | ** This macro evaluates to true if either the update hook or the preupdate |
| 91 | ** hook are enabled for database connect DB. |
| 92 | */ |
| 93 | #ifdef SQLITE_ENABLE_PREUPDATE_HOOK |
drh | 74c3302 | 2016-03-30 12:56:55 +0000 | [diff] [blame] | 94 | # define HAS_UPDATE_HOOK(DB) ((DB)->xPreUpdateCallback||(DB)->xUpdateCallback) |
drh | 9b1c62d | 2011-03-30 21:04:43 +0000 | [diff] [blame] | 95 | #else |
drh | 74c3302 | 2016-03-30 12:56:55 +0000 | [diff] [blame] | 96 | # define HAS_UPDATE_HOOK(DB) ((DB)->xUpdateCallback) |
drh | 9b1c62d | 2011-03-30 21:04:43 +0000 | [diff] [blame] | 97 | #endif |
| 98 | |
| 99 | /* |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 100 | ** The next global variable is incremented each time the OP_Found opcode |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 101 | ** is executed. This is used to test whether or not the foreign key |
| 102 | ** operation implemented using OP_FkIsZero is working. This variable |
| 103 | ** has no function other than to help verify the correct operation of the |
| 104 | ** library. |
| 105 | */ |
| 106 | #ifdef SQLITE_TEST |
| 107 | int sqlite3_found_count = 0; |
| 108 | #endif |
| 109 | |
| 110 | /* |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 111 | ** Test a register to see if it exceeds the current maximum blob size. |
| 112 | ** If it does, record the new maximum blob size. |
| 113 | */ |
drh | d12602a | 2016-12-07 15:49:02 +0000 | [diff] [blame] | 114 | #if defined(SQLITE_TEST) && !defined(SQLITE_UNTESTABLE) |
drh | ca48c90 | 2008-01-18 14:08:24 +0000 | [diff] [blame] | 115 | # define UPDATE_MAX_BLOBSIZE(P) updateMaxBlobsize(P) |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 116 | #else |
| 117 | # define UPDATE_MAX_BLOBSIZE(P) |
| 118 | #endif |
| 119 | |
drh | 52f11b8 | 2020-01-02 13:26:49 +0000 | [diff] [blame] | 120 | #ifdef SQLITE_DEBUG |
| 121 | /* This routine provides a convenient place to set a breakpoint during |
| 122 | ** tracing with PRAGMA vdbe_trace=on. The breakpoint fires right after |
| 123 | ** each opcode is printed. Variables "pc" (program counter) and pOp are |
| 124 | ** available to add conditionals to the breakpoint. GDB example: |
| 125 | ** |
| 126 | ** break test_trace_breakpoint if pc=22 |
| 127 | ** |
| 128 | ** Other useful labels for breakpoints include: |
| 129 | ** test_addop_breakpoint(pc,pOp) |
| 130 | ** sqlite3CorruptError(lineno) |
| 131 | ** sqlite3MisuseError(lineno) |
| 132 | ** sqlite3CantopenError(lineno) |
| 133 | */ |
drh | 22e95fb | 2020-01-02 14:42:42 +0000 | [diff] [blame] | 134 | static void test_trace_breakpoint(int pc, Op *pOp, Vdbe *v){ |
drh | 52f11b8 | 2020-01-02 13:26:49 +0000 | [diff] [blame] | 135 | static int n = 0; |
drh | 3547e49 | 2022-12-23 14:49:24 +0000 | [diff] [blame] | 136 | (void)pc; |
| 137 | (void)pOp; |
| 138 | (void)v; |
drh | 52f11b8 | 2020-01-02 13:26:49 +0000 | [diff] [blame] | 139 | n++; |
| 140 | } |
| 141 | #endif |
| 142 | |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 143 | /* |
drh | 5655c54 | 2014-02-19 19:14:34 +0000 | [diff] [blame] | 144 | ** Invoke the VDBE coverage callback, if that callback is defined. This |
| 145 | ** feature is used for test suite validation only and does not appear an |
| 146 | ** production builds. |
| 147 | ** |
drh | c906533 | 2019-04-01 14:01:21 +0000 | [diff] [blame] | 148 | ** M is the type of branch. I is the direction taken for this instance of |
| 149 | ** the branch. |
| 150 | ** |
| 151 | ** M: 2 - two-way branch (I=0: fall-thru 1: jump ) |
| 152 | ** 3 - two-way + NULL (I=0: fall-thru 1: jump 2: NULL ) |
| 153 | ** 4 - OP_Jump (I=0: jump p1 1: jump p2 2: jump p3) |
| 154 | ** |
| 155 | ** In other words, if M is 2, then I is either 0 (for fall-through) or |
| 156 | ** 1 (for when the branch is taken). If M is 3, the I is 0 for an |
| 157 | ** ordinary fall-through, I is 1 if the branch was taken, and I is 2 |
| 158 | ** if the result of comparison is NULL. For M=3, I=2 the jump may or |
| 159 | ** may not be taken, depending on the SQLITE_JUMPIFNULL flags in p5. |
| 160 | ** When M is 4, that means that an OP_Jump is being run. I is 0, 1, or 2 |
| 161 | ** depending on if the operands are less than, equal, or greater than. |
drh | 4336b0e | 2014-08-05 00:53:51 +0000 | [diff] [blame] | 162 | ** |
| 163 | ** iSrcLine is the source code line (from the __LINE__ macro) that |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 164 | ** generated the VDBE instruction combined with flag bits. The source |
| 165 | ** code line number is in the lower 24 bits of iSrcLine and the upper |
| 166 | ** 8 bytes are flags. The lower three bits of the flags indicate |
| 167 | ** values for I that should never occur. For example, if the branch is |
| 168 | ** always taken, the flags should be 0x05 since the fall-through and |
| 169 | ** alternate branch are never taken. If a branch is never taken then |
| 170 | ** flags should be 0x06 since only the fall-through approach is allowed. |
| 171 | ** |
drh | c906533 | 2019-04-01 14:01:21 +0000 | [diff] [blame] | 172 | ** Bit 0x08 of the flags indicates an OP_Jump opcode that is only |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 173 | ** interested in equal or not-equal. In other words, I==0 and I==2 |
drh | c906533 | 2019-04-01 14:01:21 +0000 | [diff] [blame] | 174 | ** should be treated as equivalent |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 175 | ** |
| 176 | ** Since only a line number is retained, not the filename, this macro |
| 177 | ** only works for amalgamation builds. But that is ok, since these macros |
| 178 | ** should be no-ops except for special builds used to measure test coverage. |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 179 | */ |
| 180 | #if !defined(SQLITE_VDBE_COVERAGE) |
| 181 | # define VdbeBranchTaken(I,M) |
| 182 | #else |
drh | 5655c54 | 2014-02-19 19:14:34 +0000 | [diff] [blame] | 183 | # define VdbeBranchTaken(I,M) vdbeTakeBranch(pOp->iSrcLine,I,M) |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 184 | static void vdbeTakeBranch(u32 iSrcLine, u8 I, u8 M){ |
| 185 | u8 mNever; |
| 186 | assert( I<=2 ); /* 0: fall through, 1: taken, 2: alternate taken */ |
| 187 | assert( M<=4 ); /* 2: two-way branch, 3: three-way branch, 4: OP_Jump */ |
| 188 | assert( I<M ); /* I can only be 2 if M is 3 or 4 */ |
| 189 | /* Transform I from a integer [0,1,2] into a bitmask of [1,2,4] */ |
| 190 | I = 1<<I; |
| 191 | /* The upper 8 bits of iSrcLine are flags. The lower three bits of |
| 192 | ** the flags indicate directions that the branch can never go. If |
| 193 | ** a branch really does go in one of those directions, assert right |
| 194 | ** away. */ |
| 195 | mNever = iSrcLine >> 24; |
| 196 | assert( (I & mNever)==0 ); |
| 197 | if( sqlite3GlobalConfig.xVdbeBranch==0 ) return; /*NO_TEST*/ |
drh | c906533 | 2019-04-01 14:01:21 +0000 | [diff] [blame] | 198 | /* Invoke the branch coverage callback with three arguments: |
| 199 | ** iSrcLine - the line number of the VdbeCoverage() macro, with |
| 200 | ** flags removed. |
| 201 | ** I - Mask of bits 0x07 indicating which cases are are |
| 202 | ** fulfilled by this instance of the jump. 0x01 means |
| 203 | ** fall-thru, 0x02 means taken, 0x04 means NULL. Any |
| 204 | ** impossible cases (ex: if the comparison is never NULL) |
| 205 | ** are filled in automatically so that the coverage |
| 206 | ** measurement logic does not flag those impossible cases |
| 207 | ** as missed coverage. |
| 208 | ** M - Type of jump. Same as M argument above |
| 209 | */ |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 210 | I |= mNever; |
| 211 | if( M==2 ) I |= 0x04; |
| 212 | if( M==4 ){ |
| 213 | I |= 0x08; |
drh | 6ccbd27 | 2018-07-10 17:10:44 +0000 | [diff] [blame] | 214 | if( (mNever&0x08)!=0 && (I&0x05)!=0) I |= 0x05; /*NO_TEST*/ |
drh | 5655c54 | 2014-02-19 19:14:34 +0000 | [diff] [blame] | 215 | } |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 216 | sqlite3GlobalConfig.xVdbeBranch(sqlite3GlobalConfig.pVdbeBranchArg, |
| 217 | iSrcLine&0xffffff, I, M); |
drh | 5655c54 | 2014-02-19 19:14:34 +0000 | [diff] [blame] | 218 | } |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 219 | #endif |
| 220 | |
| 221 | /* |
danielk1977 | bd7e460 | 2004-05-24 07:34:48 +0000 | [diff] [blame] | 222 | ** An ephemeral string value (signified by the MEM_Ephem flag) contains |
| 223 | ** a pointer to a dynamically allocated string where some other entity |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 224 | ** is responsible for deallocating that string. Because the register |
| 225 | ** does not control the string, it might be deleted without the register |
| 226 | ** knowing it. |
danielk1977 | bd7e460 | 2004-05-24 07:34:48 +0000 | [diff] [blame] | 227 | ** |
| 228 | ** This routine converts an ephemeral string into a dynamically allocated |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 229 | ** string that the register itself controls. In other words, it |
drh | c91b2fd | 2014-03-01 18:13:23 +0000 | [diff] [blame] | 230 | ** converts an MEM_Ephem string into a string with P.z==P.zMalloc. |
danielk1977 | bd7e460 | 2004-05-24 07:34:48 +0000 | [diff] [blame] | 231 | */ |
drh | b21c8cd | 2007-08-21 19:33:56 +0000 | [diff] [blame] | 232 | #define Deephemeralize(P) \ |
drh | eb2e176 | 2004-05-27 01:53:56 +0000 | [diff] [blame] | 233 | if( ((P)->flags&MEM_Ephem)!=0 \ |
drh | b21c8cd | 2007-08-21 19:33:56 +0000 | [diff] [blame] | 234 | && sqlite3VdbeMemMakeWriteable(P) ){ goto no_mem;} |
danielk1977 | 93d4675 | 2004-05-23 13:30:58 +0000 | [diff] [blame] | 235 | |
dan | 689ab89 | 2011-08-12 15:02:00 +0000 | [diff] [blame] | 236 | /* Return true if the cursor was opened using the OP_OpenSorter opcode. */ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 237 | #define isSorter(x) ((x)->eCurType==CURTYPE_SORTER) |
danielk1977 | 8a6b541 | 2004-05-24 07:04:25 +0000 | [diff] [blame] | 238 | |
| 239 | /* |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 240 | ** Allocate VdbeCursor number iCur. Return a pointer to it. Return NULL |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 241 | ** if we run out of memory. |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 242 | */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 243 | static VdbeCursor *allocateCursor( |
| 244 | Vdbe *p, /* The virtual machine */ |
| 245 | int iCur, /* Index of the new VdbeCursor */ |
danielk1977 | d336e22 | 2009-02-20 10:58:41 +0000 | [diff] [blame] | 246 | int nField, /* Number of fields in the table or index */ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 247 | u8 eCurType /* Type of the new cursor */ |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 248 | ){ |
| 249 | /* Find the memory cell that will be used to store the blob of memory |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 250 | ** required for this VdbeCursor structure. It is convenient to use a |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 251 | ** vdbe memory cell to manage the memory allocation required for a |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 252 | ** VdbeCursor structure for the following reasons: |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 253 | ** |
| 254 | ** * Sometimes cursor numbers are used for a couple of different |
| 255 | ** purposes in a vdbe program. The different uses might require |
| 256 | ** different sized allocations. Memory cells provide growable |
| 257 | ** allocations. |
| 258 | ** |
| 259 | ** * When using ENABLE_MEMORY_MANAGEMENT, memory cell buffers can |
| 260 | ** be freed lazily via the sqlite3_release_memory() API. This |
| 261 | ** minimizes the number of malloc calls made by the system. |
| 262 | ** |
drh | 3cdce92 | 2016-03-21 00:30:40 +0000 | [diff] [blame] | 263 | ** The memory cell for cursor 0 is aMem[0]. The rest are allocated from |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 264 | ** the top of the register space. Cursor 1 is at Mem[p->nMem-1]. |
| 265 | ** Cursor 2 is at Mem[p->nMem-2]. And so forth. |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 266 | */ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 267 | Mem *pMem = iCur>0 ? &p->aMem[p->nMem-iCur] : p->aMem; |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 268 | |
danielk1977 | 5f09613 | 2008-03-28 15:44:09 +0000 | [diff] [blame] | 269 | int nByte; |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 270 | VdbeCursor *pCx = 0; |
danielk1977 | 5f09613 | 2008-03-28 15:44:09 +0000 | [diff] [blame] | 271 | nByte = |
drh | cf6e3fd | 2022-04-01 18:45:11 +0000 | [diff] [blame] | 272 | ROUND8P(sizeof(VdbeCursor)) + 2*sizeof(u32)*nField + |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 273 | (eCurType==CURTYPE_BTREE?sqlite3BtreeCursorSize():0); |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 274 | |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 275 | assert( iCur>=0 && iCur<p->nCursor ); |
drh | a3fa140 | 2016-04-29 02:55:05 +0000 | [diff] [blame] | 276 | if( p->apCsr[iCur] ){ /*OPTIMIZATION-IF-FALSE*/ |
drh | 473571b | 2022-04-01 18:19:04 +0000 | [diff] [blame] | 277 | sqlite3VdbeFreeCursorNN(p, p->apCsr[iCur]); |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 278 | p->apCsr[iCur] = 0; |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 279 | } |
drh | 2454e4a | 2021-05-15 19:36:36 +0000 | [diff] [blame] | 280 | |
| 281 | /* There used to be a call to sqlite3VdbeMemClearAndResize() to make sure |
| 282 | ** the pMem used to hold space for the cursor has enough storage available |
| 283 | ** in pMem->zMalloc. But for the special case of the aMem[] entries used |
| 284 | ** to hold cursors, it is faster to in-line the logic. */ |
| 285 | assert( pMem->flags==MEM_Undefined ); |
| 286 | assert( (pMem->flags & MEM_Dyn)==0 ); |
| 287 | assert( pMem->szMalloc==0 || pMem->z==pMem->zMalloc ); |
| 288 | if( pMem->szMalloc<nByte ){ |
| 289 | if( pMem->szMalloc>0 ){ |
| 290 | sqlite3DbFreeNN(pMem->db, pMem->zMalloc); |
danielk1977 | cd3e8f7 | 2008-03-25 09:47:35 +0000 | [diff] [blame] | 291 | } |
drh | 2454e4a | 2021-05-15 19:36:36 +0000 | [diff] [blame] | 292 | pMem->z = pMem->zMalloc = sqlite3DbMallocRaw(pMem->db, nByte); |
| 293 | if( pMem->zMalloc==0 ){ |
| 294 | pMem->szMalloc = 0; |
| 295 | return 0; |
| 296 | } |
| 297 | pMem->szMalloc = nByte; |
| 298 | } |
| 299 | |
| 300 | p->apCsr[iCur] = pCx = (VdbeCursor*)pMem->zMalloc; |
| 301 | memset(pCx, 0, offsetof(VdbeCursor,pAltCursor)); |
| 302 | pCx->eCurType = eCurType; |
drh | 2454e4a | 2021-05-15 19:36:36 +0000 | [diff] [blame] | 303 | pCx->nField = nField; |
| 304 | pCx->aOffset = &pCx->aType[nField]; |
| 305 | if( eCurType==CURTYPE_BTREE ){ |
| 306 | pCx->uc.pCursor = (BtCursor*) |
drh | cf6e3fd | 2022-04-01 18:45:11 +0000 | [diff] [blame] | 307 | &pMem->z[ROUND8P(sizeof(VdbeCursor))+2*sizeof(u32)*nField]; |
drh | 2454e4a | 2021-05-15 19:36:36 +0000 | [diff] [blame] | 308 | sqlite3BtreeCursorZero(pCx->uc.pCursor); |
danielk1977 | 94eb6a1 | 2005-12-15 15:22:08 +0000 | [diff] [blame] | 309 | } |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 310 | return pCx; |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 311 | } |
| 312 | |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 313 | /* |
drh | 8a3884e | 2019-05-29 21:18:27 +0000 | [diff] [blame] | 314 | ** The string in pRec is known to look like an integer and to have a |
| 315 | ** floating point value of rValue. Return true and set *piValue to the |
| 316 | ** integer value if the string is in range to be an integer. Otherwise, |
| 317 | ** return false. |
| 318 | */ |
| 319 | static int alsoAnInt(Mem *pRec, double rValue, i64 *piValue){ |
drh | a3a4da0 | 2022-08-08 12:19:13 +0000 | [diff] [blame] | 320 | i64 iValue; |
drh | 26e817f | 2022-08-08 16:25:13 +0000 | [diff] [blame] | 321 | iValue = sqlite3RealToI64(rValue); |
drh | 8a3884e | 2019-05-29 21:18:27 +0000 | [diff] [blame] | 322 | if( sqlite3RealSameAsInt(rValue,iValue) ){ |
drh | c285ded | 2019-06-10 18:33:16 +0000 | [diff] [blame] | 323 | *piValue = iValue; |
| 324 | return 1; |
drh | 8a3884e | 2019-05-29 21:18:27 +0000 | [diff] [blame] | 325 | } |
| 326 | return 0==sqlite3Atoi64(pRec->z, piValue, pRec->n, pRec->enc); |
| 327 | } |
| 328 | |
| 329 | /* |
drh | 29d7210 | 2006-02-09 22:13:41 +0000 | [diff] [blame] | 330 | ** Try to convert a value into a numeric representation if we can |
| 331 | ** do so without loss of information. In other words, if the string |
| 332 | ** looks like a number, convert it into a number. If it does not |
| 333 | ** look like a number, leave it alone. |
drh | bd9507c | 2014-08-23 17:21:37 +0000 | [diff] [blame] | 334 | ** |
| 335 | ** If the bTryForInt flag is true, then extra effort is made to give |
| 336 | ** an integer representation. Strings that look like floating point |
| 337 | ** values but which have no fractional component (example: '48.00') |
| 338 | ** will have a MEM_Int representation when bTryForInt is true. |
| 339 | ** |
| 340 | ** If bTryForInt is false, then if the input string contains a decimal |
| 341 | ** point or exponential notation, the result is only MEM_Real, even |
| 342 | ** if there is an exact integer representation of the quantity. |
drh | 29d7210 | 2006-02-09 22:13:41 +0000 | [diff] [blame] | 343 | */ |
drh | bd9507c | 2014-08-23 17:21:37 +0000 | [diff] [blame] | 344 | static void applyNumericAffinity(Mem *pRec, int bTryForInt){ |
drh | 975b4c6 | 2014-07-26 16:47:23 +0000 | [diff] [blame] | 345 | double rValue; |
drh | 975b4c6 | 2014-07-26 16:47:23 +0000 | [diff] [blame] | 346 | u8 enc = pRec->enc; |
drh | 8a3884e | 2019-05-29 21:18:27 +0000 | [diff] [blame] | 347 | int rc; |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 348 | assert( (pRec->flags & (MEM_Str|MEM_Int|MEM_Real|MEM_IntReal))==MEM_Str ); |
drh | 8a3884e | 2019-05-29 21:18:27 +0000 | [diff] [blame] | 349 | rc = sqlite3AtoF(pRec->z, &rValue, pRec->n, enc); |
drh | 9a27822 | 2019-06-07 22:26:08 +0000 | [diff] [blame] | 350 | if( rc<=0 ) return; |
drh | 8a3884e | 2019-05-29 21:18:27 +0000 | [diff] [blame] | 351 | if( rc==1 && alsoAnInt(pRec, rValue, &pRec->u.i) ){ |
drh | 975b4c6 | 2014-07-26 16:47:23 +0000 | [diff] [blame] | 352 | pRec->flags |= MEM_Int; |
| 353 | }else{ |
drh | 74eaba4 | 2014-09-18 17:52:15 +0000 | [diff] [blame] | 354 | pRec->u.r = rValue; |
drh | 975b4c6 | 2014-07-26 16:47:23 +0000 | [diff] [blame] | 355 | pRec->flags |= MEM_Real; |
drh | bd9507c | 2014-08-23 17:21:37 +0000 | [diff] [blame] | 356 | if( bTryForInt ) sqlite3VdbeIntegerAffinity(pRec); |
drh | 29d7210 | 2006-02-09 22:13:41 +0000 | [diff] [blame] | 357 | } |
drh | 06b3bd5 | 2018-02-01 01:13:33 +0000 | [diff] [blame] | 358 | /* TEXT->NUMERIC is many->one. Hence, it is important to invalidate the |
| 359 | ** string representation after computing a numeric equivalent, because the |
| 360 | ** string representation might not be the canonical representation for the |
| 361 | ** numeric value. Ticket [343634942dd54ab57b7024] 2018-01-31. */ |
| 362 | pRec->flags &= ~MEM_Str; |
drh | 29d7210 | 2006-02-09 22:13:41 +0000 | [diff] [blame] | 363 | } |
| 364 | |
| 365 | /* |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 366 | ** Processing is determine by the affinity parameter: |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 367 | ** |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 368 | ** SQLITE_AFF_INTEGER: |
| 369 | ** SQLITE_AFF_REAL: |
| 370 | ** SQLITE_AFF_NUMERIC: |
| 371 | ** Try to convert pRec to an integer representation or a |
| 372 | ** floating-point representation if an integer representation |
| 373 | ** is not possible. Note that the integer representation is |
| 374 | ** always preferred, even if the affinity is REAL, because |
| 375 | ** an integer representation is more space efficient on disk. |
| 376 | ** |
drh | 00d6b27 | 2022-12-15 20:03:08 +0000 | [diff] [blame] | 377 | ** SQLITE_AFF_FLEXNUM: |
| 378 | ** If the value is text, then try to convert it into a number of |
| 379 | ** some kind (integer or real) but do not make any other changes. |
| 380 | ** |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 381 | ** SQLITE_AFF_TEXT: |
| 382 | ** Convert pRec to a text representation. |
| 383 | ** |
drh | 05883a3 | 2015-06-02 15:32:08 +0000 | [diff] [blame] | 384 | ** SQLITE_AFF_BLOB: |
drh | 96fb16e | 2019-08-06 14:37:24 +0000 | [diff] [blame] | 385 | ** SQLITE_AFF_NONE: |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 386 | ** No-op. pRec is unchanged. |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 387 | */ |
drh | 1743575 | 2007-08-16 04:30:38 +0000 | [diff] [blame] | 388 | static void applyAffinity( |
drh | 1743575 | 2007-08-16 04:30:38 +0000 | [diff] [blame] | 389 | Mem *pRec, /* The value to apply affinity to */ |
| 390 | char affinity, /* The affinity to be applied */ |
| 391 | u8 enc /* Use this text encoding */ |
| 392 | ){ |
drh | 7ea31cc | 2014-09-18 14:36:00 +0000 | [diff] [blame] | 393 | if( affinity>=SQLITE_AFF_NUMERIC ){ |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 394 | assert( affinity==SQLITE_AFF_INTEGER || affinity==SQLITE_AFF_REAL |
drh | 00d6b27 | 2022-12-15 20:03:08 +0000 | [diff] [blame] | 395 | || affinity==SQLITE_AFF_NUMERIC || affinity==SQLITE_AFF_FLEXNUM ); |
drh | a3fa140 | 2016-04-29 02:55:05 +0000 | [diff] [blame] | 396 | if( (pRec->flags & MEM_Int)==0 ){ /*OPTIMIZATION-IF-FALSE*/ |
dan | e3b1c38 | 2023-01-05 13:35:23 +0000 | [diff] [blame] | 397 | if( (pRec->flags & (MEM_Real|MEM_IntReal))==0 ){ |
drh | 11a6eee | 2014-09-19 22:01:54 +0000 | [diff] [blame] | 398 | if( pRec->flags & MEM_Str ) applyNumericAffinity(pRec,1); |
drh | 00d6b27 | 2022-12-15 20:03:08 +0000 | [diff] [blame] | 399 | }else if( affinity<=SQLITE_AFF_REAL ){ |
drh | bd9507c | 2014-08-23 17:21:37 +0000 | [diff] [blame] | 400 | sqlite3VdbeIntegerAffinity(pRec); |
| 401 | } |
drh | 17c4029 | 2004-07-21 02:53:29 +0000 | [diff] [blame] | 402 | } |
drh | 7ea31cc | 2014-09-18 14:36:00 +0000 | [diff] [blame] | 403 | }else if( affinity==SQLITE_AFF_TEXT ){ |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 404 | /* Only attempt the conversion to TEXT if there is an integer or real |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 405 | ** representation (blob and NULL do not get converted) but no string |
drh | a3fa140 | 2016-04-29 02:55:05 +0000 | [diff] [blame] | 406 | ** representation. It would be harmless to repeat the conversion if |
| 407 | ** there is already a string rep, but it is pointless to waste those |
| 408 | ** CPU cycles. */ |
| 409 | if( 0==(pRec->flags&MEM_Str) ){ /*OPTIMIZATION-IF-FALSE*/ |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 410 | if( (pRec->flags&(MEM_Real|MEM_Int|MEM_IntReal)) ){ |
drh | 3242c69 | 2019-05-04 01:29:13 +0000 | [diff] [blame] | 411 | testcase( pRec->flags & MEM_Int ); |
| 412 | testcase( pRec->flags & MEM_Real ); |
| 413 | testcase( pRec->flags & MEM_IntReal ); |
drh | a3fa140 | 2016-04-29 02:55:05 +0000 | [diff] [blame] | 414 | sqlite3VdbeMemStringify(pRec, enc, 1); |
| 415 | } |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 416 | } |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 417 | pRec->flags &= ~(MEM_Real|MEM_Int|MEM_IntReal); |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 418 | } |
| 419 | } |
| 420 | |
danielk1977 | aee18ef | 2005-03-09 12:26:50 +0000 | [diff] [blame] | 421 | /* |
drh | 29d7210 | 2006-02-09 22:13:41 +0000 | [diff] [blame] | 422 | ** Try to convert the type of a function argument or a result column |
| 423 | ** into a numeric representation. Use either INTEGER or REAL whichever |
| 424 | ** is appropriate. But only do the conversion if it is possible without |
| 425 | ** loss of information and return the revised type of the argument. |
drh | 29d7210 | 2006-02-09 22:13:41 +0000 | [diff] [blame] | 426 | */ |
| 427 | int sqlite3_value_numeric_type(sqlite3_value *pVal){ |
drh | 1b27b8c | 2014-02-10 03:21:57 +0000 | [diff] [blame] | 428 | int eType = sqlite3_value_type(pVal); |
| 429 | if( eType==SQLITE_TEXT ){ |
| 430 | Mem *pMem = (Mem*)pVal; |
drh | bd9507c | 2014-08-23 17:21:37 +0000 | [diff] [blame] | 431 | applyNumericAffinity(pMem, 0); |
drh | 1b27b8c | 2014-02-10 03:21:57 +0000 | [diff] [blame] | 432 | eType = sqlite3_value_type(pVal); |
drh | e5a8a1d | 2010-11-18 12:31:24 +0000 | [diff] [blame] | 433 | } |
drh | 1b27b8c | 2014-02-10 03:21:57 +0000 | [diff] [blame] | 434 | return eType; |
drh | 29d7210 | 2006-02-09 22:13:41 +0000 | [diff] [blame] | 435 | } |
| 436 | |
| 437 | /* |
danielk1977 | aee18ef | 2005-03-09 12:26:50 +0000 | [diff] [blame] | 438 | ** Exported version of applyAffinity(). This one works on sqlite3_value*, |
| 439 | ** not the internal Mem* type. |
| 440 | */ |
danielk1977 | 1e53695 | 2007-08-16 10:09:01 +0000 | [diff] [blame] | 441 | void sqlite3ValueApplyAffinity( |
danielk1977 | 1e53695 | 2007-08-16 10:09:01 +0000 | [diff] [blame] | 442 | sqlite3_value *pVal, |
| 443 | u8 affinity, |
| 444 | u8 enc |
| 445 | ){ |
drh | b21c8cd | 2007-08-21 19:33:56 +0000 | [diff] [blame] | 446 | applyAffinity((Mem *)pVal, affinity, enc); |
danielk1977 | aee18ef | 2005-03-09 12:26:50 +0000 | [diff] [blame] | 447 | } |
| 448 | |
drh | 3d1d90a | 2014-03-24 15:00:15 +0000 | [diff] [blame] | 449 | /* |
drh | f1a89ed | 2014-08-23 17:41:15 +0000 | [diff] [blame] | 450 | ** pMem currently only holds a string type (or maybe a BLOB that we can |
| 451 | ** interpret as a string if we want to). Compute its corresponding |
drh | 74eaba4 | 2014-09-18 17:52:15 +0000 | [diff] [blame] | 452 | ** numeric type, if has one. Set the pMem->u.r and pMem->u.i fields |
drh | f1a89ed | 2014-08-23 17:41:15 +0000 | [diff] [blame] | 453 | ** accordingly. |
| 454 | */ |
| 455 | static u16 SQLITE_NOINLINE computeNumericType(Mem *pMem){ |
drh | 9a27822 | 2019-06-07 22:26:08 +0000 | [diff] [blame] | 456 | int rc; |
| 457 | sqlite3_int64 ix; |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 458 | assert( (pMem->flags & (MEM_Int|MEM_Real|MEM_IntReal))==0 ); |
drh | f1a89ed | 2014-08-23 17:41:15 +0000 | [diff] [blame] | 459 | assert( (pMem->flags & (MEM_Str|MEM_Blob))!=0 ); |
drh | 1fd1cc4 | 2021-04-10 15:34:30 +0000 | [diff] [blame] | 460 | if( ExpandBlob(pMem) ){ |
| 461 | pMem->u.i = 0; |
| 462 | return MEM_Int; |
| 463 | } |
drh | 9a27822 | 2019-06-07 22:26:08 +0000 | [diff] [blame] | 464 | rc = sqlite3AtoF(pMem->z, &pMem->u.r, pMem->n, pMem->enc); |
| 465 | if( rc<=0 ){ |
| 466 | if( rc==0 && sqlite3Atoi64(pMem->z, &ix, pMem->n, pMem->enc)<=1 ){ |
| 467 | pMem->u.i = ix; |
| 468 | return MEM_Int; |
| 469 | }else{ |
| 470 | return MEM_Real; |
| 471 | } |
| 472 | }else if( rc==1 && sqlite3Atoi64(pMem->z, &ix, pMem->n, pMem->enc)==0 ){ |
| 473 | pMem->u.i = ix; |
drh | f1a89ed | 2014-08-23 17:41:15 +0000 | [diff] [blame] | 474 | return MEM_Int; |
| 475 | } |
| 476 | return MEM_Real; |
| 477 | } |
| 478 | |
| 479 | /* |
drh | 3d1d90a | 2014-03-24 15:00:15 +0000 | [diff] [blame] | 480 | ** Return the numeric type for pMem, either MEM_Int or MEM_Real or both or |
| 481 | ** none. |
| 482 | ** |
| 483 | ** Unlike applyNumericAffinity(), this routine does not modify pMem->flags. |
drh | 74eaba4 | 2014-09-18 17:52:15 +0000 | [diff] [blame] | 484 | ** But it does set pMem->u.r and pMem->u.i appropriately. |
drh | 3d1d90a | 2014-03-24 15:00:15 +0000 | [diff] [blame] | 485 | */ |
| 486 | static u16 numericType(Mem *pMem){ |
drh | 5e10d89 | 2022-08-08 13:04:08 +0000 | [diff] [blame] | 487 | assert( (pMem->flags & MEM_Null)==0 |
| 488 | || pMem->db==0 || pMem->db->mallocFailed ); |
| 489 | if( pMem->flags & (MEM_Int|MEM_Real|MEM_IntReal|MEM_Null) ){ |
drh | 3242c69 | 2019-05-04 01:29:13 +0000 | [diff] [blame] | 490 | testcase( pMem->flags & MEM_Int ); |
| 491 | testcase( pMem->flags & MEM_Real ); |
| 492 | testcase( pMem->flags & MEM_IntReal ); |
drh | 5e10d89 | 2022-08-08 13:04:08 +0000 | [diff] [blame] | 493 | return pMem->flags & (MEM_Int|MEM_Real|MEM_IntReal|MEM_Null); |
drh | 3d1d90a | 2014-03-24 15:00:15 +0000 | [diff] [blame] | 494 | } |
drh | 5e10d89 | 2022-08-08 13:04:08 +0000 | [diff] [blame] | 495 | assert( pMem->flags & (MEM_Str|MEM_Blob) ); |
| 496 | testcase( pMem->flags & MEM_Str ); |
| 497 | testcase( pMem->flags & MEM_Blob ); |
| 498 | return computeNumericType(pMem); |
drh | 3d1d90a | 2014-03-24 15:00:15 +0000 | [diff] [blame] | 499 | return 0; |
| 500 | } |
| 501 | |
danielk1977 | b5402fb | 2005-01-12 07:15:04 +0000 | [diff] [blame] | 502 | #ifdef SQLITE_DEBUG |
drh | b6f5452 | 2004-05-20 02:42:16 +0000 | [diff] [blame] | 503 | /* |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 504 | ** Write a nice string representation of the contents of cell pMem |
| 505 | ** into buffer zBuf, length nBuf. |
| 506 | */ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 507 | void sqlite3VdbeMemPrettyPrint(Mem *pMem, StrAccum *pStr){ |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 508 | int f = pMem->flags; |
drh | 5719628 | 2004-10-06 15:41:16 +0000 | [diff] [blame] | 509 | static const char *const encnames[] = {"(X)", "(8)", "(16LE)", "(16BE)"}; |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 510 | if( f&MEM_Blob ){ |
| 511 | int i; |
| 512 | char c; |
| 513 | if( f & MEM_Dyn ){ |
| 514 | c = 'z'; |
| 515 | assert( (f & (MEM_Static|MEM_Ephem))==0 ); |
| 516 | }else if( f & MEM_Static ){ |
| 517 | c = 't'; |
| 518 | assert( (f & (MEM_Dyn|MEM_Ephem))==0 ); |
| 519 | }else if( f & MEM_Ephem ){ |
| 520 | c = 'e'; |
| 521 | assert( (f & (MEM_Static|MEM_Dyn))==0 ); |
| 522 | }else{ |
| 523 | c = 's'; |
| 524 | } |
drh | ded33cc | 2020-01-08 11:36:30 +0000 | [diff] [blame] | 525 | sqlite3_str_appendf(pStr, "%cx[", c); |
drh | efb5f9a | 2019-08-30 21:52:13 +0000 | [diff] [blame] | 526 | for(i=0; i<25 && i<pMem->n; i++){ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 527 | sqlite3_str_appendf(pStr, "%02X", ((int)pMem->z[i] & 0xFF)); |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 528 | } |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 529 | sqlite3_str_appendf(pStr, "|"); |
drh | efb5f9a | 2019-08-30 21:52:13 +0000 | [diff] [blame] | 530 | for(i=0; i<25 && i<pMem->n; i++){ |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 531 | char z = pMem->z[i]; |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 532 | sqlite3_str_appendchar(pStr, 1, (z<32||z>126)?'.':z); |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 533 | } |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 534 | sqlite3_str_appendf(pStr,"]"); |
drh | fdf972a | 2007-05-02 13:30:27 +0000 | [diff] [blame] | 535 | if( f & MEM_Zero ){ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 536 | sqlite3_str_appendf(pStr, "+%dz",pMem->u.nZero); |
drh | fdf972a | 2007-05-02 13:30:27 +0000 | [diff] [blame] | 537 | } |
danielk1977 | b1bc953 | 2004-05-22 03:05:33 +0000 | [diff] [blame] | 538 | }else if( f & MEM_Str ){ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 539 | int j; |
mistachkin | 5917117 | 2020-01-18 19:02:20 +0000 | [diff] [blame] | 540 | u8 c; |
danielk1977 | b1bc953 | 2004-05-22 03:05:33 +0000 | [diff] [blame] | 541 | if( f & MEM_Dyn ){ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 542 | c = 'z'; |
danielk1977 | b1bc953 | 2004-05-22 03:05:33 +0000 | [diff] [blame] | 543 | assert( (f & (MEM_Static|MEM_Ephem))==0 ); |
| 544 | }else if( f & MEM_Static ){ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 545 | c = 't'; |
danielk1977 | b1bc953 | 2004-05-22 03:05:33 +0000 | [diff] [blame] | 546 | assert( (f & (MEM_Dyn|MEM_Ephem))==0 ); |
| 547 | }else if( f & MEM_Ephem ){ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 548 | c = 'e'; |
danielk1977 | b1bc953 | 2004-05-22 03:05:33 +0000 | [diff] [blame] | 549 | assert( (f & (MEM_Static|MEM_Dyn))==0 ); |
| 550 | }else{ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 551 | c = 's'; |
danielk1977 | b1bc953 | 2004-05-22 03:05:33 +0000 | [diff] [blame] | 552 | } |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 553 | sqlite3_str_appendf(pStr, " %c%d[", c, pMem->n); |
drh | efb5f9a | 2019-08-30 21:52:13 +0000 | [diff] [blame] | 554 | for(j=0; j<25 && j<pMem->n; j++){ |
mistachkin | 5917117 | 2020-01-18 19:02:20 +0000 | [diff] [blame] | 555 | c = pMem->z[j]; |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 556 | sqlite3_str_appendchar(pStr, 1, (c>=0x20&&c<=0x7f) ? c : '.'); |
danielk1977 | b1bc953 | 2004-05-22 03:05:33 +0000 | [diff] [blame] | 557 | } |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 558 | sqlite3_str_appendf(pStr, "]%s", encnames[pMem->enc]); |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 559 | } |
danielk1977 | ca6b291 | 2004-05-21 10:49:47 +0000 | [diff] [blame] | 560 | } |
| 561 | #endif |
| 562 | |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 563 | #ifdef SQLITE_DEBUG |
| 564 | /* |
| 565 | ** Print the value of a register for tracing purposes: |
| 566 | */ |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 567 | static void memTracePrint(Mem *p){ |
drh | a5750cf | 2014-02-07 13:20:31 +0000 | [diff] [blame] | 568 | if( p->flags & MEM_Undefined ){ |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 569 | printf(" undefined"); |
drh | 953f761 | 2012-12-07 22:18:54 +0000 | [diff] [blame] | 570 | }else if( p->flags & MEM_Null ){ |
drh | ce2fbd1 | 2018-01-12 21:00:14 +0000 | [diff] [blame] | 571 | printf(p->flags & MEM_Zero ? " NULL-nochng" : " NULL"); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 572 | }else if( (p->flags & (MEM_Int|MEM_Str))==(MEM_Int|MEM_Str) ){ |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 573 | printf(" si:%lld", p->u.i); |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 574 | }else if( (p->flags & (MEM_IntReal))!=0 ){ |
drh | 83a1daf | 2019-05-01 18:59:33 +0000 | [diff] [blame] | 575 | printf(" ir:%lld", p->u.i); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 576 | }else if( p->flags & MEM_Int ){ |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 577 | printf(" i:%lld", p->u.i); |
drh | 0b3bf92 | 2009-06-15 20:45:34 +0000 | [diff] [blame] | 578 | #ifndef SQLITE_OMIT_FLOATING_POINT |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 579 | }else if( p->flags & MEM_Real ){ |
drh | d1c472d | 2019-10-03 14:51:59 +0000 | [diff] [blame] | 580 | printf(" r:%.17g", p->u.r); |
drh | 0b3bf92 | 2009-06-15 20:45:34 +0000 | [diff] [blame] | 581 | #endif |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 582 | }else if( sqlite3VdbeMemIsRowSet(p) ){ |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 583 | printf(" (rowset)"); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 584 | }else{ |
drh | 5ca0632 | 2020-01-06 19:23:41 +0000 | [diff] [blame] | 585 | StrAccum acc; |
| 586 | char zBuf[1000]; |
| 587 | sqlite3StrAccumInit(&acc, 0, zBuf, sizeof(zBuf), 0); |
| 588 | sqlite3VdbeMemPrettyPrint(p, &acc); |
| 589 | printf(" %s", sqlite3StrAccumFinish(&acc)); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 590 | } |
dan | 5b6c8e4 | 2016-01-30 15:46:03 +0000 | [diff] [blame] | 591 | if( p->flags & MEM_Subtype ) printf(" subtype=0x%02x", p->eSubtype); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 592 | } |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 593 | static void registerTrace(int iReg, Mem *p){ |
drh | 22e95fb | 2020-01-02 14:42:42 +0000 | [diff] [blame] | 594 | printf("R[%d] = ", iReg); |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 595 | memTracePrint(p); |
drh | 22e95fb | 2020-01-02 14:42:42 +0000 | [diff] [blame] | 596 | if( p->pScopyFrom ){ |
| 597 | printf(" <== R[%d]", (int)(p->pScopyFrom - &p[-iReg])); |
| 598 | } |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 599 | printf("\n"); |
drh | e2bc655 | 2017-04-17 20:50:34 +0000 | [diff] [blame] | 600 | sqlite3VdbeCheckMemInvariants(p); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 601 | } |
drh | 93ffb50 | 2021-05-18 19:10:10 +0000 | [diff] [blame] | 602 | /**/ void sqlite3PrintMem(Mem *pMem){ |
drh | 59df3e9 | 2021-05-05 19:46:50 +0000 | [diff] [blame] | 603 | memTracePrint(pMem); |
| 604 | printf("\n"); |
| 605 | fflush(stdout); |
| 606 | } |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 607 | #endif |
| 608 | |
| 609 | #ifdef SQLITE_DEBUG |
drh | 22e95fb | 2020-01-02 14:42:42 +0000 | [diff] [blame] | 610 | /* |
| 611 | ** Show the values of all registers in the virtual machine. Used for |
| 612 | ** interactive debugging. |
| 613 | */ |
| 614 | void sqlite3VdbeRegisterDump(Vdbe *v){ |
| 615 | int i; |
| 616 | for(i=1; i<v->nMem; i++) registerTrace(i, v->aMem+i); |
| 617 | } |
| 618 | #endif /* SQLITE_DEBUG */ |
| 619 | |
| 620 | |
| 621 | #ifdef SQLITE_DEBUG |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 622 | # define REGISTER_TRACE(R,M) if(db->flags&SQLITE_VdbeTrace)registerTrace(R,M) |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 623 | #else |
| 624 | # define REGISTER_TRACE(R,M) |
| 625 | #endif |
| 626 | |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 627 | #ifndef NDEBUG |
| 628 | /* |
| 629 | ** This function is only called from within an assert() expression. It |
| 630 | ** checks that the sqlite3.nTransaction variable is correctly set to |
| 631 | ** the number of non-transaction savepoints currently in the |
| 632 | ** linked list starting at sqlite3.pSavepoint. |
| 633 | ** |
| 634 | ** Usage: |
| 635 | ** |
| 636 | ** assert( checkSavepointCount(db) ); |
| 637 | */ |
| 638 | static int checkSavepointCount(sqlite3 *db){ |
| 639 | int n = 0; |
| 640 | Savepoint *p; |
| 641 | for(p=db->pSavepoint; p; p=p->pNext) n++; |
| 642 | assert( n==(db->nSavepoint + db->isTransactionSavepoint) ); |
| 643 | return 1; |
| 644 | } |
| 645 | #endif |
| 646 | |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 647 | /* |
| 648 | ** Return the register of pOp->p2 after first preparing it to be |
| 649 | ** overwritten with an integer value. |
drh | 9eef8c6 | 2015-10-15 17:31:41 +0000 | [diff] [blame] | 650 | */ |
| 651 | static SQLITE_NOINLINE Mem *out2PrereleaseWithClear(Mem *pOut){ |
| 652 | sqlite3VdbeMemSetNull(pOut); |
| 653 | pOut->flags = MEM_Int; |
| 654 | return pOut; |
| 655 | } |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 656 | static Mem *out2Prerelease(Vdbe *p, VdbeOp *pOp){ |
| 657 | Mem *pOut; |
| 658 | assert( pOp->p2>0 ); |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 659 | assert( pOp->p2<=(p->nMem+1 - p->nCursor) ); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 660 | pOut = &p->aMem[pOp->p2]; |
| 661 | memAboutToChange(p, pOut); |
drh | a3fa140 | 2016-04-29 02:55:05 +0000 | [diff] [blame] | 662 | if( VdbeMemDynamic(pOut) ){ /*OPTIMIZATION-IF-FALSE*/ |
drh | 9eef8c6 | 2015-10-15 17:31:41 +0000 | [diff] [blame] | 663 | return out2PrereleaseWithClear(pOut); |
| 664 | }else{ |
| 665 | pOut->flags = MEM_Int; |
| 666 | return pOut; |
| 667 | } |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 668 | } |
| 669 | |
drh | faf9c77 | 2021-08-20 08:05:42 +0000 | [diff] [blame] | 670 | /* |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 671 | ** Compute a bloom filter hash using pOp->p4.i registers from aMem[] beginning |
| 672 | ** with pOp->p3. Return the hash. |
| 673 | */ |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 674 | static u64 filterHash(const Mem *aMem, const Op *pOp){ |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 675 | int i, mx; |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 676 | u64 h = 0; |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 677 | |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 678 | assert( pOp->p4type==P4_INT32 ); |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 679 | for(i=pOp->p3, mx=i+pOp->p4.i; i<mx; i++){ |
| 680 | const Mem *p = &aMem[i]; |
| 681 | if( p->flags & (MEM_Int|MEM_IntReal) ){ |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 682 | h += p->u.i; |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 683 | }else if( p->flags & MEM_Real ){ |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 684 | h += sqlite3VdbeIntValue(p); |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 685 | }else if( p->flags & (MEM_Str|MEM_Blob) ){ |
| 686 | h += p->n; |
drh | 067c60c | 2021-12-04 18:45:08 +0000 | [diff] [blame] | 687 | if( p->flags & MEM_Zero ) h += p->u.nZero; |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 688 | } |
| 689 | } |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 690 | return h; |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 691 | } |
| 692 | |
| 693 | /* |
drh | faf9c77 | 2021-08-20 08:05:42 +0000 | [diff] [blame] | 694 | ** Return the symbolic name for the data type of a pMem |
| 695 | */ |
| 696 | static const char *vdbeMemTypeName(Mem *pMem){ |
| 697 | static const char *azTypes[] = { |
| 698 | /* SQLITE_INTEGER */ "INT", |
| 699 | /* SQLITE_FLOAT */ "REAL", |
| 700 | /* SQLITE_TEXT */ "TEXT", |
| 701 | /* SQLITE_BLOB */ "BLOB", |
| 702 | /* SQLITE_NULL */ "NULL" |
| 703 | }; |
| 704 | return azTypes[sqlite3_value_type(pMem)-1]; |
| 705 | } |
drh | b975598 | 2010-07-24 16:34:37 +0000 | [diff] [blame] | 706 | |
| 707 | /* |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 708 | ** Execute as much of a VDBE program as we can. |
| 709 | ** This is the core of sqlite3_step(). |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 710 | */ |
danielk1977 | 4adee20 | 2004-05-08 08:23:19 +0000 | [diff] [blame] | 711 | int sqlite3VdbeExec( |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 712 | Vdbe *p /* The VDBE */ |
| 713 | ){ |
drh | bbe879d | 2009-11-14 18:04:35 +0000 | [diff] [blame] | 714 | Op *aOp = p->aOp; /* Copy of p->aOp */ |
mistachkin | 5f7b95f | 2017-02-01 23:03:54 +0000 | [diff] [blame] | 715 | Op *pOp = aOp; /* Current operation */ |
drh | b89aeb6 | 2016-01-27 15:49:32 +0000 | [diff] [blame] | 716 | #ifdef SQLITE_DEBUG |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 717 | Op *pOrigOp; /* Value of pOp at the top of the loop */ |
drh | def19e3 | 2016-01-27 16:26:25 +0000 | [diff] [blame] | 718 | int nExtraDelete = 0; /* Verifies FORDELETE and AUXDELETE flags */ |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 719 | u8 iCompareIsInit = 0; /* iCompare is initialized */ |
drh | b89aeb6 | 2016-01-27 15:49:32 +0000 | [diff] [blame] | 720 | #endif |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 721 | int rc = SQLITE_OK; /* Value to return */ |
drh | 9bb575f | 2004-09-06 17:24:11 +0000 | [diff] [blame] | 722 | sqlite3 *db = p->db; /* The database */ |
drh | cdf011d | 2011-04-04 21:25:28 +0000 | [diff] [blame] | 723 | u8 resetSchemaOnFault = 0; /* Reset schema after an error if positive */ |
drh | 8079a0d | 2006-01-12 17:20:50 +0000 | [diff] [blame] | 724 | u8 encoding = ENC(db); /* The database encoding */ |
drh | 0f825a7 | 2016-08-13 14:17:02 +0000 | [diff] [blame] | 725 | int iCompare = 0; /* Result of last comparison */ |
drh | d1d8914 | 2020-07-06 12:13:05 +0000 | [diff] [blame] | 726 | u64 nVmStep = 0; /* Number of virtual machine steps */ |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 727 | #ifndef SQLITE_OMIT_PROGRESS_CALLBACK |
drh | d1d8914 | 2020-07-06 12:13:05 +0000 | [diff] [blame] | 728 | u64 nProgressLimit; /* Invoke xProgress() when nVmStep reaches this */ |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 729 | #endif |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 730 | Mem *aMem = p->aMem; /* Copy of p->aMem */ |
drh | b27b7f5 | 2008-12-10 18:03:45 +0000 | [diff] [blame] | 731 | Mem *pIn1 = 0; /* 1st input operand */ |
| 732 | Mem *pIn2 = 0; /* 2nd input operand */ |
| 733 | Mem *pIn3 = 0; /* 3rd input operand */ |
| 734 | Mem *pOut = 0; /* Output operand */ |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 735 | #if defined(SQLITE_ENABLE_STMT_SCANSTATUS) || defined(VDBE_PROFILE) |
| 736 | u64 *pnCycle = 0; |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 737 | #endif |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 738 | /*** INSERT STACK UNION HERE ***/ |
drh | e63d999 | 2008-08-13 19:11:48 +0000 | [diff] [blame] | 739 | |
drh | 66181ce | 2022-03-31 20:04:49 +0000 | [diff] [blame] | 740 | assert( p->eVdbeState==VDBE_RUN_STATE ); /* sqlite3_step() verifies this */ |
drh | de5f3af | 2022-12-23 11:46:57 +0000 | [diff] [blame] | 741 | if( DbMaskNonZero(p->lockMask) ){ |
| 742 | sqlite3VdbeEnter(p); |
| 743 | } |
drh | 82642f8 | 2019-02-12 22:58:32 +0000 | [diff] [blame] | 744 | #ifndef SQLITE_OMIT_PROGRESS_CALLBACK |
| 745 | if( db->xProgress ){ |
| 746 | u32 iPrior = p->aCounter[SQLITE_STMTSTATUS_VM_STEP]; |
| 747 | assert( 0 < db->nProgressOps ); |
| 748 | nProgressLimit = db->nProgressOps - (iPrior % db->nProgressOps); |
| 749 | }else{ |
drh | d1d8914 | 2020-07-06 12:13:05 +0000 | [diff] [blame] | 750 | nProgressLimit = LARGEST_UINT64; |
drh | 82642f8 | 2019-02-12 22:58:32 +0000 | [diff] [blame] | 751 | } |
| 752 | #endif |
danielk1977 | 2e588c7 | 2005-12-09 14:25:08 +0000 | [diff] [blame] | 753 | if( p->rc==SQLITE_NOMEM ){ |
| 754 | /* This happens if a malloc() inside a call to sqlite3_column_text() or |
| 755 | ** sqlite3_column_text16() failed. */ |
| 756 | goto no_mem; |
| 757 | } |
drh | cbd8db3 | 2015-08-20 17:18:32 +0000 | [diff] [blame] | 758 | assert( p->rc==SQLITE_OK || (p->rc&0xff)==SQLITE_BUSY ); |
drh | a5f3fb3 | 2020-06-03 19:28:10 +0000 | [diff] [blame] | 759 | testcase( p->rc!=SQLITE_OK ); |
| 760 | p->rc = SQLITE_OK; |
drh | 1713afb | 2013-06-28 01:24:57 +0000 | [diff] [blame] | 761 | assert( p->bIsReader || p->readOnly!=0 ); |
drh | 95a7b3e | 2013-09-16 12:57:19 +0000 | [diff] [blame] | 762 | p->iCurrentTime = 0; |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 763 | assert( p->explain==0 ); |
drh | a4afb65 | 2005-07-09 02:16:02 +0000 | [diff] [blame] | 764 | db->busyHandler.nBusy = 0; |
dan | 892edb6 | 2020-03-30 13:35:05 +0000 | [diff] [blame] | 765 | if( AtomicLoad(&db->u1.isInterrupted) ) goto abort_due_to_interrupt; |
drh | 602c237 | 2007-03-01 00:29:13 +0000 | [diff] [blame] | 766 | sqlite3VdbeIOTraceSql(p); |
drh | 3c23a88 | 2007-01-09 14:01:13 +0000 | [diff] [blame] | 767 | #ifdef SQLITE_DEBUG |
danielk1977 | 2d1d86f | 2008-06-20 14:59:51 +0000 | [diff] [blame] | 768 | sqlite3BeginBenignMalloc(); |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 769 | if( p->pc==0 |
| 770 | && (p->db->flags & (SQLITE_VdbeListing|SQLITE_VdbeEQP|SQLITE_VdbeTrace))!=0 |
| 771 | ){ |
drh | 3c23a88 | 2007-01-09 14:01:13 +0000 | [diff] [blame] | 772 | int i; |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 773 | int once = 1; |
drh | 3c23a88 | 2007-01-09 14:01:13 +0000 | [diff] [blame] | 774 | sqlite3VdbePrintSql(p); |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 775 | if( p->db->flags & SQLITE_VdbeListing ){ |
| 776 | printf("VDBE Program Listing:\n"); |
| 777 | for(i=0; i<p->nOp; i++){ |
| 778 | sqlite3VdbePrintOp(stdout, i, &aOp[i]); |
| 779 | } |
drh | 3c23a88 | 2007-01-09 14:01:13 +0000 | [diff] [blame] | 780 | } |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 781 | if( p->db->flags & SQLITE_VdbeEQP ){ |
| 782 | for(i=0; i<p->nOp; i++){ |
| 783 | if( aOp[i].opcode==OP_Explain ){ |
| 784 | if( once ) printf("VDBE Query Plan:\n"); |
| 785 | printf("%s\n", aOp[i].p4.z); |
| 786 | once = 0; |
| 787 | } |
| 788 | } |
| 789 | } |
| 790 | if( p->db->flags & SQLITE_VdbeTrace ) printf("VDBE Trace:\n"); |
drh | 3c23a88 | 2007-01-09 14:01:13 +0000 | [diff] [blame] | 791 | } |
danielk1977 | 2d1d86f | 2008-06-20 14:59:51 +0000 | [diff] [blame] | 792 | sqlite3EndBenignMalloc(); |
drh | 3c23a88 | 2007-01-09 14:01:13 +0000 | [diff] [blame] | 793 | #endif |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 794 | for(pOp=&aOp[p->pc]; 1; pOp++){ |
| 795 | /* Errors are detected by individual opcodes, with an immediate |
| 796 | ** jumps to abort_due_to_error. */ |
| 797 | assert( rc==SQLITE_OK ); |
| 798 | |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 799 | assert( pOp>=aOp && pOp<&aOp[p->nOp]); |
drh | bf159fa | 2013-06-25 22:01:22 +0000 | [diff] [blame] | 800 | nVmStep++; |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 801 | #if defined(SQLITE_ENABLE_STMT_SCANSTATUS) || defined(VDBE_PROFILE) |
dan | 7f4b066 | 2022-12-07 20:09:54 +0000 | [diff] [blame] | 802 | pOp->nExec++; |
| 803 | pnCycle = &pOp->nCycle; |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 804 | # ifdef VDBE_PROFILE |
dan | 7f4b066 | 2022-12-07 20:09:54 +0000 | [diff] [blame] | 805 | if( sqlite3NProfileCnt==0 ) |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 806 | # endif |
dan | 7f4b066 | 2022-12-07 20:09:54 +0000 | [diff] [blame] | 807 | *pnCycle -= sqlite3Hwtime(); |
dan | 6f9702e | 2014-11-01 20:38:06 +0000 | [diff] [blame] | 808 | #endif |
drh | 6e142f5 | 2000-06-08 13:36:40 +0000 | [diff] [blame] | 809 | |
danielk1977 | 8b60e0f | 2005-01-12 09:10:39 +0000 | [diff] [blame] | 810 | /* Only allow tracing if SQLITE_DEBUG is defined. |
drh | 6e142f5 | 2000-06-08 13:36:40 +0000 | [diff] [blame] | 811 | */ |
danielk1977 | 8b60e0f | 2005-01-12 09:10:39 +0000 | [diff] [blame] | 812 | #ifdef SQLITE_DEBUG |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 813 | if( db->flags & SQLITE_VdbeTrace ){ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 814 | sqlite3VdbePrintOp(stdout, (int)(pOp - aOp), pOp); |
drh | 22e95fb | 2020-01-02 14:42:42 +0000 | [diff] [blame] | 815 | test_trace_breakpoint((int)(pOp - aOp),pOp,p); |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 816 | } |
drh | 3f7d4e4 | 2004-07-24 14:35:58 +0000 | [diff] [blame] | 817 | #endif |
| 818 | |
drh | 6e142f5 | 2000-06-08 13:36:40 +0000 | [diff] [blame] | 819 | |
drh | f603871 | 2004-02-08 18:07:34 +0000 | [diff] [blame] | 820 | /* Check to see if we need to simulate an interrupt. This only happens |
| 821 | ** if we have a special test build. |
| 822 | */ |
| 823 | #ifdef SQLITE_TEST |
danielk1977 | 6f8a503 | 2004-05-10 10:34:51 +0000 | [diff] [blame] | 824 | if( sqlite3_interrupt_count>0 ){ |
| 825 | sqlite3_interrupt_count--; |
| 826 | if( sqlite3_interrupt_count==0 ){ |
| 827 | sqlite3_interrupt(db); |
drh | f603871 | 2004-02-08 18:07:34 +0000 | [diff] [blame] | 828 | } |
| 829 | } |
| 830 | #endif |
| 831 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 832 | /* Sanity checking on other operands */ |
| 833 | #ifdef SQLITE_DEBUG |
drh | 7cc84c2 | 2016-04-11 13:36:42 +0000 | [diff] [blame] | 834 | { |
| 835 | u8 opProperty = sqlite3OpcodeProperty[pOp->opcode]; |
| 836 | if( (opProperty & OPFLG_IN1)!=0 ){ |
| 837 | assert( pOp->p1>0 ); |
| 838 | assert( pOp->p1<=(p->nMem+1 - p->nCursor) ); |
| 839 | assert( memIsValid(&aMem[pOp->p1]) ); |
| 840 | assert( sqlite3VdbeCheckMemInvariants(&aMem[pOp->p1]) ); |
| 841 | REGISTER_TRACE(pOp->p1, &aMem[pOp->p1]); |
| 842 | } |
| 843 | if( (opProperty & OPFLG_IN2)!=0 ){ |
| 844 | assert( pOp->p2>0 ); |
| 845 | assert( pOp->p2<=(p->nMem+1 - p->nCursor) ); |
| 846 | assert( memIsValid(&aMem[pOp->p2]) ); |
| 847 | assert( sqlite3VdbeCheckMemInvariants(&aMem[pOp->p2]) ); |
| 848 | REGISTER_TRACE(pOp->p2, &aMem[pOp->p2]); |
| 849 | } |
| 850 | if( (opProperty & OPFLG_IN3)!=0 ){ |
| 851 | assert( pOp->p3>0 ); |
| 852 | assert( pOp->p3<=(p->nMem+1 - p->nCursor) ); |
| 853 | assert( memIsValid(&aMem[pOp->p3]) ); |
| 854 | assert( sqlite3VdbeCheckMemInvariants(&aMem[pOp->p3]) ); |
| 855 | REGISTER_TRACE(pOp->p3, &aMem[pOp->p3]); |
| 856 | } |
| 857 | if( (opProperty & OPFLG_OUT2)!=0 ){ |
| 858 | assert( pOp->p2>0 ); |
| 859 | assert( pOp->p2<=(p->nMem+1 - p->nCursor) ); |
| 860 | memAboutToChange(p, &aMem[pOp->p2]); |
| 861 | } |
| 862 | if( (opProperty & OPFLG_OUT3)!=0 ){ |
| 863 | assert( pOp->p3>0 ); |
| 864 | assert( pOp->p3<=(p->nMem+1 - p->nCursor) ); |
| 865 | memAboutToChange(p, &aMem[pOp->p3]); |
| 866 | } |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 867 | } |
| 868 | #endif |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 869 | #ifdef SQLITE_DEBUG |
drh | 6dc4148 | 2015-04-16 17:31:02 +0000 | [diff] [blame] | 870 | pOrigOp = pOp; |
| 871 | #endif |
drh | 93952eb | 2009-11-13 19:43:43 +0000 | [diff] [blame] | 872 | |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 873 | switch( pOp->opcode ){ |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 874 | |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 875 | /***************************************************************************** |
| 876 | ** What follows is a massive switch statement where each case implements a |
| 877 | ** separate instruction in the virtual machine. If we follow the usual |
| 878 | ** indentation conventions, each case should be indented by 6 spaces. But |
| 879 | ** that is a lot of wasted space on the left margin. So the code within |
| 880 | ** the switch statement will break with convention and be flush-left. Another |
| 881 | ** big comment (similar to this one) will mark the point in the code where |
| 882 | ** we transition back to normal indentation. |
drh | ac82fcf | 2002-09-08 17:23:41 +0000 | [diff] [blame] | 883 | ** |
| 884 | ** The formatting of each case is important. The makefile for SQLite |
| 885 | ** generates two C files "opcodes.h" and "opcodes.c" by scanning this |
| 886 | ** file looking for lines that begin with "case OP_". The opcodes.h files |
| 887 | ** will be filled with #defines that give unique integer values to each |
| 888 | ** opcode and the opcodes.c file is filled with an array of strings where |
drh | f2bc013 | 2004-10-04 13:19:23 +0000 | [diff] [blame] | 889 | ** each string is the symbolic name for the corresponding opcode. If the |
| 890 | ** case statement is followed by a comment of the form "/# same as ... #/" |
| 891 | ** that comment is used to determine the particular value of the opcode. |
drh | ac82fcf | 2002-09-08 17:23:41 +0000 | [diff] [blame] | 892 | ** |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 893 | ** Other keywords in the comment that follows each case are used to |
| 894 | ** construct the OPFLG_INITIALIZER value that initializes opcodeProperty[]. |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 895 | ** Keywords include: in1, in2, in3, out2, out3. See |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 896 | ** the mkopcodeh.awk script for additional information. |
danielk1977 | bc04f85 | 2005-03-29 08:26:13 +0000 | [diff] [blame] | 897 | ** |
drh | ac82fcf | 2002-09-08 17:23:41 +0000 | [diff] [blame] | 898 | ** Documentation about VDBE opcodes is generated by scanning this file |
| 899 | ** for lines of that contain "Opcode:". That line and all subsequent |
| 900 | ** comment lines are used in the generation of the opcode.html documentation |
| 901 | ** file. |
| 902 | ** |
| 903 | ** SUMMARY: |
| 904 | ** |
| 905 | ** Formatting is important to scripts that scan this file. |
| 906 | ** Do not deviate from the formatting style currently in use. |
| 907 | ** |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 908 | *****************************************************************************/ |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 909 | |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 910 | /* Opcode: Goto * P2 * * * |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 911 | ** |
| 912 | ** An unconditional jump to address P2. |
| 913 | ** The next instruction executed will be |
| 914 | ** the one at index P2 from the beginning of |
| 915 | ** the program. |
drh | fe70510 | 2014-03-06 13:38:37 +0000 | [diff] [blame] | 916 | ** |
| 917 | ** The P1 parameter is not actually used by this opcode. However, it |
| 918 | ** is sometimes set to 1 instead of 0 as a hint to the command-line shell |
| 919 | ** that this Goto is the bottom of a loop and that the lines from P2 down |
| 920 | ** to the current line should be indented for EXPLAIN output. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 921 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 922 | case OP_Goto: { /* jump */ |
drh | d9670ab | 2019-12-28 01:52:46 +0000 | [diff] [blame] | 923 | |
| 924 | #ifdef SQLITE_DEBUG |
| 925 | /* In debuggging mode, when the p5 flags is set on an OP_Goto, that |
| 926 | ** means we should really jump back to the preceeding OP_ReleaseReg |
| 927 | ** instruction. */ |
| 928 | if( pOp->p5 ){ |
| 929 | assert( pOp->p2 < (int)(pOp - aOp) ); |
| 930 | assert( pOp->p2 > 1 ); |
| 931 | pOp = &aOp[pOp->p2 - 2]; |
| 932 | assert( pOp[1].opcode==OP_ReleaseReg ); |
| 933 | goto check_for_interrupt; |
| 934 | } |
| 935 | #endif |
| 936 | |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 937 | jump_to_p2_and_check_for_interrupt: |
| 938 | pOp = &aOp[pOp->p2 - 1]; |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 939 | |
| 940 | /* Opcodes that are used as the bottom of a loop (OP_Next, OP_Prev, |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 941 | ** OP_VNext, or OP_SorterNext) all jump here upon |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 942 | ** completion. Check to see if sqlite3_interrupt() has been called |
| 943 | ** or if the progress callback needs to be invoked. |
| 944 | ** |
| 945 | ** This code uses unstructured "goto" statements and does not look clean. |
| 946 | ** But that is not due to sloppy coding habits. The code is written this |
| 947 | ** way for performance, to avoid having to run the interrupt and progress |
| 948 | ** checks on every opcode. This helps sqlite3_step() to run about 1.5% |
| 949 | ** faster according to "valgrind --tool=cachegrind" */ |
| 950 | check_for_interrupt: |
dan | 892edb6 | 2020-03-30 13:35:05 +0000 | [diff] [blame] | 951 | if( AtomicLoad(&db->u1.isInterrupted) ) goto abort_due_to_interrupt; |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 952 | #ifndef SQLITE_OMIT_PROGRESS_CALLBACK |
| 953 | /* Call the progress callback if it is configured and the required number |
| 954 | ** of VDBE ops have been executed (either since this invocation of |
| 955 | ** sqlite3VdbeExec() or since last time the progress callback was called). |
| 956 | ** If the progress callback returns non-zero, exit the virtual machine with |
| 957 | ** a return code SQLITE_ABORT. |
| 958 | */ |
drh | b1af9c6 | 2019-02-20 13:55:45 +0000 | [diff] [blame] | 959 | while( nVmStep>=nProgressLimit && db->xProgress!=0 ){ |
drh | 400fcba | 2013-11-14 00:09:48 +0000 | [diff] [blame] | 960 | assert( db->nProgressOps!=0 ); |
drh | b1af9c6 | 2019-02-20 13:55:45 +0000 | [diff] [blame] | 961 | nProgressLimit += db->nProgressOps; |
drh | 400fcba | 2013-11-14 00:09:48 +0000 | [diff] [blame] | 962 | if( db->xProgress(db->pProgressArg) ){ |
drh | d1d8914 | 2020-07-06 12:13:05 +0000 | [diff] [blame] | 963 | nProgressLimit = LARGEST_UINT64; |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 964 | rc = SQLITE_INTERRUPT; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 965 | goto abort_due_to_error; |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 966 | } |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 967 | } |
| 968 | #endif |
| 969 | |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 970 | break; |
| 971 | } |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 972 | |
drh | 2eb9537 | 2008-06-06 15:04:36 +0000 | [diff] [blame] | 973 | /* Opcode: Gosub P1 P2 * * * |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 974 | ** |
drh | 2eb9537 | 2008-06-06 15:04:36 +0000 | [diff] [blame] | 975 | ** Write the current address onto register P1 |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 976 | ** and then jump to address P2. |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 977 | */ |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 978 | case OP_Gosub: { /* jump */ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 979 | assert( pOp->p1>0 && pOp->p1<=(p->nMem+1 - p->nCursor) ); |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 980 | pIn1 = &aMem[pOp->p1]; |
drh | c91b2fd | 2014-03-01 18:13:23 +0000 | [diff] [blame] | 981 | assert( VdbeMemDynamic(pIn1)==0 ); |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 982 | memAboutToChange(p, pIn1); |
drh | 2eb9537 | 2008-06-06 15:04:36 +0000 | [diff] [blame] | 983 | pIn1->flags = MEM_Int; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 984 | pIn1->u.i = (int)(pOp-aOp); |
drh | 2eb9537 | 2008-06-06 15:04:36 +0000 | [diff] [blame] | 985 | REGISTER_TRACE(pOp->p1, pIn1); |
drh | d549a70 | 2022-04-14 18:19:06 +0000 | [diff] [blame] | 986 | goto jump_to_p2_and_check_for_interrupt; |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 987 | } |
| 988 | |
drh | e603ab0 | 2022-04-07 19:06:31 +0000 | [diff] [blame] | 989 | /* Opcode: Return P1 P2 P3 * * |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 990 | ** |
drh | 2bd9f44 | 2022-04-17 20:30:52 +0000 | [diff] [blame] | 991 | ** Jump to the address stored in register P1. If P1 is a return address |
| 992 | ** register, then this accomplishes a return from a subroutine. |
drh | 6134b2d | 2022-04-11 17:27:38 +0000 | [diff] [blame] | 993 | ** |
drh | 2bd9f44 | 2022-04-17 20:30:52 +0000 | [diff] [blame] | 994 | ** If P3 is 1, then the jump is only taken if register P1 holds an integer |
| 995 | ** values, otherwise execution falls through to the next opcode, and the |
| 996 | ** OP_Return becomes a no-op. If P3 is 0, then register P1 must hold an |
| 997 | ** integer or else an assert() is raised. P3 should be set to 1 when |
| 998 | ** this opcode is used in combination with OP_BeginSubrtn, and set to 0 |
| 999 | ** otherwise. |
| 1000 | ** |
| 1001 | ** The value in register P1 is unchanged by this opcode. |
drh | 1902516 | 2022-03-03 15:00:44 +0000 | [diff] [blame] | 1002 | ** |
drh | e603ab0 | 2022-04-07 19:06:31 +0000 | [diff] [blame] | 1003 | ** P2 is not used by the byte-code engine. However, if P2 is positive |
| 1004 | ** and also less than the current address, then the "EXPLAIN" output |
| 1005 | ** formatter in the CLI will indent all opcodes from the P2 opcode up |
| 1006 | ** to be not including the current Return. P2 should be the first opcode |
drh | 2591cfb | 2022-06-22 14:25:12 +0000 | [diff] [blame] | 1007 | ** in the subroutine from which this opcode is returning. Thus the P2 |
drh | e603ab0 | 2022-04-07 19:06:31 +0000 | [diff] [blame] | 1008 | ** value is a byte-code indentation hint. See tag-20220407a in |
| 1009 | ** wherecode.c and shell.c. |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 1010 | */ |
drh | 2eb9537 | 2008-06-06 15:04:36 +0000 | [diff] [blame] | 1011 | case OP_Return: { /* in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1012 | pIn1 = &aMem[pOp->p1]; |
drh | 2bd9f44 | 2022-04-17 20:30:52 +0000 | [diff] [blame] | 1013 | if( pIn1->flags & MEM_Int ){ |
drh | 6dab33b | 2022-04-21 19:25:51 +0000 | [diff] [blame] | 1014 | if( pOp->p3 ){ VdbeBranchTaken(1, 2); } |
drh | 2bd9f44 | 2022-04-17 20:30:52 +0000 | [diff] [blame] | 1015 | pOp = &aOp[pIn1->u.i]; |
| 1016 | }else if( ALWAYS(pOp->p3) ){ |
| 1017 | VdbeBranchTaken(0, 2); |
| 1018 | } |
drh | 8c74a8c | 2002-08-25 19:20:40 +0000 | [diff] [blame] | 1019 | break; |
| 1020 | } |
| 1021 | |
drh | ed71a83 | 2014-02-07 19:18:10 +0000 | [diff] [blame] | 1022 | /* Opcode: InitCoroutine P1 P2 P3 * * |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1023 | ** |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 1024 | ** Set up register P1 so that it will Yield to the coroutine |
drh | ed71a83 | 2014-02-07 19:18:10 +0000 | [diff] [blame] | 1025 | ** located at address P3. |
| 1026 | ** |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 1027 | ** If P2!=0 then the coroutine implementation immediately follows |
| 1028 | ** this opcode. So jump over the coroutine implementation to |
drh | ed71a83 | 2014-02-07 19:18:10 +0000 | [diff] [blame] | 1029 | ** address P2. |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 1030 | ** |
| 1031 | ** See also: EndCoroutine |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1032 | */ |
| 1033 | case OP_InitCoroutine: { /* jump */ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 1034 | assert( pOp->p1>0 && pOp->p1<=(p->nMem+1 - p->nCursor) ); |
drh | ed71a83 | 2014-02-07 19:18:10 +0000 | [diff] [blame] | 1035 | assert( pOp->p2>=0 && pOp->p2<p->nOp ); |
| 1036 | assert( pOp->p3>=0 && pOp->p3<p->nOp ); |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1037 | pOut = &aMem[pOp->p1]; |
drh | ed71a83 | 2014-02-07 19:18:10 +0000 | [diff] [blame] | 1038 | assert( !VdbeMemDynamic(pOut) ); |
| 1039 | pOut->u.i = pOp->p3 - 1; |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1040 | pOut->flags = MEM_Int; |
drh | d549a70 | 2022-04-14 18:19:06 +0000 | [diff] [blame] | 1041 | if( pOp->p2==0 ) break; |
| 1042 | |
| 1043 | /* Most jump operations do a goto to this spot in order to update |
| 1044 | ** the pOp pointer. */ |
| 1045 | jump_to_p2: |
drh | 207f626 | 2022-05-03 12:11:16 +0000 | [diff] [blame] | 1046 | assert( pOp->p2>0 ); /* There are never any jumps to instruction 0 */ |
| 1047 | assert( pOp->p2<p->nOp ); /* Jumps must be in range */ |
drh | d549a70 | 2022-04-14 18:19:06 +0000 | [diff] [blame] | 1048 | pOp = &aOp[pOp->p2 - 1]; |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1049 | break; |
| 1050 | } |
| 1051 | |
| 1052 | /* Opcode: EndCoroutine P1 * * * * |
| 1053 | ** |
drh | bc5cf38 | 2014-08-06 01:08:07 +0000 | [diff] [blame] | 1054 | ** The instruction at the address in register P1 is a Yield. |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 1055 | ** Jump to the P2 parameter of that Yield. |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1056 | ** After the jump, register P1 becomes undefined. |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 1057 | ** |
| 1058 | ** See also: InitCoroutine |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1059 | */ |
| 1060 | case OP_EndCoroutine: { /* in1 */ |
| 1061 | VdbeOp *pCaller; |
| 1062 | pIn1 = &aMem[pOp->p1]; |
| 1063 | assert( pIn1->flags==MEM_Int ); |
| 1064 | assert( pIn1->u.i>=0 && pIn1->u.i<p->nOp ); |
| 1065 | pCaller = &aOp[pIn1->u.i]; |
| 1066 | assert( pCaller->opcode==OP_Yield ); |
| 1067 | assert( pCaller->p2>=0 && pCaller->p2<p->nOp ); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1068 | pOp = &aOp[pCaller->p2 - 1]; |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1069 | pIn1->flags = MEM_Undefined; |
| 1070 | break; |
| 1071 | } |
| 1072 | |
| 1073 | /* Opcode: Yield P1 P2 * * * |
drh | e00ee6e | 2008-06-20 15:24:01 +0000 | [diff] [blame] | 1074 | ** |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 1075 | ** Swap the program counter with the value in register P1. This |
| 1076 | ** has the effect of yielding to a coroutine. |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1077 | ** |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 1078 | ** If the coroutine that is launched by this instruction ends with |
| 1079 | ** Yield or Return then continue to the next instruction. But if |
| 1080 | ** the coroutine launched by this instruction ends with |
| 1081 | ** EndCoroutine, then jump to P2 rather than continuing with the |
| 1082 | ** next instruction. |
| 1083 | ** |
| 1084 | ** See also: InitCoroutine |
drh | e00ee6e | 2008-06-20 15:24:01 +0000 | [diff] [blame] | 1085 | */ |
drh | 81cf13e | 2014-02-07 18:27:53 +0000 | [diff] [blame] | 1086 | case OP_Yield: { /* in1, jump */ |
drh | e00ee6e | 2008-06-20 15:24:01 +0000 | [diff] [blame] | 1087 | int pcDest; |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1088 | pIn1 = &aMem[pOp->p1]; |
drh | c91b2fd | 2014-03-01 18:13:23 +0000 | [diff] [blame] | 1089 | assert( VdbeMemDynamic(pIn1)==0 ); |
drh | e00ee6e | 2008-06-20 15:24:01 +0000 | [diff] [blame] | 1090 | pIn1->flags = MEM_Int; |
drh | 9c1905f | 2008-12-10 22:32:56 +0000 | [diff] [blame] | 1091 | pcDest = (int)pIn1->u.i; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1092 | pIn1->u.i = (int)(pOp - aOp); |
drh | e00ee6e | 2008-06-20 15:24:01 +0000 | [diff] [blame] | 1093 | REGISTER_TRACE(pOp->p1, pIn1); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1094 | pOp = &aOp[pcDest]; |
drh | e00ee6e | 2008-06-20 15:24:01 +0000 | [diff] [blame] | 1095 | break; |
| 1096 | } |
| 1097 | |
drh | f9c8ce3 | 2013-11-05 13:33:55 +0000 | [diff] [blame] | 1098 | /* Opcode: HaltIfNull P1 P2 P3 P4 P5 |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1099 | ** Synopsis: if r[P3]=null halt |
drh | 5053a79 | 2009-02-20 03:02:23 +0000 | [diff] [blame] | 1100 | ** |
drh | ef8662b | 2011-06-20 21:47:58 +0000 | [diff] [blame] | 1101 | ** Check the value in register P3. If it is NULL then Halt using |
drh | 5053a79 | 2009-02-20 03:02:23 +0000 | [diff] [blame] | 1102 | ** parameter P1, P2, and P4 as if this were a Halt instruction. If the |
| 1103 | ** value in register P3 is not NULL, then this routine is a no-op. |
drh | f9c8ce3 | 2013-11-05 13:33:55 +0000 | [diff] [blame] | 1104 | ** The P5 parameter should be 1. |
drh | 5053a79 | 2009-02-20 03:02:23 +0000 | [diff] [blame] | 1105 | */ |
| 1106 | case OP_HaltIfNull: { /* in3 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1107 | pIn3 = &aMem[pOp->p3]; |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 1108 | #ifdef SQLITE_DEBUG |
| 1109 | if( pOp->p2==OE_Abort ){ sqlite3VdbeAssertAbortable(p); } |
| 1110 | #endif |
drh | 5053a79 | 2009-02-20 03:02:23 +0000 | [diff] [blame] | 1111 | if( (pIn3->flags & MEM_Null)==0 ) break; |
| 1112 | /* Fall through into OP_Halt */ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 1113 | /* no break */ deliberate_fall_through |
drh | 5053a79 | 2009-02-20 03:02:23 +0000 | [diff] [blame] | 1114 | } |
drh | e00ee6e | 2008-06-20 15:24:01 +0000 | [diff] [blame] | 1115 | |
drh | f9c8ce3 | 2013-11-05 13:33:55 +0000 | [diff] [blame] | 1116 | /* Opcode: Halt P1 P2 * P4 P5 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1117 | ** |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 1118 | ** Exit immediately. All open cursors, etc are closed |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1119 | ** automatically. |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 1120 | ** |
drh | 92f02c3 | 2004-09-02 14:57:08 +0000 | [diff] [blame] | 1121 | ** P1 is the result code returned by sqlite3_exec(), sqlite3_reset(), |
| 1122 | ** or sqlite3_finalize(). For a normal halt, this should be SQLITE_OK (0). |
| 1123 | ** For errors, it can be some other value. If P1!=0 then P2 will determine |
| 1124 | ** whether or not to rollback the current transaction. Do not rollback |
| 1125 | ** if P2==OE_Fail. Do the rollback if P2==OE_Rollback. If P2==OE_Abort, |
| 1126 | ** then back out all changes that have occurred during this execution of the |
drh | b798fa6 | 2002-09-03 19:43:23 +0000 | [diff] [blame] | 1127 | ** VDBE, but do not rollback the transaction. |
drh | 9cfcf5d | 2002-01-29 18:41:24 +0000 | [diff] [blame] | 1128 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 1129 | ** If P4 is not null then it is an error message string. |
drh | 7f057c9 | 2005-06-24 03:53:06 +0000 | [diff] [blame] | 1130 | ** |
drh | f9c8ce3 | 2013-11-05 13:33:55 +0000 | [diff] [blame] | 1131 | ** P5 is a value between 0 and 4, inclusive, that modifies the P4 string. |
| 1132 | ** |
| 1133 | ** 0: (no change) |
| 1134 | ** 1: NOT NULL contraint failed: P4 |
| 1135 | ** 2: UNIQUE constraint failed: P4 |
| 1136 | ** 3: CHECK constraint failed: P4 |
| 1137 | ** 4: FOREIGN KEY constraint failed: P4 |
| 1138 | ** |
| 1139 | ** If P5 is not zero and P4 is NULL, then everything after the ":" is |
| 1140 | ** omitted. |
| 1141 | ** |
drh | 9cfcf5d | 2002-01-29 18:41:24 +0000 | [diff] [blame] | 1142 | ** There is an implied "Halt 0 0 0" instruction inserted at the very end of |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 1143 | ** every program. So a jump past the last instruction of the program |
| 1144 | ** is the same as executing Halt. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1145 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1146 | case OP_Halt: { |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1147 | VdbeFrame *pFrame; |
| 1148 | int pcx; |
drh | f9c8ce3 | 2013-11-05 13:33:55 +0000 | [diff] [blame] | 1149 | |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 1150 | #ifdef SQLITE_DEBUG |
| 1151 | if( pOp->p2==OE_Abort ){ sqlite3VdbeAssertAbortable(p); } |
| 1152 | #endif |
drh | 8bb93da | 2022-04-03 20:39:48 +0000 | [diff] [blame] | 1153 | if( p->pFrame && pOp->p1==SQLITE_OK ){ |
dan | 2832ad4 | 2009-08-31 15:27:27 +0000 | [diff] [blame] | 1154 | /* Halt the sub-program. Return control to the parent frame. */ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1155 | pFrame = p->pFrame; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 1156 | p->pFrame = pFrame->pParent; |
| 1157 | p->nFrame--; |
dan | 2832ad4 | 2009-08-31 15:27:27 +0000 | [diff] [blame] | 1158 | sqlite3VdbeSetChanges(db, p->nChange); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1159 | pcx = sqlite3VdbeFrameRestore(pFrame); |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 1160 | if( pOp->p2==OE_Ignore ){ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1161 | /* Instruction pcx is the OP_Program that invoked the sub-program |
dan | 2832ad4 | 2009-08-31 15:27:27 +0000 | [diff] [blame] | 1162 | ** currently being halted. If the p2 instruction of this OP_Halt |
| 1163 | ** instruction is set to OE_Ignore, then the sub-program is throwing |
| 1164 | ** an IGNORE exception. In this case jump to the address specified |
| 1165 | ** as the p2 of the calling OP_Program. */ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1166 | pcx = p->aOp[pcx].p2-1; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 1167 | } |
drh | bbe879d | 2009-11-14 18:04:35 +0000 | [diff] [blame] | 1168 | aOp = p->aOp; |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 1169 | aMem = p->aMem; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1170 | pOp = &aOp[pcx]; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 1171 | break; |
| 1172 | } |
drh | 92f02c3 | 2004-09-02 14:57:08 +0000 | [diff] [blame] | 1173 | p->rc = pOp->p1; |
shane | 36840fd | 2009-06-26 16:32:13 +0000 | [diff] [blame] | 1174 | p->errorAction = (u8)pOp->p2; |
drh | fb4e3a3 | 2016-12-30 00:09:14 +0000 | [diff] [blame] | 1175 | assert( pOp->p5<=4 ); |
drh | f9c8ce3 | 2013-11-05 13:33:55 +0000 | [diff] [blame] | 1176 | if( p->rc ){ |
drh | d9b7ec9 | 2013-11-06 14:05:21 +0000 | [diff] [blame] | 1177 | if( pOp->p5 ){ |
| 1178 | static const char * const azType[] = { "NOT NULL", "UNIQUE", "CHECK", |
| 1179 | "FOREIGN KEY" }; |
drh | d9b7ec9 | 2013-11-06 14:05:21 +0000 | [diff] [blame] | 1180 | testcase( pOp->p5==1 ); |
| 1181 | testcase( pOp->p5==2 ); |
| 1182 | testcase( pOp->p5==3 ); |
| 1183 | testcase( pOp->p5==4 ); |
drh | 99f5de7 | 2016-04-30 02:59:15 +0000 | [diff] [blame] | 1184 | sqlite3VdbeError(p, "%s constraint failed", azType[pOp->p5-1]); |
| 1185 | if( pOp->p4.z ){ |
| 1186 | p->zErrMsg = sqlite3MPrintf(db, "%z: %s", p->zErrMsg, pOp->p4.z); |
| 1187 | } |
drh | d9b7ec9 | 2013-11-06 14:05:21 +0000 | [diff] [blame] | 1188 | }else{ |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 1189 | sqlite3VdbeError(p, "%s", pOp->p4.z); |
drh | f9c8ce3 | 2013-11-05 13:33:55 +0000 | [diff] [blame] | 1190 | } |
drh | 8bb93da | 2022-04-03 20:39:48 +0000 | [diff] [blame] | 1191 | pcx = (int)(pOp - aOp); |
drh | 99f5de7 | 2016-04-30 02:59:15 +0000 | [diff] [blame] | 1192 | sqlite3_log(pOp->p1, "abort at %d in [%s]: %s", pcx, p->zSql, p->zErrMsg); |
drh | 9cfcf5d | 2002-01-29 18:41:24 +0000 | [diff] [blame] | 1193 | } |
drh | 92f02c3 | 2004-09-02 14:57:08 +0000 | [diff] [blame] | 1194 | rc = sqlite3VdbeHalt(p); |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 1195 | assert( rc==SQLITE_BUSY || rc==SQLITE_OK || rc==SQLITE_ERROR ); |
drh | 92f02c3 | 2004-09-02 14:57:08 +0000 | [diff] [blame] | 1196 | if( rc==SQLITE_BUSY ){ |
drh | 99f5de7 | 2016-04-30 02:59:15 +0000 | [diff] [blame] | 1197 | p->rc = SQLITE_BUSY; |
drh | 900b31e | 2007-08-28 02:27:51 +0000 | [diff] [blame] | 1198 | }else{ |
drh | d91c1a1 | 2013-02-09 13:58:25 +0000 | [diff] [blame] | 1199 | assert( rc==SQLITE_OK || (p->rc&0xff)==SQLITE_CONSTRAINT ); |
dan | cb3e4b7 | 2013-07-03 19:53:05 +0000 | [diff] [blame] | 1200 | assert( rc==SQLITE_OK || db->nDeferredCons>0 || db->nDeferredImmCons>0 ); |
drh | 900b31e | 2007-08-28 02:27:51 +0000 | [diff] [blame] | 1201 | rc = p->rc ? SQLITE_ERROR : SQLITE_DONE; |
drh | 92f02c3 | 2004-09-02 14:57:08 +0000 | [diff] [blame] | 1202 | } |
drh | 900b31e | 2007-08-28 02:27:51 +0000 | [diff] [blame] | 1203 | goto vdbe_return; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1204 | } |
drh | c61053b | 2000-06-04 12:58:36 +0000 | [diff] [blame] | 1205 | |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1206 | /* Opcode: Integer P1 P2 * * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1207 | ** Synopsis: r[P2]=P1 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1208 | ** |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1209 | ** The 32-bit integer value P1 is written into register P2. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1210 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1211 | case OP_Integer: { /* out2 */ |
| 1212 | pOut = out2Prerelease(p, pOp); |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1213 | pOut->u.i = pOp->p1; |
drh | 29dda4a | 2005-07-21 18:23:20 +0000 | [diff] [blame] | 1214 | break; |
| 1215 | } |
| 1216 | |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1217 | /* Opcode: Int64 * P2 * P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1218 | ** Synopsis: r[P2]=P4 |
drh | 29dda4a | 2005-07-21 18:23:20 +0000 | [diff] [blame] | 1219 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 1220 | ** P4 is a pointer to a 64-bit integer value. |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1221 | ** Write that value into register P2. |
drh | 29dda4a | 2005-07-21 18:23:20 +0000 | [diff] [blame] | 1222 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1223 | case OP_Int64: { /* out2 */ |
| 1224 | pOut = out2Prerelease(p, pOp); |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 1225 | assert( pOp->p4.pI64!=0 ); |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1226 | pOut->u.i = *pOp->p4.pI64; |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 1227 | break; |
| 1228 | } |
drh | 4f26d6c | 2004-05-26 23:25:30 +0000 | [diff] [blame] | 1229 | |
drh | 13573c7 | 2010-01-12 17:04:07 +0000 | [diff] [blame] | 1230 | #ifndef SQLITE_OMIT_FLOATING_POINT |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1231 | /* Opcode: Real * P2 * P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1232 | ** Synopsis: r[P2]=P4 |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 1233 | ** |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1234 | ** P4 is a pointer to a 64-bit floating point value. |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1235 | ** Write that value into register P2. |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 1236 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1237 | case OP_Real: { /* same as TK_FLOAT, out2 */ |
| 1238 | pOut = out2Prerelease(p, pOp); |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1239 | pOut->flags = MEM_Real; |
drh | 2eaf93d | 2008-04-29 00:15:20 +0000 | [diff] [blame] | 1240 | assert( !sqlite3IsNaN(*pOp->p4.pReal) ); |
drh | 74eaba4 | 2014-09-18 17:52:15 +0000 | [diff] [blame] | 1241 | pOut->u.r = *pOp->p4.pReal; |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 1242 | break; |
| 1243 | } |
drh | 13573c7 | 2010-01-12 17:04:07 +0000 | [diff] [blame] | 1244 | #endif |
danielk1977 | cbb18d2 | 2004-05-28 11:37:27 +0000 | [diff] [blame] | 1245 | |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 1246 | /* Opcode: String8 * P2 * P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1247 | ** Synopsis: r[P2]='P4' |
danielk1977 | cbb18d2 | 2004-05-28 11:37:27 +0000 | [diff] [blame] | 1248 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 1249 | ** P4 points to a nul terminated UTF-8 string. This opcode is transformed |
drh | f07cf6e | 2015-03-06 16:45:16 +0000 | [diff] [blame] | 1250 | ** into a String opcode before it is executed for the first time. During |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 1251 | ** this transformation, the length of string P4 is computed and stored |
| 1252 | ** as the P1 parameter. |
danielk1977 | cbb18d2 | 2004-05-28 11:37:27 +0000 | [diff] [blame] | 1253 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1254 | case OP_String8: { /* same as TK_STRING, out2 */ |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 1255 | assert( pOp->p4.z!=0 ); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1256 | pOut = out2Prerelease(p, pOp); |
drh | ea67883 | 2008-12-10 19:26:22 +0000 | [diff] [blame] | 1257 | pOp->p1 = sqlite3Strlen30(pOp->p4.z); |
drh | ed2df7f | 2005-11-16 04:34:32 +0000 | [diff] [blame] | 1258 | |
| 1259 | #ifndef SQLITE_OMIT_UTF16 |
drh | 8079a0d | 2006-01-12 17:20:50 +0000 | [diff] [blame] | 1260 | if( encoding!=SQLITE_UTF8 ){ |
drh | 3a9cf17 | 2009-06-17 21:42:33 +0000 | [diff] [blame] | 1261 | rc = sqlite3VdbeMemSetStr(pOut, pOp->p4.z, -1, SQLITE_UTF8, SQLITE_STATIC); |
drh | 2f55511 | 2016-04-30 18:10:34 +0000 | [diff] [blame] | 1262 | assert( rc==SQLITE_OK || rc==SQLITE_TOOBIG ); |
drh | dbdddc9 | 2019-02-21 16:41:34 +0000 | [diff] [blame] | 1263 | if( rc ) goto too_big; |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1264 | if( SQLITE_OK!=sqlite3VdbeChangeEncoding(pOut, encoding) ) goto no_mem; |
drh | 17bcb10 | 2014-09-18 21:25:33 +0000 | [diff] [blame] | 1265 | assert( pOut->szMalloc>0 && pOut->zMalloc==pOut->z ); |
drh | c91b2fd | 2014-03-01 18:13:23 +0000 | [diff] [blame] | 1266 | assert( VdbeMemDynamic(pOut)==0 ); |
drh | 17bcb10 | 2014-09-18 21:25:33 +0000 | [diff] [blame] | 1267 | pOut->szMalloc = 0; |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1268 | pOut->flags |= MEM_Static; |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 1269 | if( pOp->p4type==P4_DYNAMIC ){ |
drh | 633e6d5 | 2008-07-28 19:34:53 +0000 | [diff] [blame] | 1270 | sqlite3DbFree(db, pOp->p4.z); |
danielk1977 | e004840 | 2004-06-15 16:51:01 +0000 | [diff] [blame] | 1271 | } |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 1272 | pOp->p4type = P4_DYNAMIC; |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1273 | pOp->p4.z = pOut->z; |
| 1274 | pOp->p1 = pOut->n; |
danielk1977 | 0f69c1e | 2004-05-29 11:24:50 +0000 | [diff] [blame] | 1275 | } |
danielk1977 | 93758c8 | 2005-01-21 08:13:14 +0000 | [diff] [blame] | 1276 | #endif |
drh | bb4957f | 2008-03-20 14:03:29 +0000 | [diff] [blame] | 1277 | if( pOp->p1>db->aLimit[SQLITE_LIMIT_LENGTH] ){ |
drh | cbd2da9 | 2007-12-17 16:20:06 +0000 | [diff] [blame] | 1278 | goto too_big; |
| 1279 | } |
drh | ec722c1 | 2019-09-17 21:28:54 +0000 | [diff] [blame] | 1280 | pOp->opcode = OP_String; |
drh | 2f55511 | 2016-04-30 18:10:34 +0000 | [diff] [blame] | 1281 | assert( rc==SQLITE_OK ); |
drh | cbd2da9 | 2007-12-17 16:20:06 +0000 | [diff] [blame] | 1282 | /* Fall through to the next case, OP_String */ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 1283 | /* no break */ deliberate_fall_through |
danielk1977 | cbb18d2 | 2004-05-28 11:37:27 +0000 | [diff] [blame] | 1284 | } |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 1285 | |
drh | f07cf6e | 2015-03-06 16:45:16 +0000 | [diff] [blame] | 1286 | /* Opcode: String P1 P2 P3 P4 P5 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1287 | ** Synopsis: r[P2]='P4' (len=P1) |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 1288 | ** |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1289 | ** The string value P4 of length P1 (bytes) is stored in register P2. |
drh | f07cf6e | 2015-03-06 16:45:16 +0000 | [diff] [blame] | 1290 | ** |
drh | 44aebff | 2016-05-02 10:25:42 +0000 | [diff] [blame] | 1291 | ** If P3 is not zero and the content of register P3 is equal to P5, then |
drh | a9c18a9 | 2015-03-06 20:49:52 +0000 | [diff] [blame] | 1292 | ** the datatype of the register P2 is converted to BLOB. The content is |
| 1293 | ** the same sequence of bytes, it is merely interpreted as a BLOB instead |
drh | 44aebff | 2016-05-02 10:25:42 +0000 | [diff] [blame] | 1294 | ** of a string, as if it had been CAST. In other words: |
| 1295 | ** |
| 1296 | ** if( P3!=0 and reg[P3]==P5 ) reg[P2] := CAST(reg[P2] as BLOB) |
drh | f447950 | 2004-05-27 03:12:53 +0000 | [diff] [blame] | 1297 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1298 | case OP_String: { /* out2 */ |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 1299 | assert( pOp->p4.z!=0 ); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1300 | pOut = out2Prerelease(p, pOp); |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 1301 | pOut->flags = MEM_Str|MEM_Static|MEM_Term; |
| 1302 | pOut->z = pOp->p4.z; |
| 1303 | pOut->n = pOp->p1; |
| 1304 | pOut->enc = encoding; |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 1305 | UPDATE_MAX_BLOBSIZE(pOut); |
drh | 41d2e66 | 2015-12-01 21:23:07 +0000 | [diff] [blame] | 1306 | #ifndef SQLITE_LIKE_DOESNT_MATCH_BLOBS |
drh | 44aebff | 2016-05-02 10:25:42 +0000 | [diff] [blame] | 1307 | if( pOp->p3>0 ){ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 1308 | assert( pOp->p3<=(p->nMem+1 - p->nCursor) ); |
drh | f07cf6e | 2015-03-06 16:45:16 +0000 | [diff] [blame] | 1309 | pIn3 = &aMem[pOp->p3]; |
| 1310 | assert( pIn3->flags & MEM_Int ); |
drh | 44aebff | 2016-05-02 10:25:42 +0000 | [diff] [blame] | 1311 | if( pIn3->u.i==pOp->p5 ) pOut->flags = MEM_Blob|MEM_Static|MEM_Term; |
drh | f07cf6e | 2015-03-06 16:45:16 +0000 | [diff] [blame] | 1312 | } |
drh | 41d2e66 | 2015-12-01 21:23:07 +0000 | [diff] [blame] | 1313 | #endif |
danielk1977 | c572ef7 | 2004-05-27 09:28:41 +0000 | [diff] [blame] | 1314 | break; |
| 1315 | } |
| 1316 | |
drh | 2bd9f44 | 2022-04-17 20:30:52 +0000 | [diff] [blame] | 1317 | /* Opcode: BeginSubrtn * P2 * * * |
| 1318 | ** Synopsis: r[P2]=NULL |
| 1319 | ** |
| 1320 | ** Mark the beginning of a subroutine that can be entered in-line |
| 1321 | ** or that can be called using OP_Gosub. The subroutine should |
| 1322 | ** be terminated by an OP_Return instruction that has a P1 operand that |
| 1323 | ** is the same as the P2 operand to this opcode and that has P3 set to 1. |
| 1324 | ** If the subroutine is entered in-line, then the OP_Return will simply |
| 1325 | ** fall through. But if the subroutine is entered using OP_Gosub, then |
| 1326 | ** the OP_Return will jump back to the first instruction after the OP_Gosub. |
| 1327 | ** |
| 1328 | ** This routine works by loading a NULL into the P2 register. When the |
| 1329 | ** return address register contains a NULL, the OP_Return instruction is |
| 1330 | ** a no-op that simply falls through to the next instruction (assuming that |
| 1331 | ** the OP_Return opcode has a P3 value of 1). Thus if the subroutine is |
| 1332 | ** entered in-line, then the OP_Return will cause in-line execution to |
| 1333 | ** continue. But if the subroutine is entered via OP_Gosub, then the |
| 1334 | ** OP_Return will cause a return to the address following the OP_Gosub. |
| 1335 | ** |
| 1336 | ** This opcode is identical to OP_Null. It has a different name |
| 1337 | ** only to make the byte code easier to read and verify. |
| 1338 | */ |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 1339 | /* Opcode: Null P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1340 | ** Synopsis: r[P2..P3]=NULL |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 1341 | ** |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 1342 | ** Write a NULL into registers P2. If P3 greater than P2, then also write |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 1343 | ** NULL into register P3 and every register in between P2 and P3. If P3 |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 1344 | ** is less than P2 (typically P3 is zero) then only register P2 is |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 1345 | ** set to NULL. |
| 1346 | ** |
| 1347 | ** If the P1 value is non-zero, then also set the MEM_Cleared flag so that |
| 1348 | ** NULL values will not compare equal even if SQLITE_NULLEQ is set on |
| 1349 | ** OP_Ne or OP_Eq. |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 1350 | */ |
drh | 2bd9f44 | 2022-04-17 20:30:52 +0000 | [diff] [blame] | 1351 | case OP_BeginSubrtn: |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1352 | case OP_Null: { /* out2 */ |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 1353 | int cnt; |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 1354 | u16 nullFlag; |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1355 | pOut = out2Prerelease(p, pOp); |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 1356 | cnt = pOp->p3-pOp->p2; |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 1357 | assert( pOp->p3<=(p->nMem+1 - p->nCursor) ); |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 1358 | pOut->flags = nullFlag = pOp->p1 ? (MEM_Null|MEM_Cleared) : MEM_Null; |
drh | 2a1df93 | 2016-09-30 17:46:44 +0000 | [diff] [blame] | 1359 | pOut->n = 0; |
drh | 2c885d0 | 2018-07-07 19:36:04 +0000 | [diff] [blame] | 1360 | #ifdef SQLITE_DEBUG |
| 1361 | pOut->uTemp = 0; |
| 1362 | #endif |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 1363 | while( cnt>0 ){ |
| 1364 | pOut++; |
| 1365 | memAboutToChange(p, pOut); |
drh | 0725cab | 2014-09-17 14:52:46 +0000 | [diff] [blame] | 1366 | sqlite3VdbeMemSetNull(pOut); |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 1367 | pOut->flags = nullFlag; |
drh | 2a1df93 | 2016-09-30 17:46:44 +0000 | [diff] [blame] | 1368 | pOut->n = 0; |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 1369 | cnt--; |
| 1370 | } |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 1371 | break; |
| 1372 | } |
| 1373 | |
drh | 05a86c5 | 2014-02-16 01:55:49 +0000 | [diff] [blame] | 1374 | /* Opcode: SoftNull P1 * * * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1375 | ** Synopsis: r[P1]=NULL |
drh | 05a86c5 | 2014-02-16 01:55:49 +0000 | [diff] [blame] | 1376 | ** |
| 1377 | ** Set register P1 to have the value NULL as seen by the OP_MakeRecord |
| 1378 | ** instruction, but do not free any string or blob memory associated with |
| 1379 | ** the register, so that if the value was a string or blob that was |
| 1380 | ** previously copied using OP_SCopy, the copies will continue to be valid. |
| 1381 | */ |
| 1382 | case OP_SoftNull: { |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 1383 | assert( pOp->p1>0 && pOp->p1<=(p->nMem+1 - p->nCursor) ); |
drh | 05a86c5 | 2014-02-16 01:55:49 +0000 | [diff] [blame] | 1384 | pOut = &aMem[pOp->p1]; |
drh | e2bc655 | 2017-04-17 20:50:34 +0000 | [diff] [blame] | 1385 | pOut->flags = (pOut->flags&~(MEM_Undefined|MEM_AffMask))|MEM_Null; |
drh | 05a86c5 | 2014-02-16 01:55:49 +0000 | [diff] [blame] | 1386 | break; |
| 1387 | } |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 1388 | |
drh | a5750cf | 2014-02-07 13:20:31 +0000 | [diff] [blame] | 1389 | /* Opcode: Blob P1 P2 * P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1390 | ** Synopsis: r[P2]=P4 (len=P1) |
danielk1977 | c572ef7 | 2004-05-27 09:28:41 +0000 | [diff] [blame] | 1391 | ** |
drh | 9de221d | 2008-01-05 06:51:30 +0000 | [diff] [blame] | 1392 | ** P4 points to a blob of data P1 bytes long. Store this |
drh | 50fb7e0 | 2021-12-06 20:16:53 +0000 | [diff] [blame] | 1393 | ** blob in register P2. If P4 is a NULL pointer, then construct |
| 1394 | ** a zero-filled blob that is P1 bytes long in P2. |
danielk1977 | c572ef7 | 2004-05-27 09:28:41 +0000 | [diff] [blame] | 1395 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1396 | case OP_Blob: { /* out2 */ |
drh | cbd2da9 | 2007-12-17 16:20:06 +0000 | [diff] [blame] | 1397 | assert( pOp->p1 <= SQLITE_MAX_LENGTH ); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1398 | pOut = out2Prerelease(p, pOp); |
drh | 50fb7e0 | 2021-12-06 20:16:53 +0000 | [diff] [blame] | 1399 | if( pOp->p4.z==0 ){ |
| 1400 | sqlite3VdbeMemSetZeroBlob(pOut, pOp->p1); |
| 1401 | if( sqlite3VdbeMemExpandBlob(pOut) ) goto no_mem; |
| 1402 | }else{ |
| 1403 | sqlite3VdbeMemSetStr(pOut, pOp->p4.z, pOp->p1, 0, 0); |
| 1404 | } |
drh | 9de221d | 2008-01-05 06:51:30 +0000 | [diff] [blame] | 1405 | pOut->enc = encoding; |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 1406 | UPDATE_MAX_BLOBSIZE(pOut); |
danielk1977 | a37cdde | 2004-05-16 11:15:36 +0000 | [diff] [blame] | 1407 | break; |
| 1408 | } |
| 1409 | |
drh | eaf52d8 | 2010-05-12 13:50:23 +0000 | [diff] [blame] | 1410 | /* Opcode: Variable P1 P2 * P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1411 | ** Synopsis: r[P2]=parameter(P1,P4) |
drh | 5045789 | 2003-09-06 01:10:47 +0000 | [diff] [blame] | 1412 | ** |
drh | eaf52d8 | 2010-05-12 13:50:23 +0000 | [diff] [blame] | 1413 | ** Transfer the values of bound parameter P1 into register P2 |
drh | 08de149 | 2009-02-20 03:55:05 +0000 | [diff] [blame] | 1414 | ** |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 1415 | ** If the parameter is named, then its name appears in P4. |
drh | 08de149 | 2009-02-20 03:55:05 +0000 | [diff] [blame] | 1416 | ** The P4 value is used by sqlite3_bind_parameter_name(). |
drh | 5045789 | 2003-09-06 01:10:47 +0000 | [diff] [blame] | 1417 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 1418 | case OP_Variable: { /* out2 */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1419 | Mem *pVar; /* Value being transferred */ |
| 1420 | |
drh | eaf52d8 | 2010-05-12 13:50:23 +0000 | [diff] [blame] | 1421 | assert( pOp->p1>0 && pOp->p1<=p->nVar ); |
drh | 9bf755c | 2016-12-23 03:59:31 +0000 | [diff] [blame] | 1422 | assert( pOp->p4.z==0 || pOp->p4.z==sqlite3VListNumToName(p->pVList,pOp->p1) ); |
drh | eaf52d8 | 2010-05-12 13:50:23 +0000 | [diff] [blame] | 1423 | pVar = &p->aVar[pOp->p1 - 1]; |
| 1424 | if( sqlite3VdbeMemTooBig(pVar) ){ |
| 1425 | goto too_big; |
drh | 023ae03 | 2007-05-08 12:12:16 +0000 | [diff] [blame] | 1426 | } |
drh | 7441df7 | 2017-01-09 19:27:04 +0000 | [diff] [blame] | 1427 | pOut = &aMem[pOp->p2]; |
drh | e0f20b4 | 2019-04-01 20:57:11 +0000 | [diff] [blame] | 1428 | if( VdbeMemDynamic(pOut) ) sqlite3VdbeMemSetNull(pOut); |
| 1429 | memcpy(pOut, pVar, MEMCELLSIZE); |
| 1430 | pOut->flags &= ~(MEM_Dyn|MEM_Ephem); |
| 1431 | pOut->flags |= MEM_Static|MEM_FromBind; |
drh | eaf52d8 | 2010-05-12 13:50:23 +0000 | [diff] [blame] | 1432 | UPDATE_MAX_BLOBSIZE(pOut); |
danielk1977 | 93d4675 | 2004-05-23 13:30:58 +0000 | [diff] [blame] | 1433 | break; |
| 1434 | } |
danielk1977 | 295ba55 | 2004-05-19 10:34:51 +0000 | [diff] [blame] | 1435 | |
drh | b21e7c7 | 2008-06-22 12:37:57 +0000 | [diff] [blame] | 1436 | /* Opcode: Move P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1437 | ** Synopsis: r[P2@P3]=r[P1@P3] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1438 | ** |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 1439 | ** Move the P3 values in register P1..P1+P3-1 over into |
| 1440 | ** registers P2..P2+P3-1. Registers P1..P1+P3-1 are |
drh | b21e7c7 | 2008-06-22 12:37:57 +0000 | [diff] [blame] | 1441 | ** left holding a NULL. It is an error for register ranges |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 1442 | ** P1..P1+P3-1 and P2..P2+P3-1 to overlap. It is an error |
| 1443 | ** for P3 to be less than 1. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1444 | */ |
drh | e1349cb | 2008-04-01 00:36:10 +0000 | [diff] [blame] | 1445 | case OP_Move: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1446 | int n; /* Number of registers left to copy */ |
| 1447 | int p1; /* Register to copy from */ |
| 1448 | int p2; /* Register to copy to */ |
| 1449 | |
drh | e09f43f | 2013-11-21 04:18:31 +0000 | [diff] [blame] | 1450 | n = pOp->p3; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1451 | p1 = pOp->p1; |
| 1452 | p2 = pOp->p2; |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 1453 | assert( n>0 && p1>0 && p2>0 ); |
drh | b21e7c7 | 2008-06-22 12:37:57 +0000 | [diff] [blame] | 1454 | assert( p1+n<=p2 || p2+n<=p1 ); |
danielk1977 | 6ab3a2e | 2009-02-19 14:39:25 +0000 | [diff] [blame] | 1455 | |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 1456 | pIn1 = &aMem[p1]; |
| 1457 | pOut = &aMem[p2]; |
drh | e09f43f | 2013-11-21 04:18:31 +0000 | [diff] [blame] | 1458 | do{ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 1459 | assert( pOut<=&aMem[(p->nMem+1 - p->nCursor)] ); |
| 1460 | assert( pIn1<=&aMem[(p->nMem+1 - p->nCursor)] ); |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 1461 | assert( memIsValid(pIn1) ); |
| 1462 | memAboutToChange(p, pOut); |
drh | 17bcb10 | 2014-09-18 21:25:33 +0000 | [diff] [blame] | 1463 | sqlite3VdbeMemMove(pOut, pIn1); |
drh | 52043d7 | 2011-08-03 16:40:15 +0000 | [diff] [blame] | 1464 | #ifdef SQLITE_DEBUG |
drh | 4cbd847 | 2020-01-02 15:02:08 +0000 | [diff] [blame] | 1465 | pIn1->pScopyFrom = 0; |
| 1466 | { int i; |
| 1467 | for(i=1; i<p->nMem; i++){ |
| 1468 | if( aMem[i].pScopyFrom==pIn1 ){ |
| 1469 | aMem[i].pScopyFrom = pOut; |
| 1470 | } |
| 1471 | } |
drh | 52043d7 | 2011-08-03 16:40:15 +0000 | [diff] [blame] | 1472 | } |
| 1473 | #endif |
drh | bd6789e | 2015-04-28 14:00:02 +0000 | [diff] [blame] | 1474 | Deephemeralize(pOut); |
drh | b21e7c7 | 2008-06-22 12:37:57 +0000 | [diff] [blame] | 1475 | REGISTER_TRACE(p2++, pOut); |
| 1476 | pIn1++; |
| 1477 | pOut++; |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 1478 | }while( --n ); |
drh | e1349cb | 2008-04-01 00:36:10 +0000 | [diff] [blame] | 1479 | break; |
| 1480 | } |
| 1481 | |
drh | e5dea28 | 2022-06-09 17:17:14 +0000 | [diff] [blame] | 1482 | /* Opcode: Copy P1 P2 P3 * P5 |
drh | 4eded60 | 2013-12-20 15:59:20 +0000 | [diff] [blame] | 1483 | ** Synopsis: r[P2@P3+1]=r[P1@P3+1] |
drh | b1fdb2a | 2008-01-05 04:06:03 +0000 | [diff] [blame] | 1484 | ** |
drh | e8e4af7 | 2012-09-21 00:04:28 +0000 | [diff] [blame] | 1485 | ** Make a copy of registers P1..P1+P3 into registers P2..P2+P3. |
drh | b1fdb2a | 2008-01-05 04:06:03 +0000 | [diff] [blame] | 1486 | ** |
drh | e5dea28 | 2022-06-09 17:17:14 +0000 | [diff] [blame] | 1487 | ** If the 0x0002 bit of P5 is set then also clear the MEM_Subtype flag in the |
| 1488 | ** destination. The 0x0001 bit of P5 indicates that this Copy opcode cannot |
| 1489 | ** be merged. The 0x0001 bit is used by the query planner and does not |
| 1490 | ** come into play during query execution. |
| 1491 | ** |
drh | b1fdb2a | 2008-01-05 04:06:03 +0000 | [diff] [blame] | 1492 | ** This instruction makes a deep copy of the value. A duplicate |
| 1493 | ** is made of any string or blob constant. See also OP_SCopy. |
| 1494 | */ |
drh | e8e4af7 | 2012-09-21 00:04:28 +0000 | [diff] [blame] | 1495 | case OP_Copy: { |
| 1496 | int n; |
| 1497 | |
| 1498 | n = pOp->p3; |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1499 | pIn1 = &aMem[pOp->p1]; |
| 1500 | pOut = &aMem[pOp->p2]; |
drh | e1349cb | 2008-04-01 00:36:10 +0000 | [diff] [blame] | 1501 | assert( pOut!=pIn1 ); |
drh | e8e4af7 | 2012-09-21 00:04:28 +0000 | [diff] [blame] | 1502 | while( 1 ){ |
drh | 58773a5 | 2018-06-12 13:52:23 +0000 | [diff] [blame] | 1503 | memAboutToChange(p, pOut); |
drh | e8e4af7 | 2012-09-21 00:04:28 +0000 | [diff] [blame] | 1504 | sqlite3VdbeMemShallowCopy(pOut, pIn1, MEM_Ephem); |
| 1505 | Deephemeralize(pOut); |
drh | e5dea28 | 2022-06-09 17:17:14 +0000 | [diff] [blame] | 1506 | if( (pOut->flags & MEM_Subtype)!=0 && (pOp->p5 & 0x0002)!=0 ){ |
| 1507 | pOut->flags &= ~MEM_Subtype; |
| 1508 | } |
drh | 953f761 | 2012-12-07 22:18:54 +0000 | [diff] [blame] | 1509 | #ifdef SQLITE_DEBUG |
| 1510 | pOut->pScopyFrom = 0; |
| 1511 | #endif |
drh | e8e4af7 | 2012-09-21 00:04:28 +0000 | [diff] [blame] | 1512 | REGISTER_TRACE(pOp->p2+pOp->p3-n, pOut); |
| 1513 | if( (n--)==0 ) break; |
| 1514 | pOut++; |
| 1515 | pIn1++; |
| 1516 | } |
drh | e1349cb | 2008-04-01 00:36:10 +0000 | [diff] [blame] | 1517 | break; |
| 1518 | } |
| 1519 | |
drh | b1fdb2a | 2008-01-05 04:06:03 +0000 | [diff] [blame] | 1520 | /* Opcode: SCopy P1 P2 * * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1521 | ** Synopsis: r[P2]=r[P1] |
drh | b1fdb2a | 2008-01-05 04:06:03 +0000 | [diff] [blame] | 1522 | ** |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1523 | ** Make a shallow copy of register P1 into register P2. |
drh | b1fdb2a | 2008-01-05 04:06:03 +0000 | [diff] [blame] | 1524 | ** |
| 1525 | ** This instruction makes a shallow copy of the value. If the value |
| 1526 | ** is a string or blob, then the copy is only a pointer to the |
| 1527 | ** original and hence if the original changes so will the copy. |
| 1528 | ** Worse, if the original is deallocated, the copy becomes invalid. |
| 1529 | ** Thus the program must guarantee that the original will not change |
| 1530 | ** during the lifetime of the copy. Use OP_Copy to make a complete |
| 1531 | ** copy. |
| 1532 | */ |
drh | 26198bb | 2013-10-31 11:15:09 +0000 | [diff] [blame] | 1533 | case OP_SCopy: { /* out2 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1534 | pIn1 = &aMem[pOp->p1]; |
| 1535 | pOut = &aMem[pOp->p2]; |
drh | 2d401ab | 2008-01-10 23:50:11 +0000 | [diff] [blame] | 1536 | assert( pOut!=pIn1 ); |
drh | e1349cb | 2008-04-01 00:36:10 +0000 | [diff] [blame] | 1537 | sqlite3VdbeMemShallowCopy(pOut, pIn1, MEM_Ephem); |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 1538 | #ifdef SQLITE_DEBUG |
drh | 58773a5 | 2018-06-12 13:52:23 +0000 | [diff] [blame] | 1539 | pOut->pScopyFrom = pIn1; |
| 1540 | pOut->mScopyFlags = pIn1->flags; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 1541 | #endif |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1542 | break; |
| 1543 | } |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 1544 | |
drh | fed7ac6 | 2015-10-15 18:04:59 +0000 | [diff] [blame] | 1545 | /* Opcode: IntCopy P1 P2 * * * |
| 1546 | ** Synopsis: r[P2]=r[P1] |
| 1547 | ** |
| 1548 | ** Transfer the integer value held in register P1 into register P2. |
| 1549 | ** |
| 1550 | ** This is an optimized version of SCopy that works only for integer |
| 1551 | ** values. |
| 1552 | */ |
| 1553 | case OP_IntCopy: { /* out2 */ |
| 1554 | pIn1 = &aMem[pOp->p1]; |
| 1555 | assert( (pIn1->flags & MEM_Int)!=0 ); |
| 1556 | pOut = &aMem[pOp->p2]; |
| 1557 | sqlite3VdbeMemSetInt64(pOut, pIn1->u.i); |
| 1558 | break; |
| 1559 | } |
| 1560 | |
drh | 3b26b2b | 2021-12-01 19:17:14 +0000 | [diff] [blame] | 1561 | /* Opcode: FkCheck * * * * * |
drh | 18e5607 | 2021-01-31 15:50:36 +0000 | [diff] [blame] | 1562 | ** |
drh | 3b26b2b | 2021-12-01 19:17:14 +0000 | [diff] [blame] | 1563 | ** Halt with an SQLITE_CONSTRAINT error if there are any unresolved |
| 1564 | ** foreign key constraint violations. If there are no foreign key |
| 1565 | ** constraint violations, this is a no-op. |
drh | 18e5607 | 2021-01-31 15:50:36 +0000 | [diff] [blame] | 1566 | ** |
drh | 3b26b2b | 2021-12-01 19:17:14 +0000 | [diff] [blame] | 1567 | ** FK constraint violations are also checked when the prepared statement |
| 1568 | ** exits. This opcode is used to raise foreign key constraint errors prior |
| 1569 | ** to returning results such as a row change count or the result of a |
| 1570 | ** RETURNING clause. |
drh | 18e5607 | 2021-01-31 15:50:36 +0000 | [diff] [blame] | 1571 | */ |
drh | 3b26b2b | 2021-12-01 19:17:14 +0000 | [diff] [blame] | 1572 | case OP_FkCheck: { |
drh | 18e5607 | 2021-01-31 15:50:36 +0000 | [diff] [blame] | 1573 | if( (rc = sqlite3VdbeCheckFk(p,0))!=SQLITE_OK ){ |
| 1574 | goto abort_due_to_error; |
| 1575 | } |
drh | 3b26b2b | 2021-12-01 19:17:14 +0000 | [diff] [blame] | 1576 | break; |
drh | 18e5607 | 2021-01-31 15:50:36 +0000 | [diff] [blame] | 1577 | } |
| 1578 | |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1579 | /* Opcode: ResultRow P1 P2 * * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1580 | ** Synopsis: output=r[P1@P2] |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1581 | ** |
shane | 21e7feb | 2008-05-30 15:59:49 +0000 | [diff] [blame] | 1582 | ** The registers P1 through P1+P2-1 contain a single row of |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1583 | ** results. This opcode causes the sqlite3_step() call to terminate |
| 1584 | ** with an SQLITE_ROW return code and it sets up the sqlite3_stmt |
drh | 4d87aae | 2014-02-20 19:42:00 +0000 | [diff] [blame] | 1585 | ** structure to provide access to the r(P1)..r(P1+P2-1) values as |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 1586 | ** the result row. |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1587 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1588 | case OP_ResultRow: { |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1589 | assert( p->nResColumn==pOp->p2 ); |
drh | 9ce612a | 2021-04-05 22:30:56 +0000 | [diff] [blame] | 1590 | assert( pOp->p1>0 || CORRUPT_DB ); |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 1591 | assert( pOp->p1+pOp->p2<=(p->nMem+1 - p->nCursor)+1 ); |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1592 | |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1593 | p->cacheCtr = (p->cacheCtr + 2)|1; |
drh | edc2713 | 2022-12-22 18:44:39 +0000 | [diff] [blame] | 1594 | p->pResultRow = &aMem[pOp->p1]; |
drh | 02ff747 | 2019-12-31 12:18:24 +0000 | [diff] [blame] | 1595 | #ifdef SQLITE_DEBUG |
drh | 3b8b5be | 2022-04-01 20:19:36 +0000 | [diff] [blame] | 1596 | { |
drh | edc2713 | 2022-12-22 18:44:39 +0000 | [diff] [blame] | 1597 | Mem *pMem = p->pResultRow; |
drh | 3b8b5be | 2022-04-01 20:19:36 +0000 | [diff] [blame] | 1598 | int i; |
| 1599 | for(i=0; i<pOp->p2; i++){ |
| 1600 | assert( memIsValid(&pMem[i]) ); |
| 1601 | REGISTER_TRACE(pOp->p1+i, &pMem[i]); |
| 1602 | /* The registers in the result will not be used again when the |
| 1603 | ** prepared statement restarts. This is because sqlite3_column() |
| 1604 | ** APIs might have caused type conversions of made other changes to |
| 1605 | ** the register values. Therefore, we can go ahead and break any |
| 1606 | ** OP_SCopy dependencies. */ |
| 1607 | pMem[i].pScopyFrom = 0; |
| 1608 | } |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1609 | } |
drh | 3b8b5be | 2022-04-01 20:19:36 +0000 | [diff] [blame] | 1610 | #endif |
drh | 2803969 | 2008-03-17 16:54:01 +0000 | [diff] [blame] | 1611 | if( db->mallocFailed ) goto no_mem; |
drh | 3d2a529 | 2016-07-13 22:55:01 +0000 | [diff] [blame] | 1612 | if( db->mTrace & SQLITE_TRACE_ROW ){ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 1613 | db->trace.xV2(SQLITE_TRACE_ROW, db->pTraceArg, p, 0); |
drh | 3d2a529 | 2016-07-13 22:55:01 +0000 | [diff] [blame] | 1614 | } |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1615 | p->pc = (int)(pOp - aOp) + 1; |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 1616 | rc = SQLITE_ROW; |
| 1617 | goto vdbe_return; |
| 1618 | } |
| 1619 | |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1620 | /* Opcode: Concat P1 P2 P3 * * |
drh | 313619f | 2013-10-31 20:34:06 +0000 | [diff] [blame] | 1621 | ** Synopsis: r[P3]=r[P2]+r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1622 | ** |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1623 | ** Add the text in register P1 onto the end of the text in |
| 1624 | ** register P2 and store the result in register P3. |
| 1625 | ** If either the P1 or P2 text are NULL then store NULL in P3. |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1626 | ** |
| 1627 | ** P3 = P2 || P1 |
| 1628 | ** |
| 1629 | ** It is illegal for P1 and P3 to be the same register. Sometimes, |
| 1630 | ** if P3 is the same register as P2, the implementation is able |
| 1631 | ** to avoid a memcpy(). |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1632 | */ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1633 | case OP_Concat: { /* same as TK_CONCAT, in1, in2, out3 */ |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1634 | i64 nByte; /* Total size of the output string or blob */ |
| 1635 | u16 flags1; /* Initial flags for P1 */ |
| 1636 | u16 flags2; /* Initial flags for P2 */ |
danielk1977 | 8a6b541 | 2004-05-24 07:04:25 +0000 | [diff] [blame] | 1637 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1638 | pIn1 = &aMem[pOp->p1]; |
| 1639 | pIn2 = &aMem[pOp->p2]; |
| 1640 | pOut = &aMem[pOp->p3]; |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1641 | testcase( pOut==pIn2 ); |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1642 | assert( pIn1!=pOut ); |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1643 | flags1 = pIn1->flags; |
| 1644 | testcase( flags1 & MEM_Null ); |
| 1645 | testcase( pIn2->flags & MEM_Null ); |
| 1646 | if( (flags1 | pIn2->flags) & MEM_Null ){ |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1647 | sqlite3VdbeMemSetNull(pOut); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1648 | break; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1649 | } |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1650 | if( (flags1 & (MEM_Str|MEM_Blob))==0 ){ |
| 1651 | if( sqlite3VdbeMemStringify(pIn1,encoding,0) ) goto no_mem; |
drh | 01325a3 | 2019-05-02 00:52:50 +0000 | [diff] [blame] | 1652 | flags1 = pIn1->flags & ~MEM_Str; |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1653 | }else if( (flags1 & MEM_Zero)!=0 ){ |
| 1654 | if( sqlite3VdbeMemExpandBlob(pIn1) ) goto no_mem; |
drh | 01325a3 | 2019-05-02 00:52:50 +0000 | [diff] [blame] | 1655 | flags1 = pIn1->flags & ~MEM_Str; |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1656 | } |
| 1657 | flags2 = pIn2->flags; |
| 1658 | if( (flags2 & (MEM_Str|MEM_Blob))==0 ){ |
| 1659 | if( sqlite3VdbeMemStringify(pIn2,encoding,0) ) goto no_mem; |
drh | 01325a3 | 2019-05-02 00:52:50 +0000 | [diff] [blame] | 1660 | flags2 = pIn2->flags & ~MEM_Str; |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1661 | }else if( (flags2 & MEM_Zero)!=0 ){ |
| 1662 | if( sqlite3VdbeMemExpandBlob(pIn2) ) goto no_mem; |
drh | 01325a3 | 2019-05-02 00:52:50 +0000 | [diff] [blame] | 1663 | flags2 = pIn2->flags & ~MEM_Str; |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1664 | } |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1665 | nByte = pIn1->n + pIn2->n; |
drh | bb4957f | 2008-03-20 14:03:29 +0000 | [diff] [blame] | 1666 | if( nByte>db->aLimit[SQLITE_LIMIT_LENGTH] ){ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1667 | goto too_big; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1668 | } |
drh | 01156ec | 2022-06-17 21:31:30 +0000 | [diff] [blame] | 1669 | if( sqlite3VdbeMemGrow(pOut, (int)nByte+2, pOut==pIn2) ){ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1670 | goto no_mem; |
| 1671 | } |
drh | c91b2fd | 2014-03-01 18:13:23 +0000 | [diff] [blame] | 1672 | MemSetTypeFlag(pOut, MEM_Str); |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1673 | if( pOut!=pIn2 ){ |
| 1674 | memcpy(pOut->z, pIn2->z, pIn2->n); |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1675 | assert( (pIn2->flags & MEM_Dyn) == (flags2 & MEM_Dyn) ); |
| 1676 | pIn2->flags = flags2; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1677 | } |
| 1678 | memcpy(&pOut->z[pIn2->n], pIn1->z, pIn1->n); |
drh | 8a7e11f | 2019-05-01 15:32:40 +0000 | [diff] [blame] | 1679 | assert( (pIn1->flags & MEM_Dyn) == (flags1 & MEM_Dyn) ); |
| 1680 | pIn1->flags = flags1; |
drh | 01156ec | 2022-06-17 21:31:30 +0000 | [diff] [blame] | 1681 | if( encoding>SQLITE_UTF8 ) nByte &= ~1; |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 1682 | pOut->z[nByte]=0; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1683 | pOut->z[nByte+1] = 0; |
| 1684 | pOut->flags |= MEM_Term; |
drh | 9c1905f | 2008-12-10 22:32:56 +0000 | [diff] [blame] | 1685 | pOut->n = (int)nByte; |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1686 | pOut->enc = encoding; |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 1687 | UPDATE_MAX_BLOBSIZE(pOut); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1688 | break; |
| 1689 | } |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 1690 | |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 1691 | /* Opcode: Add P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1692 | ** Synopsis: r[P3]=r[P1]+r[P2] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1693 | ** |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1694 | ** Add the value in register P1 to the value in register P2 |
shane | 21e7feb | 2008-05-30 15:59:49 +0000 | [diff] [blame] | 1695 | ** and store the result in register P3. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1696 | ** If either input is NULL, the result is NULL. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1697 | */ |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 1698 | /* Opcode: Multiply P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1699 | ** Synopsis: r[P3]=r[P1]*r[P2] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1700 | ** |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 1701 | ** |
shane | 21e7feb | 2008-05-30 15:59:49 +0000 | [diff] [blame] | 1702 | ** Multiply the value in register P1 by the value in register P2 |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1703 | ** and store the result in register P3. |
| 1704 | ** If either input is NULL, the result is NULL. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1705 | */ |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 1706 | /* Opcode: Subtract P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1707 | ** Synopsis: r[P3]=r[P2]-r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1708 | ** |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1709 | ** Subtract the value in register P1 from the value in register P2 |
| 1710 | ** and store the result in register P3. |
| 1711 | ** If either input is NULL, the result is NULL. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1712 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1713 | /* Opcode: Divide P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1714 | ** Synopsis: r[P3]=r[P2]/r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1715 | ** |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1716 | ** Divide the value in register P1 by the value in register P2 |
dan | e275dc3 | 2009-08-18 16:24:58 +0000 | [diff] [blame] | 1717 | ** and store the result in register P3 (P3=P2/P1). If the value in |
| 1718 | ** register P1 is zero, then the result is NULL. If either input is |
| 1719 | ** NULL, the result is NULL. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1720 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1721 | /* Opcode: Remainder P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1722 | ** Synopsis: r[P3]=r[P2]%r[P1] |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1723 | ** |
drh | 40864a1 | 2013-11-15 18:58:37 +0000 | [diff] [blame] | 1724 | ** Compute the remainder after integer register P2 is divided by |
| 1725 | ** register P1 and store the result in register P3. |
| 1726 | ** If the value in register P1 is zero the result is NULL. |
drh | f5905aa | 2002-05-26 20:54:33 +0000 | [diff] [blame] | 1727 | ** If either operand is NULL, the result is NULL. |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1728 | */ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1729 | case OP_Add: /* same as TK_PLUS, in1, in2, out3 */ |
| 1730 | case OP_Subtract: /* same as TK_MINUS, in1, in2, out3 */ |
| 1731 | case OP_Multiply: /* same as TK_STAR, in1, in2, out3 */ |
| 1732 | case OP_Divide: /* same as TK_SLASH, in1, in2, out3 */ |
| 1733 | case OP_Remainder: { /* same as TK_REM, in1, in2, out3 */ |
drh | 3d1d90a | 2014-03-24 15:00:15 +0000 | [diff] [blame] | 1734 | u16 type1; /* Numeric type of left operand */ |
| 1735 | u16 type2; /* Numeric type of right operand */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1736 | i64 iA; /* Integer value of left operand */ |
| 1737 | i64 iB; /* Integer value of right operand */ |
| 1738 | double rA; /* Real value of left operand */ |
| 1739 | double rB; /* Real value of right operand */ |
| 1740 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1741 | pIn1 = &aMem[pOp->p1]; |
drh | 3cf46ee | 2022-08-03 19:53:54 +0000 | [diff] [blame] | 1742 | type1 = pIn1->flags; |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1743 | pIn2 = &aMem[pOp->p2]; |
drh | 3cf46ee | 2022-08-03 19:53:54 +0000 | [diff] [blame] | 1744 | type2 = pIn2->flags; |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1745 | pOut = &aMem[pOp->p3]; |
drh | 3d1d90a | 2014-03-24 15:00:15 +0000 | [diff] [blame] | 1746 | if( (type1 & type2 & MEM_Int)!=0 ){ |
drh | 3cf46ee | 2022-08-03 19:53:54 +0000 | [diff] [blame] | 1747 | int_math: |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1748 | iA = pIn1->u.i; |
| 1749 | iB = pIn2->u.i; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1750 | switch( pOp->opcode ){ |
drh | 158b9cb | 2011-03-05 20:59:46 +0000 | [diff] [blame] | 1751 | case OP_Add: if( sqlite3AddInt64(&iB,iA) ) goto fp_math; break; |
| 1752 | case OP_Subtract: if( sqlite3SubInt64(&iB,iA) ) goto fp_math; break; |
| 1753 | case OP_Multiply: if( sqlite3MulInt64(&iB,iA) ) goto fp_math; break; |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1754 | case OP_Divide: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1755 | if( iA==0 ) goto arithmetic_result_is_null; |
drh | 158b9cb | 2011-03-05 20:59:46 +0000 | [diff] [blame] | 1756 | if( iA==-1 && iB==SMALLEST_INT64 ) goto fp_math; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1757 | iB /= iA; |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 1758 | break; |
| 1759 | } |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1760 | default: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1761 | if( iA==0 ) goto arithmetic_result_is_null; |
| 1762 | if( iA==-1 ) iA = 1; |
| 1763 | iB %= iA; |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1764 | break; |
| 1765 | } |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 1766 | } |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1767 | pOut->u.i = iB; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1768 | MemSetTypeFlag(pOut, MEM_Int); |
drh | 3cf46ee | 2022-08-03 19:53:54 +0000 | [diff] [blame] | 1769 | }else if( ((type1 | type2) & MEM_Null)!=0 ){ |
drh | cfcca02 | 2017-04-17 23:23:17 +0000 | [diff] [blame] | 1770 | goto arithmetic_result_is_null; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1771 | }else{ |
drh | 3cf46ee | 2022-08-03 19:53:54 +0000 | [diff] [blame] | 1772 | type1 = numericType(pIn1); |
| 1773 | type2 = numericType(pIn2); |
| 1774 | if( (type1 & type2 & MEM_Int)!=0 ) goto int_math; |
drh | 158b9cb | 2011-03-05 20:59:46 +0000 | [diff] [blame] | 1775 | fp_math: |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1776 | rA = sqlite3VdbeRealValue(pIn1); |
| 1777 | rB = sqlite3VdbeRealValue(pIn2); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1778 | switch( pOp->opcode ){ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1779 | case OP_Add: rB += rA; break; |
| 1780 | case OP_Subtract: rB -= rA; break; |
| 1781 | case OP_Multiply: rB *= rA; break; |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1782 | case OP_Divide: { |
shane | fbd60f8 | 2009-02-04 03:59:25 +0000 | [diff] [blame] | 1783 | /* (double)0 In case of SQLITE_OMIT_FLOATING_POINT... */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1784 | if( rA==(double)0 ) goto arithmetic_result_is_null; |
| 1785 | rB /= rA; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1786 | break; |
| 1787 | } |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1788 | default: { |
drh | e3b89d2 | 2019-01-18 17:53:50 +0000 | [diff] [blame] | 1789 | iA = sqlite3VdbeIntValue(pIn1); |
| 1790 | iB = sqlite3VdbeIntValue(pIn2); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1791 | if( iA==0 ) goto arithmetic_result_is_null; |
| 1792 | if( iA==-1 ) iA = 1; |
| 1793 | rB = (double)(iB % iA); |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1794 | break; |
| 1795 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1796 | } |
drh | c5a7b51 | 2010-01-13 16:25:42 +0000 | [diff] [blame] | 1797 | #ifdef SQLITE_OMIT_FLOATING_POINT |
| 1798 | pOut->u.i = rB; |
| 1799 | MemSetTypeFlag(pOut, MEM_Int); |
| 1800 | #else |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 1801 | if( sqlite3IsNaN(rB) ){ |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 1802 | goto arithmetic_result_is_null; |
drh | 53c1402 | 2007-05-10 17:23:11 +0000 | [diff] [blame] | 1803 | } |
drh | 74eaba4 | 2014-09-18 17:52:15 +0000 | [diff] [blame] | 1804 | pOut->u.r = rB; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1805 | MemSetTypeFlag(pOut, MEM_Real); |
drh | c5a7b51 | 2010-01-13 16:25:42 +0000 | [diff] [blame] | 1806 | #endif |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1807 | } |
| 1808 | break; |
| 1809 | |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 1810 | arithmetic_result_is_null: |
| 1811 | sqlite3VdbeMemSetNull(pOut); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1812 | break; |
| 1813 | } |
| 1814 | |
drh | 7a95789 | 2012-02-02 17:35:43 +0000 | [diff] [blame] | 1815 | /* Opcode: CollSeq P1 * * P4 |
danielk1977 | dc1bdc4 | 2004-06-11 10:51:27 +0000 | [diff] [blame] | 1816 | ** |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 1817 | ** P4 is a pointer to a CollSeq object. If the next call to a user function |
danielk1977 | dc1bdc4 | 2004-06-11 10:51:27 +0000 | [diff] [blame] | 1818 | ** or aggregate calls sqlite3GetFuncCollSeq(), this collation sequence will |
| 1819 | ** be returned. This is used by the built-in min(), max() and nullif() |
drh | e6f85e7 | 2004-12-25 01:03:13 +0000 | [diff] [blame] | 1820 | ** functions. |
danielk1977 | dc1bdc4 | 2004-06-11 10:51:27 +0000 | [diff] [blame] | 1821 | ** |
drh | 7a95789 | 2012-02-02 17:35:43 +0000 | [diff] [blame] | 1822 | ** If P1 is not zero, then it is a register that a subsequent min() or |
| 1823 | ** max() aggregate will set to 1 if the current row is not the minimum or |
| 1824 | ** maximum. The P1 register is initialized to 0 by this instruction. |
| 1825 | ** |
danielk1977 | dc1bdc4 | 2004-06-11 10:51:27 +0000 | [diff] [blame] | 1826 | ** The interface used by the implementation of the aforementioned functions |
| 1827 | ** to retrieve the collation sequence set by this opcode is not available |
drh | 0a0d056 | 2015-03-12 05:08:34 +0000 | [diff] [blame] | 1828 | ** publicly. Only built-in functions have access to this feature. |
danielk1977 | dc1bdc4 | 2004-06-11 10:51:27 +0000 | [diff] [blame] | 1829 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1830 | case OP_CollSeq: { |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 1831 | assert( pOp->p4type==P4_COLLSEQ ); |
drh | 7a95789 | 2012-02-02 17:35:43 +0000 | [diff] [blame] | 1832 | if( pOp->p1 ){ |
| 1833 | sqlite3VdbeMemSetInt64(&aMem[pOp->p1], 0); |
| 1834 | } |
danielk1977 | dc1bdc4 | 2004-06-11 10:51:27 +0000 | [diff] [blame] | 1835 | break; |
| 1836 | } |
| 1837 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1838 | /* Opcode: BitAnd P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1839 | ** Synopsis: r[P3]=r[P1]&r[P2] |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1840 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1841 | ** Take the bit-wise AND of the values in register P1 and P2 and |
| 1842 | ** store the result in register P3. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1843 | ** If either input is NULL, the result is NULL. |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1844 | */ |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1845 | /* Opcode: BitOr P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1846 | ** Synopsis: r[P3]=r[P1]|r[P2] |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1847 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1848 | ** Take the bit-wise OR of the values in register P1 and P2 and |
| 1849 | ** store the result in register P3. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1850 | ** If either input is NULL, the result is NULL. |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1851 | */ |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1852 | /* Opcode: ShiftLeft P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1853 | ** Synopsis: r[P3]=r[P2]<<r[P1] |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1854 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1855 | ** Shift the integer value in register P2 to the left by the |
drh | 710c484 | 2010-08-30 01:17:20 +0000 | [diff] [blame] | 1856 | ** number of bits specified by the integer in register P1. |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1857 | ** Store the result in register P3. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1858 | ** If either input is NULL, the result is NULL. |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1859 | */ |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1860 | /* Opcode: ShiftRight P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1861 | ** Synopsis: r[P3]=r[P2]>>r[P1] |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1862 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1863 | ** Shift the integer value in register P2 to the right by the |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1864 | ** number of bits specified by the integer in register P1. |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 1865 | ** Store the result in register P3. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 1866 | ** If either input is NULL, the result is NULL. |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1867 | */ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1868 | case OP_BitAnd: /* same as TK_BITAND, in1, in2, out3 */ |
| 1869 | case OP_BitOr: /* same as TK_BITOR, in1, in2, out3 */ |
| 1870 | case OP_ShiftLeft: /* same as TK_LSHIFT, in1, in2, out3 */ |
| 1871 | case OP_ShiftRight: { /* same as TK_RSHIFT, in1, in2, out3 */ |
drh | 158b9cb | 2011-03-05 20:59:46 +0000 | [diff] [blame] | 1872 | i64 iA; |
| 1873 | u64 uA; |
| 1874 | i64 iB; |
| 1875 | u8 op; |
drh | 6810ce6 | 2004-01-31 19:22:56 +0000 | [diff] [blame] | 1876 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1877 | pIn1 = &aMem[pOp->p1]; |
| 1878 | pIn2 = &aMem[pOp->p2]; |
| 1879 | pOut = &aMem[pOp->p3]; |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 1880 | if( (pIn1->flags | pIn2->flags) & MEM_Null ){ |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 1881 | sqlite3VdbeMemSetNull(pOut); |
drh | f5905aa | 2002-05-26 20:54:33 +0000 | [diff] [blame] | 1882 | break; |
| 1883 | } |
drh | 158b9cb | 2011-03-05 20:59:46 +0000 | [diff] [blame] | 1884 | iA = sqlite3VdbeIntValue(pIn2); |
| 1885 | iB = sqlite3VdbeIntValue(pIn1); |
| 1886 | op = pOp->opcode; |
| 1887 | if( op==OP_BitAnd ){ |
| 1888 | iA &= iB; |
| 1889 | }else if( op==OP_BitOr ){ |
| 1890 | iA |= iB; |
| 1891 | }else if( iB!=0 ){ |
| 1892 | assert( op==OP_ShiftRight || op==OP_ShiftLeft ); |
| 1893 | |
| 1894 | /* If shifting by a negative amount, shift in the other direction */ |
| 1895 | if( iB<0 ){ |
| 1896 | assert( OP_ShiftRight==OP_ShiftLeft+1 ); |
| 1897 | op = 2*OP_ShiftLeft + 1 - op; |
| 1898 | iB = iB>(-64) ? -iB : 64; |
| 1899 | } |
| 1900 | |
| 1901 | if( iB>=64 ){ |
| 1902 | iA = (iA>=0 || op==OP_ShiftLeft) ? 0 : -1; |
| 1903 | }else{ |
| 1904 | memcpy(&uA, &iA, sizeof(uA)); |
| 1905 | if( op==OP_ShiftLeft ){ |
| 1906 | uA <<= iB; |
| 1907 | }else{ |
| 1908 | uA >>= iB; |
| 1909 | /* Sign-extend on a right shift of a negative number */ |
| 1910 | if( iA<0 ) uA |= ((((u64)0xffffffff)<<32)|0xffffffff) << (64-iB); |
| 1911 | } |
| 1912 | memcpy(&iA, &uA, sizeof(iA)); |
| 1913 | } |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1914 | } |
drh | 158b9cb | 2011-03-05 20:59:46 +0000 | [diff] [blame] | 1915 | pOut->u.i = iA; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 1916 | MemSetTypeFlag(pOut, MEM_Int); |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 1917 | break; |
| 1918 | } |
| 1919 | |
drh | 8558cde | 2008-01-05 05:20:10 +0000 | [diff] [blame] | 1920 | /* Opcode: AddImm P1 P2 * * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 1921 | ** Synopsis: r[P1]=r[P1]+P2 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1922 | ** |
danielk1977 | 0cdc022 | 2008-06-26 18:04:03 +0000 | [diff] [blame] | 1923 | ** Add the constant P2 to the value in register P1. |
drh | 8558cde | 2008-01-05 05:20:10 +0000 | [diff] [blame] | 1924 | ** The result is always an integer. |
drh | 4a32431 | 2001-12-21 14:30:42 +0000 | [diff] [blame] | 1925 | ** |
drh | 8558cde | 2008-01-05 05:20:10 +0000 | [diff] [blame] | 1926 | ** To force any register to be an integer, just add 0. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1927 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1928 | case OP_AddImm: { /* in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1929 | pIn1 = &aMem[pOp->p1]; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 1930 | memAboutToChange(p, pIn1); |
drh | 8558cde | 2008-01-05 05:20:10 +0000 | [diff] [blame] | 1931 | sqlite3VdbeMemIntegerify(pIn1); |
| 1932 | pIn1->u.i += pOp->p2; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 1933 | break; |
| 1934 | } |
| 1935 | |
dan | e5166e0 | 2019-03-19 11:56:39 +0000 | [diff] [blame] | 1936 | /* Opcode: MustBeInt P1 P2 * * * |
drh | 8aff101 | 2001-12-22 14:49:24 +0000 | [diff] [blame] | 1937 | ** |
dan | e5166e0 | 2019-03-19 11:56:39 +0000 | [diff] [blame] | 1938 | ** Force the value in register P1 to be an integer. If the value |
| 1939 | ** in P1 is not an integer and cannot be converted into an integer |
| 1940 | ** without data loss, then jump immediately to P2, or if P2==0 |
drh | 8aff101 | 2001-12-22 14:49:24 +0000 | [diff] [blame] | 1941 | ** raise an SQLITE_MISMATCH exception. |
| 1942 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1943 | case OP_MustBeInt: { /* jump, in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1944 | pIn1 = &aMem[pOp->p1]; |
dan | e5166e0 | 2019-03-19 11:56:39 +0000 | [diff] [blame] | 1945 | if( (pIn1->flags & MEM_Int)==0 ){ |
drh | 83b301b | 2013-11-20 00:59:02 +0000 | [diff] [blame] | 1946 | applyAffinity(pIn1, SQLITE_AFF_NUMERIC, encoding); |
dan | e5166e0 | 2019-03-19 11:56:39 +0000 | [diff] [blame] | 1947 | if( (pIn1->flags & MEM_Int)==0 ){ |
drh | c906533 | 2019-04-01 14:01:21 +0000 | [diff] [blame] | 1948 | VdbeBranchTaken(1, 2); |
drh | 83b301b | 2013-11-20 00:59:02 +0000 | [diff] [blame] | 1949 | if( pOp->p2==0 ){ |
| 1950 | rc = SQLITE_MISMATCH; |
| 1951 | goto abort_due_to_error; |
| 1952 | }else{ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 1953 | goto jump_to_p2; |
drh | 83b301b | 2013-11-20 00:59:02 +0000 | [diff] [blame] | 1954 | } |
drh | 8aff101 | 2001-12-22 14:49:24 +0000 | [diff] [blame] | 1955 | } |
drh | 8aff101 | 2001-12-22 14:49:24 +0000 | [diff] [blame] | 1956 | } |
drh | c906533 | 2019-04-01 14:01:21 +0000 | [diff] [blame] | 1957 | VdbeBranchTaken(0, 2); |
dan | e5166e0 | 2019-03-19 11:56:39 +0000 | [diff] [blame] | 1958 | MemSetTypeFlag(pIn1, MEM_Int); |
drh | 8aff101 | 2001-12-22 14:49:24 +0000 | [diff] [blame] | 1959 | break; |
| 1960 | } |
| 1961 | |
drh | 13573c7 | 2010-01-12 17:04:07 +0000 | [diff] [blame] | 1962 | #ifndef SQLITE_OMIT_FLOATING_POINT |
drh | 8558cde | 2008-01-05 05:20:10 +0000 | [diff] [blame] | 1963 | /* Opcode: RealAffinity P1 * * * * |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 1964 | ** |
drh | 2133d82 | 2008-01-03 18:44:59 +0000 | [diff] [blame] | 1965 | ** If register P1 holds an integer convert it to a real value. |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 1966 | ** |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 1967 | ** This opcode is used when extracting information from a column that |
| 1968 | ** has REAL affinity. Such column values may still be stored as |
| 1969 | ** integers, for space efficiency, but after extraction we want them |
| 1970 | ** to have only a real value. |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 1971 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 1972 | case OP_RealAffinity: { /* in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 1973 | pIn1 = &aMem[pOp->p1]; |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 1974 | if( pIn1->flags & (MEM_Int|MEM_IntReal) ){ |
drh | 3242c69 | 2019-05-04 01:29:13 +0000 | [diff] [blame] | 1975 | testcase( pIn1->flags & MEM_Int ); |
| 1976 | testcase( pIn1->flags & MEM_IntReal ); |
drh | 8558cde | 2008-01-05 05:20:10 +0000 | [diff] [blame] | 1977 | sqlite3VdbeMemRealify(pIn1); |
drh | efb5f9a | 2019-08-30 21:52:13 +0000 | [diff] [blame] | 1978 | REGISTER_TRACE(pOp->p1, pIn1); |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 1979 | } |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 1980 | break; |
| 1981 | } |
drh | 13573c7 | 2010-01-12 17:04:07 +0000 | [diff] [blame] | 1982 | #endif |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 1983 | |
drh | 8df447f | 2005-11-01 15:48:24 +0000 | [diff] [blame] | 1984 | #ifndef SQLITE_OMIT_CAST |
drh | 4169e43 | 2014-08-25 20:11:52 +0000 | [diff] [blame] | 1985 | /* Opcode: Cast P1 P2 * * * |
mistachkin | a1dc42a | 2014-08-27 17:53:40 +0000 | [diff] [blame] | 1986 | ** Synopsis: affinity(r[P1]) |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 1987 | ** |
drh | 4169e43 | 2014-08-25 20:11:52 +0000 | [diff] [blame] | 1988 | ** Force the value in register P1 to be the type defined by P2. |
| 1989 | ** |
| 1990 | ** <ul> |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 1991 | ** <li> P2=='A' → BLOB |
| 1992 | ** <li> P2=='B' → TEXT |
| 1993 | ** <li> P2=='C' → NUMERIC |
| 1994 | ** <li> P2=='D' → INTEGER |
| 1995 | ** <li> P2=='E' → REAL |
drh | 4169e43 | 2014-08-25 20:11:52 +0000 | [diff] [blame] | 1996 | ** </ul> |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 1997 | ** |
| 1998 | ** A NULL value is not changed by this routine. It remains NULL. |
| 1999 | */ |
drh | 4169e43 | 2014-08-25 20:11:52 +0000 | [diff] [blame] | 2000 | case OP_Cast: { /* in1 */ |
drh | 05883a3 | 2015-06-02 15:32:08 +0000 | [diff] [blame] | 2001 | assert( pOp->p2>=SQLITE_AFF_BLOB && pOp->p2<=SQLITE_AFF_REAL ); |
drh | 05bbb2e | 2014-08-25 22:37:19 +0000 | [diff] [blame] | 2002 | testcase( pOp->p2==SQLITE_AFF_TEXT ); |
drh | 05883a3 | 2015-06-02 15:32:08 +0000 | [diff] [blame] | 2003 | testcase( pOp->p2==SQLITE_AFF_BLOB ); |
drh | 05bbb2e | 2014-08-25 22:37:19 +0000 | [diff] [blame] | 2004 | testcase( pOp->p2==SQLITE_AFF_NUMERIC ); |
| 2005 | testcase( pOp->p2==SQLITE_AFF_INTEGER ); |
| 2006 | testcase( pOp->p2==SQLITE_AFF_REAL ); |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 2007 | pIn1 = &aMem[pOp->p1]; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 2008 | memAboutToChange(p, pIn1); |
drh | 8558cde | 2008-01-05 05:20:10 +0000 | [diff] [blame] | 2009 | rc = ExpandBlob(pIn1); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 2010 | if( rc ) goto abort_due_to_error; |
drh | 0af6ddd | 2019-12-23 03:37:46 +0000 | [diff] [blame] | 2011 | rc = sqlite3VdbeMemCast(pIn1, pOp->p2, encoding); |
| 2012 | if( rc ) goto abort_due_to_error; |
| 2013 | UPDATE_MAX_BLOBSIZE(pIn1); |
drh | 5d73272 | 2019-12-20 17:25:10 +0000 | [diff] [blame] | 2014 | REGISTER_TRACE(pOp->p1, pIn1); |
drh | 487e262 | 2005-06-25 18:42:14 +0000 | [diff] [blame] | 2015 | break; |
| 2016 | } |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 2017 | #endif /* SQLITE_OMIT_CAST */ |
| 2018 | |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2019 | /* Opcode: Eq P1 P2 P3 P4 P5 |
drh | 88e665f | 2016-08-27 01:41:53 +0000 | [diff] [blame] | 2020 | ** Synopsis: IF r[P3]==r[P1] |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2021 | ** |
| 2022 | ** Compare the values in register P1 and P3. If reg(P3)==reg(P1) then |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2023 | ** jump to address P2. |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2024 | ** |
| 2025 | ** The SQLITE_AFF_MASK portion of P5 must be an affinity character - |
| 2026 | ** SQLITE_AFF_TEXT, SQLITE_AFF_INTEGER, and so forth. An attempt is made |
| 2027 | ** to coerce both inputs according to this affinity before the |
| 2028 | ** comparison is made. If the SQLITE_AFF_MASK is 0x00, then numeric |
| 2029 | ** affinity is used. Note that the affinity conversions are stored |
| 2030 | ** back into the input registers P1 and P3. So this opcode can cause |
| 2031 | ** persistent changes to registers P1 and P3. |
| 2032 | ** |
| 2033 | ** Once any conversions have taken place, and neither value is NULL, |
| 2034 | ** the values are compared. If both values are blobs then memcmp() is |
| 2035 | ** used to determine the results of the comparison. If both values |
| 2036 | ** are text, then the appropriate collating function specified in |
| 2037 | ** P4 is used to do the comparison. If P4 is not specified then |
| 2038 | ** memcmp() is used to compare text string. If both values are |
| 2039 | ** numeric, then a numeric comparison is used. If the two values |
| 2040 | ** are of different types, then numbers are considered less than |
| 2041 | ** strings and strings are considered less than blobs. |
| 2042 | ** |
| 2043 | ** If SQLITE_NULLEQ is set in P5 then the result of comparison is always either |
| 2044 | ** true or false and is never NULL. If both operands are NULL then the result |
| 2045 | ** of comparison is true. If either operand is NULL then the result is false. |
| 2046 | ** If neither operand is NULL the result is the same as it would be if |
| 2047 | ** the SQLITE_NULLEQ flag were omitted from P5. |
| 2048 | ** |
drh | 1f97d26 | 2021-03-29 13:47:20 +0000 | [diff] [blame] | 2049 | ** This opcode saves the result of comparison for use by the new |
| 2050 | ** OP_Jump opcode. |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2051 | */ |
| 2052 | /* Opcode: Ne P1 P2 P3 P4 P5 |
drh | 88e665f | 2016-08-27 01:41:53 +0000 | [diff] [blame] | 2053 | ** Synopsis: IF r[P3]!=r[P1] |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2054 | ** |
| 2055 | ** This works just like the Eq opcode except that the jump is taken if |
| 2056 | ** the operands in registers P1 and P3 are not equal. See the Eq opcode for |
| 2057 | ** additional information. |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2058 | */ |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2059 | /* Opcode: Lt P1 P2 P3 P4 P5 |
drh | 88e665f | 2016-08-27 01:41:53 +0000 | [diff] [blame] | 2060 | ** Synopsis: IF r[P3]<r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2061 | ** |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2062 | ** Compare the values in register P1 and P3. If reg(P3)<reg(P1) then |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2063 | ** jump to address P2. |
drh | f5905aa | 2002-05-26 20:54:33 +0000 | [diff] [blame] | 2064 | ** |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2065 | ** If the SQLITE_JUMPIFNULL bit of P5 is set and either reg(P1) or |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2066 | ** reg(P3) is NULL then the take the jump. If the SQLITE_JUMPIFNULL |
drh | 710c484 | 2010-08-30 01:17:20 +0000 | [diff] [blame] | 2067 | ** bit is clear then fall through if either operand is NULL. |
drh | 4f68623 | 2005-09-20 13:55:18 +0000 | [diff] [blame] | 2068 | ** |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2069 | ** The SQLITE_AFF_MASK portion of P5 must be an affinity character - |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 2070 | ** SQLITE_AFF_TEXT, SQLITE_AFF_INTEGER, and so forth. An attempt is made |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 2071 | ** to coerce both inputs according to this affinity before the |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2072 | ** comparison is made. If the SQLITE_AFF_MASK is 0x00, then numeric |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 2073 | ** affinity is used. Note that the affinity conversions are stored |
| 2074 | ** back into the input registers P1 and P3. So this opcode can cause |
| 2075 | ** persistent changes to registers P1 and P3. |
danielk1977 | a37cdde | 2004-05-16 11:15:36 +0000 | [diff] [blame] | 2076 | ** |
| 2077 | ** Once any conversions have taken place, and neither value is NULL, |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2078 | ** the values are compared. If both values are blobs then memcmp() is |
| 2079 | ** used to determine the results of the comparison. If both values |
| 2080 | ** are text, then the appropriate collating function specified in |
| 2081 | ** P4 is used to do the comparison. If P4 is not specified then |
| 2082 | ** memcmp() is used to compare text string. If both values are |
| 2083 | ** numeric, then a numeric comparison is used. If the two values |
| 2084 | ** are of different types, then numbers are considered less than |
| 2085 | ** strings and strings are considered less than blobs. |
drh | 1f97d26 | 2021-03-29 13:47:20 +0000 | [diff] [blame] | 2086 | ** |
| 2087 | ** This opcode saves the result of comparison for use by the new |
| 2088 | ** OP_Jump opcode. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2089 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2090 | /* Opcode: Le P1 P2 P3 P4 P5 |
drh | 88e665f | 2016-08-27 01:41:53 +0000 | [diff] [blame] | 2091 | ** Synopsis: IF r[P3]<=r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2092 | ** |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2093 | ** This works just like the Lt opcode except that the jump is taken if |
| 2094 | ** the content of register P3 is less than or equal to the content of |
| 2095 | ** register P1. See the Lt opcode for additional information. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2096 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2097 | /* Opcode: Gt P1 P2 P3 P4 P5 |
drh | 88e665f | 2016-08-27 01:41:53 +0000 | [diff] [blame] | 2098 | ** Synopsis: IF r[P3]>r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2099 | ** |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2100 | ** This works just like the Lt opcode except that the jump is taken if |
| 2101 | ** the content of register P3 is greater than the content of |
| 2102 | ** register P1. See the Lt opcode for additional information. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2103 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2104 | /* Opcode: Ge P1 P2 P3 P4 P5 |
drh | 88e665f | 2016-08-27 01:41:53 +0000 | [diff] [blame] | 2105 | ** Synopsis: IF r[P3]>=r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2106 | ** |
drh | 3557335 | 2008-01-08 23:54:25 +0000 | [diff] [blame] | 2107 | ** This works just like the Lt opcode except that the jump is taken if |
| 2108 | ** the content of register P3 is greater than or equal to the content of |
| 2109 | ** register P1. See the Lt opcode for additional information. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2110 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2111 | case OP_Eq: /* same as TK_EQ, jump, in1, in3 */ |
| 2112 | case OP_Ne: /* same as TK_NE, jump, in1, in3 */ |
| 2113 | case OP_Lt: /* same as TK_LT, jump, in1, in3 */ |
| 2114 | case OP_Le: /* same as TK_LE, jump, in1, in3 */ |
| 2115 | case OP_Gt: /* same as TK_GT, jump, in1, in3 */ |
| 2116 | case OP_Ge: { /* same as TK_GE, jump, in1, in3 */ |
drh | 4910a76 | 2016-09-03 01:46:15 +0000 | [diff] [blame] | 2117 | int res, res2; /* Result of the comparison of pIn1 against pIn3 */ |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2118 | char affinity; /* Affinity to use for comparison */ |
dan | b7dca7d | 2010-03-05 16:32:12 +0000 | [diff] [blame] | 2119 | u16 flags1; /* Copy of initial value of pIn1->flags */ |
| 2120 | u16 flags3; /* Copy of initial value of pIn3->flags */ |
danielk1977 | a37cdde | 2004-05-16 11:15:36 +0000 | [diff] [blame] | 2121 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 2122 | pIn1 = &aMem[pOp->p1]; |
| 2123 | pIn3 = &aMem[pOp->p3]; |
dan | b7dca7d | 2010-03-05 16:32:12 +0000 | [diff] [blame] | 2124 | flags1 = pIn1->flags; |
| 2125 | flags3 = pIn3->flags; |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2126 | if( (flags1 & flags3 & MEM_Int)!=0 ){ |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2127 | /* Common case of comparison of two integers */ |
| 2128 | if( pIn3->u.i > pIn1->u.i ){ |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2129 | if( sqlite3aGTb[pOp->opcode] ){ |
| 2130 | VdbeBranchTaken(1, (pOp->p5 & SQLITE_NULLEQ)?2:3); |
| 2131 | goto jump_to_p2; |
| 2132 | } |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2133 | iCompare = +1; |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2134 | VVA_ONLY( iCompareIsInit = 1; ) |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2135 | }else if( pIn3->u.i < pIn1->u.i ){ |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2136 | if( sqlite3aLTb[pOp->opcode] ){ |
| 2137 | VdbeBranchTaken(1, (pOp->p5 & SQLITE_NULLEQ)?2:3); |
| 2138 | goto jump_to_p2; |
| 2139 | } |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2140 | iCompare = -1; |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2141 | VVA_ONLY( iCompareIsInit = 1; ) |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2142 | }else{ |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2143 | if( sqlite3aEQb[pOp->opcode] ){ |
| 2144 | VdbeBranchTaken(1, (pOp->p5 & SQLITE_NULLEQ)?2:3); |
| 2145 | goto jump_to_p2; |
| 2146 | } |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2147 | iCompare = 0; |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2148 | VVA_ONLY( iCompareIsInit = 1; ) |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2149 | } |
| 2150 | VdbeBranchTaken(0, (pOp->p5 & SQLITE_NULLEQ)?2:3); |
| 2151 | break; |
| 2152 | } |
drh | c3f1d5f | 2011-05-30 23:42:16 +0000 | [diff] [blame] | 2153 | if( (flags1 | flags3)&MEM_Null ){ |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2154 | /* One or both operands are NULL */ |
| 2155 | if( pOp->p5 & SQLITE_NULLEQ ){ |
| 2156 | /* If SQLITE_NULLEQ is set (which will only happen if the operator is |
| 2157 | ** OP_Eq or OP_Ne) then take the jump or not depending on whether |
| 2158 | ** or not both operands are null. |
| 2159 | */ |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 2160 | assert( (flags1 & MEM_Cleared)==0 ); |
drh | a42325e | 2018-12-22 00:34:30 +0000 | [diff] [blame] | 2161 | assert( (pOp->p5 & SQLITE_JUMPIFNULL)==0 || CORRUPT_DB ); |
| 2162 | testcase( (pOp->p5 & SQLITE_JUMPIFNULL)!=0 ); |
drh | c3191d2 | 2016-10-18 16:36:15 +0000 | [diff] [blame] | 2163 | if( (flags1&flags3&MEM_Null)!=0 |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 2164 | && (flags3&MEM_Cleared)==0 |
| 2165 | ){ |
drh | 4910a76 | 2016-09-03 01:46:15 +0000 | [diff] [blame] | 2166 | res = 0; /* Operands are equal */ |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 2167 | }else{ |
dan | bdabe74 | 2019-03-18 16:51:24 +0000 | [diff] [blame] | 2168 | res = ((flags3 & MEM_Null) ? -1 : +1); /* Operands are not equal */ |
drh | 053a128 | 2012-09-19 21:15:46 +0000 | [diff] [blame] | 2169 | } |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2170 | }else{ |
| 2171 | /* SQLITE_NULLEQ is clear and at least one operand is NULL, |
| 2172 | ** then the result is always NULL. |
| 2173 | ** The jump is taken if the SQLITE_JUMPIFNULL bit is set. |
| 2174 | */ |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2175 | VdbeBranchTaken(2,3); |
| 2176 | if( pOp->p5 & SQLITE_JUMPIFNULL ){ |
| 2177 | goto jump_to_p2; |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2178 | } |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2179 | iCompare = 1; /* Operands are not equal */ |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2180 | VVA_ONLY( iCompareIsInit = 1; ) |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2181 | break; |
danielk1977 | a37cdde | 2004-05-16 11:15:36 +0000 | [diff] [blame] | 2182 | } |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2183 | }else{ |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2184 | /* Neither operand is NULL and we couldn't do the special high-speed |
| 2185 | ** integer comparison case. So do a general-case comparison. */ |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2186 | affinity = pOp->p5 & SQLITE_AFF_MASK; |
drh | 24a0962 | 2014-09-18 16:28:59 +0000 | [diff] [blame] | 2187 | if( affinity>=SQLITE_AFF_NUMERIC ){ |
drh | 5fd0c12 | 2016-04-04 13:46:24 +0000 | [diff] [blame] | 2188 | if( (flags1 | flags3)&MEM_Str ){ |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 2189 | if( (flags1 & (MEM_Int|MEM_IntReal|MEM_Real|MEM_Str))==MEM_Str ){ |
drh | 5fd0c12 | 2016-04-04 13:46:24 +0000 | [diff] [blame] | 2190 | applyNumericAffinity(pIn1,0); |
drh | 86d2de2 | 2020-06-14 13:40:13 +0000 | [diff] [blame] | 2191 | testcase( flags3==pIn3->flags ); |
drh | 4b37cd4 | 2016-06-25 11:43:47 +0000 | [diff] [blame] | 2192 | flags3 = pIn3->flags; |
drh | 5fd0c12 | 2016-04-04 13:46:24 +0000 | [diff] [blame] | 2193 | } |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 2194 | if( (flags3 & (MEM_Int|MEM_IntReal|MEM_Real|MEM_Str))==MEM_Str ){ |
drh | 5fd0c12 | 2016-04-04 13:46:24 +0000 | [diff] [blame] | 2195 | applyNumericAffinity(pIn3,0); |
| 2196 | } |
drh | 24a0962 | 2014-09-18 16:28:59 +0000 | [diff] [blame] | 2197 | } |
drh | a8b5c87 | 2022-12-14 09:06:45 +0000 | [diff] [blame] | 2198 | }else if( affinity==SQLITE_AFF_TEXT && ((flags1 | flags3) & MEM_Str)!=0 ){ |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 2199 | if( (flags1 & MEM_Str)==0 && (flags1&(MEM_Int|MEM_Real|MEM_IntReal))!=0 ){ |
drh | e7a3466 | 2014-09-19 22:44:20 +0000 | [diff] [blame] | 2200 | testcase( pIn1->flags & MEM_Int ); |
| 2201 | testcase( pIn1->flags & MEM_Real ); |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 2202 | testcase( pIn1->flags & MEM_IntReal ); |
drh | 24a0962 | 2014-09-18 16:28:59 +0000 | [diff] [blame] | 2203 | sqlite3VdbeMemStringify(pIn1, encoding, 1); |
drh | bc8a6b3 | 2015-03-31 11:42:23 +0000 | [diff] [blame] | 2204 | testcase( (flags1&MEM_Dyn) != (pIn1->flags&MEM_Dyn) ); |
| 2205 | flags1 = (pIn1->flags & ~MEM_TypeMask) | (flags1 & MEM_TypeMask); |
drh | 1c70429 | 2022-12-17 12:49:04 +0000 | [diff] [blame] | 2206 | if( NEVER(pIn1==pIn3) ) flags3 = flags1 | MEM_Str; |
drh | 24a0962 | 2014-09-18 16:28:59 +0000 | [diff] [blame] | 2207 | } |
drh | b44fec6 | 2019-12-24 21:42:22 +0000 | [diff] [blame] | 2208 | if( (flags3 & MEM_Str)==0 && (flags3&(MEM_Int|MEM_Real|MEM_IntReal))!=0 ){ |
drh | e7a3466 | 2014-09-19 22:44:20 +0000 | [diff] [blame] | 2209 | testcase( pIn3->flags & MEM_Int ); |
| 2210 | testcase( pIn3->flags & MEM_Real ); |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 2211 | testcase( pIn3->flags & MEM_IntReal ); |
drh | 24a0962 | 2014-09-18 16:28:59 +0000 | [diff] [blame] | 2212 | sqlite3VdbeMemStringify(pIn3, encoding, 1); |
drh | bc8a6b3 | 2015-03-31 11:42:23 +0000 | [diff] [blame] | 2213 | testcase( (flags3&MEM_Dyn) != (pIn3->flags&MEM_Dyn) ); |
| 2214 | flags3 = (pIn3->flags & ~MEM_TypeMask) | (flags3 & MEM_TypeMask); |
drh | 24a0962 | 2014-09-18 16:28:59 +0000 | [diff] [blame] | 2215 | } |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2216 | } |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2217 | assert( pOp->p4type==P4_COLLSEQ || pOp->p4.pColl==0 ); |
drh | 4910a76 | 2016-09-03 01:46:15 +0000 | [diff] [blame] | 2218 | res = sqlite3MemCompare(pIn3, pIn1, pOp->p4.pColl); |
drh | e51c44f | 2004-05-30 20:46:09 +0000 | [diff] [blame] | 2219 | } |
drh | 8546497 | 2021-05-17 16:54:52 +0000 | [diff] [blame] | 2220 | |
drh | 5859636 | 2017-08-03 00:29:23 +0000 | [diff] [blame] | 2221 | /* At this point, res is negative, zero, or positive if reg[P1] is |
| 2222 | ** less than, equal to, or greater than reg[P3], respectively. Compute |
| 2223 | ** the answer to this operator in res2, depending on what the comparison |
| 2224 | ** operator actually is. The next block of code depends on the fact |
| 2225 | ** that the 6 comparison operators are consecutive integers in this |
| 2226 | ** order: NE, EQ, GT, LE, LT, GE */ |
| 2227 | assert( OP_Eq==OP_Ne+1 ); assert( OP_Gt==OP_Ne+2 ); assert( OP_Le==OP_Ne+3 ); |
| 2228 | assert( OP_Lt==OP_Ne+4 ); assert( OP_Ge==OP_Ne+5 ); |
drh | 1af3fd5 | 2021-03-28 23:37:56 +0000 | [diff] [blame] | 2229 | if( res<0 ){ |
| 2230 | res2 = sqlite3aLTb[pOp->opcode]; |
drh | 5859636 | 2017-08-03 00:29:23 +0000 | [diff] [blame] | 2231 | }else if( res==0 ){ |
drh | 1af3fd5 | 2021-03-28 23:37:56 +0000 | [diff] [blame] | 2232 | res2 = sqlite3aEQb[pOp->opcode]; |
drh | 5859636 | 2017-08-03 00:29:23 +0000 | [diff] [blame] | 2233 | }else{ |
drh | 1af3fd5 | 2021-03-28 23:37:56 +0000 | [diff] [blame] | 2234 | res2 = sqlite3aGTb[pOp->opcode]; |
danielk1977 | a37cdde | 2004-05-16 11:15:36 +0000 | [diff] [blame] | 2235 | } |
drh | 1f97d26 | 2021-03-29 13:47:20 +0000 | [diff] [blame] | 2236 | iCompare = res; |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2237 | VVA_ONLY( iCompareIsInit = 1; ) |
danielk1977 | a37cdde | 2004-05-16 11:15:36 +0000 | [diff] [blame] | 2238 | |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 2239 | /* Undo any changes made by applyAffinity() to the input registers. */ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 2240 | assert( (pIn3->flags & MEM_Dyn) == (flags3 & MEM_Dyn) ); |
| 2241 | pIn3->flags = flags3; |
drh | b44fec6 | 2019-12-24 21:42:22 +0000 | [diff] [blame] | 2242 | assert( (pIn1->flags & MEM_Dyn) == (flags1 & MEM_Dyn) ); |
| 2243 | pIn1->flags = flags1; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 2244 | |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2245 | VdbeBranchTaken(res2!=0, (pOp->p5 & SQLITE_NULLEQ)?2:3); |
| 2246 | if( res2 ){ |
| 2247 | goto jump_to_p2; |
danielk1977 | a37cdde | 2004-05-16 11:15:36 +0000 | [diff] [blame] | 2248 | } |
| 2249 | break; |
| 2250 | } |
drh | c9b84a1 | 2002-06-20 11:36:48 +0000 | [diff] [blame] | 2251 | |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2252 | /* Opcode: ElseEq * P2 * * * |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2253 | ** |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 2254 | ** This opcode must follow an OP_Lt or OP_Gt comparison operator. There |
| 2255 | ** can be zero or more OP_ReleaseReg opcodes intervening, but no other |
| 2256 | ** opcodes are allowed to occur between this instruction and the previous |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2257 | ** OP_Lt or OP_Gt. |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 2258 | ** |
| 2259 | ** If result of an OP_Eq comparison on the same two operands as the |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2260 | ** prior OP_Lt or OP_Gt would have been true, then jump to P2. |
| 2261 | ** If the result of an OP_Eq comparison on the two previous |
| 2262 | ** operands would have been false or NULL, then fall through. |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2263 | */ |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2264 | case OP_ElseEq: { /* same as TK_ESCAPE, jump */ |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 2265 | |
| 2266 | #ifdef SQLITE_DEBUG |
| 2267 | /* Verify the preconditions of this opcode - that it follows an OP_Lt or |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2268 | ** OP_Gt with zero or more intervening OP_ReleaseReg opcodes */ |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 2269 | int iAddr; |
| 2270 | for(iAddr = (int)(pOp - aOp) - 1; ALWAYS(iAddr>=0); iAddr--){ |
| 2271 | if( aOp[iAddr].opcode==OP_ReleaseReg ) continue; |
| 2272 | assert( aOp[iAddr].opcode==OP_Lt || aOp[iAddr].opcode==OP_Gt ); |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 2273 | break; |
| 2274 | } |
| 2275 | #endif /* SQLITE_DEBUG */ |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2276 | assert( iCompareIsInit ); |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2277 | VdbeBranchTaken(iCompare==0, 2); |
| 2278 | if( iCompare==0 ) goto jump_to_p2; |
drh | 79752b6 | 2016-08-13 10:02:17 +0000 | [diff] [blame] | 2279 | break; |
| 2280 | } |
| 2281 | |
| 2282 | |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2283 | /* Opcode: Permutation * * * P4 * |
| 2284 | ** |
drh | b7dab70 | 2017-01-26 18:00:00 +0000 | [diff] [blame] | 2285 | ** Set the permutation used by the OP_Compare operator in the next |
| 2286 | ** instruction. The permutation is stored in the P4 operand. |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2287 | ** |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2288 | ** The permutation is only valid for the next opcode which must be |
| 2289 | ** an OP_Compare that has the OPFLAG_PERMUTE bit set in P5. |
drh | b170202 | 2016-01-30 00:45:18 +0000 | [diff] [blame] | 2290 | ** |
| 2291 | ** The first integer in the P4 integer array is the length of the array |
| 2292 | ** and does not become part of the permutation. |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2293 | */ |
| 2294 | case OP_Permutation: { |
| 2295 | assert( pOp->p4type==P4_INTARRAY ); |
| 2296 | assert( pOp->p4.ai ); |
drh | b7dab70 | 2017-01-26 18:00:00 +0000 | [diff] [blame] | 2297 | assert( pOp[1].opcode==OP_Compare ); |
| 2298 | assert( pOp[1].p5 & OPFLAG_PERMUTE ); |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2299 | break; |
| 2300 | } |
| 2301 | |
drh | 953f761 | 2012-12-07 22:18:54 +0000 | [diff] [blame] | 2302 | /* Opcode: Compare P1 P2 P3 P4 P5 |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 2303 | ** Synopsis: r[P1@P3] <-> r[P2@P3] |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2304 | ** |
drh | 710c484 | 2010-08-30 01:17:20 +0000 | [diff] [blame] | 2305 | ** Compare two vectors of registers in reg(P1)..reg(P1+P3-1) (call this |
| 2306 | ** vector "A") and in reg(P2)..reg(P2+P3-1) ("B"). Save the result of |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2307 | ** the comparison for use by the next OP_Jump instruct. |
| 2308 | ** |
drh | 0ca10df | 2012-12-08 13:26:23 +0000 | [diff] [blame] | 2309 | ** If P5 has the OPFLAG_PERMUTE bit set, then the order of comparison is |
| 2310 | ** determined by the most recent OP_Permutation operator. If the |
| 2311 | ** OPFLAG_PERMUTE bit is clear, then register are compared in sequential |
| 2312 | ** order. |
| 2313 | ** |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2314 | ** P4 is a KeyInfo structure that defines collating sequences and sort |
| 2315 | ** orders for the comparison. The permutation applies to registers |
| 2316 | ** only. The KeyInfo elements are used sequentially. |
| 2317 | ** |
| 2318 | ** The comparison is a sort comparison, so NULLs compare equal, |
| 2319 | ** NULLs are less than numbers, numbers are less than strings, |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2320 | ** and strings are less than blobs. |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2321 | ** |
| 2322 | ** This opcode must be immediately followed by an OP_Jump opcode. |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2323 | */ |
| 2324 | case OP_Compare: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 2325 | int n; |
| 2326 | int i; |
| 2327 | int p1; |
| 2328 | int p2; |
| 2329 | const KeyInfo *pKeyInfo; |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 2330 | u32 idx; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 2331 | CollSeq *pColl; /* Collating sequence to use on this term */ |
| 2332 | int bRev; /* True for DESCENDING sort order */ |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 2333 | u32 *aPermute; /* The permutation */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 2334 | |
drh | b7dab70 | 2017-01-26 18:00:00 +0000 | [diff] [blame] | 2335 | if( (pOp->p5 & OPFLAG_PERMUTE)==0 ){ |
| 2336 | aPermute = 0; |
| 2337 | }else{ |
| 2338 | assert( pOp>aOp ); |
| 2339 | assert( pOp[-1].opcode==OP_Permutation ); |
| 2340 | assert( pOp[-1].p4type==P4_INTARRAY ); |
| 2341 | aPermute = pOp[-1].p4.ai + 1; |
| 2342 | assert( aPermute!=0 ); |
| 2343 | } |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 2344 | n = pOp->p3; |
| 2345 | pKeyInfo = pOp->p4.pKeyInfo; |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2346 | assert( n>0 ); |
drh | 93a960a | 2008-07-10 00:32:42 +0000 | [diff] [blame] | 2347 | assert( pKeyInfo!=0 ); |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2348 | p1 = pOp->p1; |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2349 | p2 = pOp->p2; |
drh | d879e3e | 2017-02-13 13:35:55 +0000 | [diff] [blame] | 2350 | #ifdef SQLITE_DEBUG |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2351 | if( aPermute ){ |
| 2352 | int k, mx = 0; |
mistachkin | cec5f1d | 2020-08-04 16:11:37 +0000 | [diff] [blame] | 2353 | for(k=0; k<n; k++) if( aPermute[k]>(u32)mx ) mx = aPermute[k]; |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 2354 | assert( p1>0 && p1+mx<=(p->nMem+1 - p->nCursor)+1 ); |
| 2355 | assert( p2>0 && p2+mx<=(p->nMem+1 - p->nCursor)+1 ); |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2356 | }else{ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 2357 | assert( p1>0 && p1+n<=(p->nMem+1 - p->nCursor)+1 ); |
| 2358 | assert( p2>0 && p2+n<=(p->nMem+1 - p->nCursor)+1 ); |
drh | 6a2fe09 | 2009-09-23 02:29:36 +0000 | [diff] [blame] | 2359 | } |
| 2360 | #endif /* SQLITE_DEBUG */ |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2361 | for(i=0; i<n; i++){ |
drh | 8deae5a | 2020-07-29 12:23:20 +0000 | [diff] [blame] | 2362 | idx = aPermute ? aPermute[i] : (u32)i; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 2363 | assert( memIsValid(&aMem[p1+idx]) ); |
| 2364 | assert( memIsValid(&aMem[p2+idx]) ); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 2365 | REGISTER_TRACE(p1+idx, &aMem[p1+idx]); |
| 2366 | REGISTER_TRACE(p2+idx, &aMem[p2+idx]); |
drh | a485ad1 | 2017-08-02 22:43:14 +0000 | [diff] [blame] | 2367 | assert( i<pKeyInfo->nKeyField ); |
drh | 93a960a | 2008-07-10 00:32:42 +0000 | [diff] [blame] | 2368 | pColl = pKeyInfo->aColl[i]; |
dan | 6e11892 | 2019-08-12 16:36:38 +0000 | [diff] [blame] | 2369 | bRev = (pKeyInfo->aSortFlags[i] & KEYINFO_ORDER_DESC); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 2370 | iCompare = sqlite3MemCompare(&aMem[p1+idx], &aMem[p2+idx], pColl); |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2371 | VVA_ONLY( iCompareIsInit = 1; ) |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2372 | if( iCompare ){ |
dan | 6e11892 | 2019-08-12 16:36:38 +0000 | [diff] [blame] | 2373 | if( (pKeyInfo->aSortFlags[i] & KEYINFO_ORDER_BIGNULL) |
| 2374 | && ((aMem[p1+idx].flags & MEM_Null) || (aMem[p2+idx].flags & MEM_Null)) |
| 2375 | ){ |
| 2376 | iCompare = -iCompare; |
| 2377 | } |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2378 | if( bRev ) iCompare = -iCompare; |
| 2379 | break; |
| 2380 | } |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2381 | } |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2382 | assert( pOp[1].opcode==OP_Jump ); |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2383 | break; |
| 2384 | } |
| 2385 | |
| 2386 | /* Opcode: Jump P1 P2 P3 * * |
| 2387 | ** |
| 2388 | ** Jump to the instruction at address P1, P2, or P3 depending on whether |
| 2389 | ** in the most recent OP_Compare instruction the P1 vector was less than |
| 2390 | ** equal to, or greater than the P2 vector, respectively. |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2391 | ** |
| 2392 | ** This opcode must immediately follow an OP_Compare opcode. |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2393 | */ |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2394 | case OP_Jump: { /* jump */ |
drh | a81a9f7 | 2022-04-04 11:38:49 +0000 | [diff] [blame] | 2395 | assert( pOp>aOp && pOp[-1].opcode==OP_Compare ); |
drh | f26bad6 | 2022-12-22 21:32:58 +0000 | [diff] [blame] | 2396 | assert( iCompareIsInit ); |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2397 | if( iCompare<0 ){ |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 2398 | VdbeBranchTaken(0,4); pOp = &aOp[pOp->p1 - 1]; |
drh | 0acb7e4 | 2008-06-25 00:12:41 +0000 | [diff] [blame] | 2399 | }else if( iCompare==0 ){ |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 2400 | VdbeBranchTaken(1,4); pOp = &aOp[pOp->p2 - 1]; |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2401 | }else{ |
drh | 7083a48 | 2018-07-10 16:04:04 +0000 | [diff] [blame] | 2402 | VdbeBranchTaken(2,4); pOp = &aOp[pOp->p3 - 1]; |
drh | 16ee60f | 2008-06-20 18:13:25 +0000 | [diff] [blame] | 2403 | } |
| 2404 | break; |
| 2405 | } |
| 2406 | |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2407 | /* Opcode: And P1 P2 P3 * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 2408 | ** Synopsis: r[P3]=(r[P1] && r[P2]) |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2409 | ** |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2410 | ** Take the logical AND of the values in registers P1 and P2 and |
| 2411 | ** write the result into register P3. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2412 | ** |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2413 | ** If either P1 or P2 is 0 (false) then the result is 0 even if |
| 2414 | ** the other input is NULL. A NULL and true or two NULLs give |
| 2415 | ** a NULL output. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2416 | */ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2417 | /* Opcode: Or P1 P2 P3 * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 2418 | ** Synopsis: r[P3]=(r[P1] || r[P2]) |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2419 | ** |
| 2420 | ** Take the logical OR of the values in register P1 and P2 and |
| 2421 | ** store the answer in register P3. |
| 2422 | ** |
| 2423 | ** If either P1 or P2 is nonzero (true) then the result is 1 (true) |
| 2424 | ** even if the other input is NULL. A NULL and false or two NULLs |
| 2425 | ** give a NULL output. |
| 2426 | */ |
| 2427 | case OP_And: /* same as TK_AND, in1, in2, out3 */ |
| 2428 | case OP_Or: { /* same as TK_OR, in1, in2, out3 */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 2429 | int v1; /* Left operand: 0==FALSE, 1==TRUE, 2==UNKNOWN or NULL */ |
| 2430 | int v2; /* Right operand: 0==FALSE, 1==TRUE, 2==UNKNOWN or NULL */ |
drh | bb11351 | 2002-05-27 01:04:51 +0000 | [diff] [blame] | 2431 | |
drh | 1fcfa72 | 2018-02-26 15:27:31 +0000 | [diff] [blame] | 2432 | v1 = sqlite3VdbeBooleanValue(&aMem[pOp->p1], 2); |
| 2433 | v2 = sqlite3VdbeBooleanValue(&aMem[pOp->p2], 2); |
drh | bb11351 | 2002-05-27 01:04:51 +0000 | [diff] [blame] | 2434 | if( pOp->opcode==OP_And ){ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2435 | static const unsigned char and_logic[] = { 0, 0, 0, 0, 1, 2, 0, 2, 2 }; |
drh | bb11351 | 2002-05-27 01:04:51 +0000 | [diff] [blame] | 2436 | v1 = and_logic[v1*3+v2]; |
| 2437 | }else{ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2438 | static const unsigned char or_logic[] = { 0, 1, 2, 1, 1, 1, 2, 1, 2 }; |
drh | bb11351 | 2002-05-27 01:04:51 +0000 | [diff] [blame] | 2439 | v1 = or_logic[v1*3+v2]; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2440 | } |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 2441 | pOut = &aMem[pOp->p3]; |
drh | bb11351 | 2002-05-27 01:04:51 +0000 | [diff] [blame] | 2442 | if( v1==2 ){ |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 2443 | MemSetTypeFlag(pOut, MEM_Null); |
drh | bb11351 | 2002-05-27 01:04:51 +0000 | [diff] [blame] | 2444 | }else{ |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 2445 | pOut->u.i = v1; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 2446 | MemSetTypeFlag(pOut, MEM_Int); |
drh | bb11351 | 2002-05-27 01:04:51 +0000 | [diff] [blame] | 2447 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2448 | break; |
| 2449 | } |
| 2450 | |
drh | 8abed7b | 2018-02-26 18:49:05 +0000 | [diff] [blame] | 2451 | /* Opcode: IsTrue P1 P2 P3 P4 * |
| 2452 | ** Synopsis: r[P2] = coalesce(r[P1]==TRUE,P3) ^ P4 |
| 2453 | ** |
| 2454 | ** This opcode implements the IS TRUE, IS FALSE, IS NOT TRUE, and |
| 2455 | ** IS NOT FALSE operators. |
| 2456 | ** |
drh | 96acafb | 2018-02-27 14:49:25 +0000 | [diff] [blame] | 2457 | ** Interpret the value in register P1 as a boolean value. Store that |
drh | 8abed7b | 2018-02-26 18:49:05 +0000 | [diff] [blame] | 2458 | ** boolean (a 0 or 1) in register P2. Or if the value in register P1 is |
| 2459 | ** NULL, then the P3 is stored in register P2. Invert the answer if P4 |
| 2460 | ** is 1. |
| 2461 | ** |
| 2462 | ** The logic is summarized like this: |
| 2463 | ** |
| 2464 | ** <ul> |
drh | 96acafb | 2018-02-27 14:49:25 +0000 | [diff] [blame] | 2465 | ** <li> If P3==0 and P4==0 then r[P2] := r[P1] IS TRUE |
| 2466 | ** <li> If P3==1 and P4==1 then r[P2] := r[P1] IS FALSE |
| 2467 | ** <li> If P3==0 and P4==1 then r[P2] := r[P1] IS NOT TRUE |
| 2468 | ** <li> If P3==1 and P4==0 then r[P2] := r[P1] IS NOT FALSE |
drh | 8abed7b | 2018-02-26 18:49:05 +0000 | [diff] [blame] | 2469 | ** </ul> |
| 2470 | */ |
| 2471 | case OP_IsTrue: { /* in1, out2 */ |
| 2472 | assert( pOp->p4type==P4_INT32 ); |
| 2473 | assert( pOp->p4.i==0 || pOp->p4.i==1 ); |
drh | 96acafb | 2018-02-27 14:49:25 +0000 | [diff] [blame] | 2474 | assert( pOp->p3==0 || pOp->p3==1 ); |
drh | 8abed7b | 2018-02-26 18:49:05 +0000 | [diff] [blame] | 2475 | sqlite3VdbeMemSetInt64(&aMem[pOp->p2], |
| 2476 | sqlite3VdbeBooleanValue(&aMem[pOp->p1], pOp->p3) ^ pOp->p4.i); |
| 2477 | break; |
| 2478 | } |
| 2479 | |
drh | e99fa2a | 2008-12-15 15:27:51 +0000 | [diff] [blame] | 2480 | /* Opcode: Not P1 P2 * * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 2481 | ** Synopsis: r[P2]= !r[P1] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2482 | ** |
drh | e99fa2a | 2008-12-15 15:27:51 +0000 | [diff] [blame] | 2483 | ** Interpret the value in register P1 as a boolean value. Store the |
| 2484 | ** boolean complement in register P2. If the value in register P1 is |
| 2485 | ** NULL, then a NULL is stored in P2. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2486 | */ |
drh | 93952eb | 2009-11-13 19:43:43 +0000 | [diff] [blame] | 2487 | case OP_Not: { /* same as TK_NOT, in1, out2 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 2488 | pIn1 = &aMem[pOp->p1]; |
| 2489 | pOut = &aMem[pOp->p2]; |
drh | 0725cab | 2014-09-17 14:52:46 +0000 | [diff] [blame] | 2490 | if( (pIn1->flags & MEM_Null)==0 ){ |
drh | bc8f68a | 2018-02-26 15:31:39 +0000 | [diff] [blame] | 2491 | sqlite3VdbeMemSetInt64(pOut, !sqlite3VdbeBooleanValue(pIn1,0)); |
drh | 007c843 | 2018-02-26 03:20:18 +0000 | [diff] [blame] | 2492 | }else{ |
| 2493 | sqlite3VdbeMemSetNull(pOut); |
drh | e99fa2a | 2008-12-15 15:27:51 +0000 | [diff] [blame] | 2494 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2495 | break; |
| 2496 | } |
| 2497 | |
drh | e99fa2a | 2008-12-15 15:27:51 +0000 | [diff] [blame] | 2498 | /* Opcode: BitNot P1 P2 * * * |
drh | cd9e014 | 2018-06-12 13:16:57 +0000 | [diff] [blame] | 2499 | ** Synopsis: r[P2]= ~r[P1] |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 2500 | ** |
drh | e99fa2a | 2008-12-15 15:27:51 +0000 | [diff] [blame] | 2501 | ** Interpret the content of register P1 as an integer. Store the |
| 2502 | ** ones-complement of the P1 value into register P2. If P1 holds |
| 2503 | ** a NULL then store a NULL in P2. |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 2504 | */ |
drh | 93952eb | 2009-11-13 19:43:43 +0000 | [diff] [blame] | 2505 | case OP_BitNot: { /* same as TK_BITNOT, in1, out2 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 2506 | pIn1 = &aMem[pOp->p1]; |
| 2507 | pOut = &aMem[pOp->p2]; |
drh | 0725cab | 2014-09-17 14:52:46 +0000 | [diff] [blame] | 2508 | sqlite3VdbeMemSetNull(pOut); |
| 2509 | if( (pIn1->flags & MEM_Null)==0 ){ |
| 2510 | pOut->flags = MEM_Int; |
| 2511 | pOut->u.i = ~sqlite3VdbeIntValue(pIn1); |
drh | e99fa2a | 2008-12-15 15:27:51 +0000 | [diff] [blame] | 2512 | } |
drh | bf4133c | 2001-10-13 02:59:08 +0000 | [diff] [blame] | 2513 | break; |
| 2514 | } |
| 2515 | |
drh | 48f2d3b | 2011-09-16 01:34:43 +0000 | [diff] [blame] | 2516 | /* Opcode: Once P1 P2 * * * |
| 2517 | ** |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 2518 | ** Fall through to the next instruction the first time this opcode is |
| 2519 | ** encountered on each invocation of the byte-code program. Jump to P2 |
| 2520 | ** on the second and all subsequent encounters during the same invocation. |
| 2521 | ** |
| 2522 | ** Top-level programs determine first invocation by comparing the P1 |
| 2523 | ** operand against the P1 operand on the OP_Init opcode at the beginning |
| 2524 | ** of the program. If the P1 values differ, then fall through and make |
| 2525 | ** the P1 of this opcode equal to the P1 of OP_Init. If P1 values are |
| 2526 | ** the same then take the jump. |
| 2527 | ** |
| 2528 | ** For subprograms, there is a bitmask in the VdbeFrame that determines |
| 2529 | ** whether or not the jump should be taken. The bitmask is necessary |
| 2530 | ** because the self-altering code trick does not work for recursive |
| 2531 | ** triggers. |
drh | 48f2d3b | 2011-09-16 01:34:43 +0000 | [diff] [blame] | 2532 | */ |
dan | 1d8cb21 | 2011-12-09 13:24:16 +0000 | [diff] [blame] | 2533 | case OP_Once: { /* jump */ |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 2534 | u32 iAddr; /* Address of this instruction */ |
drh | 9e5eb9c | 2016-09-18 16:08:10 +0000 | [diff] [blame] | 2535 | assert( p->aOp[0].opcode==OP_Init ); |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 2536 | if( p->pFrame ){ |
| 2537 | iAddr = (int)(pOp - p->aOp); |
| 2538 | if( (p->pFrame->aOnce[iAddr/8] & (1<<(iAddr & 7)))!=0 ){ |
| 2539 | VdbeBranchTaken(1, 2); |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 2540 | goto jump_to_p2; |
| 2541 | } |
drh | 18333ef | 2017-03-24 18:38:41 +0000 | [diff] [blame] | 2542 | p->pFrame->aOnce[iAddr/8] |= 1<<(iAddr & 7); |
dan | 1d8cb21 | 2011-12-09 13:24:16 +0000 | [diff] [blame] | 2543 | }else{ |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 2544 | if( p->aOp[0].p1==pOp->p1 ){ |
| 2545 | VdbeBranchTaken(1, 2); |
| 2546 | goto jump_to_p2; |
| 2547 | } |
dan | 1d8cb21 | 2011-12-09 13:24:16 +0000 | [diff] [blame] | 2548 | } |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 2549 | VdbeBranchTaken(0, 2); |
| 2550 | pOp->p1 = p->aOp[0].p1; |
dan | 1d8cb21 | 2011-12-09 13:24:16 +0000 | [diff] [blame] | 2551 | break; |
| 2552 | } |
| 2553 | |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 2554 | /* Opcode: If P1 P2 P3 * * |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2555 | ** |
drh | ef8662b | 2011-06-20 21:47:58 +0000 | [diff] [blame] | 2556 | ** Jump to P2 if the value in register P1 is true. The value |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 2557 | ** is considered true if it is numeric and non-zero. If the value |
drh | e21a6e1 | 2014-08-01 18:00:24 +0000 | [diff] [blame] | 2558 | ** in P1 is NULL then take the jump if and only if P3 is non-zero. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2559 | */ |
drh | 1fcfa72 | 2018-02-26 15:27:31 +0000 | [diff] [blame] | 2560 | case OP_If: { /* jump, in1 */ |
| 2561 | int c; |
| 2562 | c = sqlite3VdbeBooleanValue(&aMem[pOp->p1], pOp->p3); |
| 2563 | VdbeBranchTaken(c!=0, 2); |
| 2564 | if( c ) goto jump_to_p2; |
| 2565 | break; |
| 2566 | } |
| 2567 | |
drh | 3c84ddf | 2008-01-09 02:15:38 +0000 | [diff] [blame] | 2568 | /* Opcode: IfNot P1 P2 P3 * * |
drh | f5905aa | 2002-05-26 20:54:33 +0000 | [diff] [blame] | 2569 | ** |
drh | ef8662b | 2011-06-20 21:47:58 +0000 | [diff] [blame] | 2570 | ** Jump to P2 if the value in register P1 is False. The value |
drh | b8475df | 2011-12-09 16:21:19 +0000 | [diff] [blame] | 2571 | ** is considered false if it has a numeric value of zero. If the value |
drh | e21a6e1 | 2014-08-01 18:00:24 +0000 | [diff] [blame] | 2572 | ** in P1 is NULL then take the jump if and only if P3 is non-zero. |
drh | f5905aa | 2002-05-26 20:54:33 +0000 | [diff] [blame] | 2573 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2574 | case OP_IfNot: { /* jump, in1 */ |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2575 | int c; |
drh | 1fcfa72 | 2018-02-26 15:27:31 +0000 | [diff] [blame] | 2576 | c = !sqlite3VdbeBooleanValue(&aMem[pOp->p1], !pOp->p3); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 2577 | VdbeBranchTaken(c!=0, 2); |
drh | 1fcfa72 | 2018-02-26 15:27:31 +0000 | [diff] [blame] | 2578 | if( c ) goto jump_to_p2; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2579 | break; |
| 2580 | } |
| 2581 | |
drh | 830ecf9 | 2009-06-18 00:41:55 +0000 | [diff] [blame] | 2582 | /* Opcode: IsNull P1 P2 * * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 2583 | ** Synopsis: if r[P1]==NULL goto P2 |
drh | 477df4b | 2008-01-05 18:48:24 +0000 | [diff] [blame] | 2584 | ** |
drh | 830ecf9 | 2009-06-18 00:41:55 +0000 | [diff] [blame] | 2585 | ** Jump to P2 if the value in register P1 is NULL. |
drh | 477df4b | 2008-01-05 18:48:24 +0000 | [diff] [blame] | 2586 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2587 | case OP_IsNull: { /* same as TK_ISNULL, jump, in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 2588 | pIn1 = &aMem[pOp->p1]; |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 2589 | VdbeBranchTaken( (pIn1->flags & MEM_Null)!=0, 2); |
drh | 830ecf9 | 2009-06-18 00:41:55 +0000 | [diff] [blame] | 2590 | if( (pIn1->flags & MEM_Null)!=0 ){ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 2591 | goto jump_to_p2; |
drh | 830ecf9 | 2009-06-18 00:41:55 +0000 | [diff] [blame] | 2592 | } |
drh | 477df4b | 2008-01-05 18:48:24 +0000 | [diff] [blame] | 2593 | break; |
| 2594 | } |
| 2595 | |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2596 | /* Opcode: IsType P1 P2 P3 P4 P5 |
| 2597 | ** Synopsis: if typeof(P1.P3) in P5 goto P2 |
drh | 71c770f | 2021-08-19 16:29:33 +0000 | [diff] [blame] | 2598 | ** |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2599 | ** Jump to P2 if the type of a column in a btree is one of the types specified |
| 2600 | ** by the P5 bitmask. |
| 2601 | ** |
| 2602 | ** P1 is normally a cursor on a btree for which the row decode cache is |
| 2603 | ** valid through at least column P3. In other words, there should have been |
| 2604 | ** a prior OP_Column for column P3 or greater. If the cursor is not valid, |
| 2605 | ** then this opcode might give spurious results. |
| 2606 | ** The the btree row has fewer than P3 columns, then use P4 as the |
| 2607 | ** datatype. |
| 2608 | ** |
| 2609 | ** If P1 is -1, then P3 is a register number and the datatype is taken |
| 2610 | ** from the value in that register. |
| 2611 | ** |
| 2612 | ** P5 is a bitmask of data types. SQLITE_INTEGER is the least significant |
| 2613 | ** (0x01) bit. SQLITE_FLOAT is the 0x02 bit. SQLITE_TEXT is 0x04. |
| 2614 | ** SQLITE_BLOB is 0x08. SQLITE_NULL is 0x10. |
| 2615 | ** |
| 2616 | ** Take the jump to address P2 if and only if the datatype of the |
| 2617 | ** value determined by P1 and P3 corresponds to one of the bits in the |
| 2618 | ** P5 bitmask. |
| 2619 | ** |
drh | 71c770f | 2021-08-19 16:29:33 +0000 | [diff] [blame] | 2620 | */ |
drh | c9ef12f | 2022-10-10 21:21:04 +0000 | [diff] [blame] | 2621 | case OP_IsType: { /* jump */ |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2622 | VdbeCursor *pC; |
| 2623 | u16 typeMask; |
| 2624 | u32 serialType; |
| 2625 | |
| 2626 | assert( pOp->p1>=(-1) && pOp->p1<p->nCursor ); |
| 2627 | assert( pOp->p1>=0 || (pOp->p3>=0 && pOp->p3<=(p->nMem+1 - p->nCursor)) ); |
| 2628 | if( pOp->p1>=0 ){ |
| 2629 | pC = p->apCsr[pOp->p1]; |
| 2630 | assert( pC!=0 ); |
| 2631 | assert( pOp->p3>=0 ); |
drh | c9ef12f | 2022-10-10 21:21:04 +0000 | [diff] [blame] | 2632 | if( pOp->p3<pC->nHdrParsed ){ |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2633 | serialType = pC->aType[pOp->p3]; |
drh | c2777ab | 2022-10-11 13:57:55 +0000 | [diff] [blame] | 2634 | if( serialType>=12 ){ |
| 2635 | if( serialType&1 ){ |
| 2636 | typeMask = 0x04; /* SQLITE_TEXT */ |
| 2637 | }else{ |
| 2638 | typeMask = 0x08; /* SQLITE_BLOB */ |
| 2639 | } |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2640 | }else{ |
drh | c2777ab | 2022-10-11 13:57:55 +0000 | [diff] [blame] | 2641 | static const unsigned char aMask[] = { |
| 2642 | 0x10, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x2, |
| 2643 | 0x01, 0x01, 0x10, 0x10 |
| 2644 | }; |
| 2645 | testcase( serialType==0 ); |
| 2646 | testcase( serialType==1 ); |
| 2647 | testcase( serialType==2 ); |
| 2648 | testcase( serialType==3 ); |
| 2649 | testcase( serialType==4 ); |
| 2650 | testcase( serialType==5 ); |
| 2651 | testcase( serialType==6 ); |
| 2652 | testcase( serialType==7 ); |
| 2653 | testcase( serialType==8 ); |
| 2654 | testcase( serialType==9 ); |
| 2655 | testcase( serialType==10 ); |
| 2656 | testcase( serialType==11 ); |
| 2657 | typeMask = aMask[serialType]; |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2658 | } |
| 2659 | }else{ |
| 2660 | typeMask = 1 << (pOp->p4.i - 1); |
drh | c2777ab | 2022-10-11 13:57:55 +0000 | [diff] [blame] | 2661 | testcase( typeMask==0x01 ); |
| 2662 | testcase( typeMask==0x02 ); |
| 2663 | testcase( typeMask==0x04 ); |
| 2664 | testcase( typeMask==0x08 ); |
| 2665 | testcase( typeMask==0x10 ); |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2666 | } |
| 2667 | }else{ |
| 2668 | assert( memIsValid(&aMem[pOp->p3]) ); |
| 2669 | typeMask = 1 << (sqlite3_value_type((sqlite3_value*)&aMem[pOp->p3])-1); |
drh | c2777ab | 2022-10-11 13:57:55 +0000 | [diff] [blame] | 2670 | testcase( typeMask==0x01 ); |
| 2671 | testcase( typeMask==0x02 ); |
| 2672 | testcase( typeMask==0x04 ); |
| 2673 | testcase( typeMask==0x08 ); |
| 2674 | testcase( typeMask==0x10 ); |
drh | 49d77ee | 2022-10-10 18:25:05 +0000 | [diff] [blame] | 2675 | } |
| 2676 | VdbeBranchTaken( (typeMask & pOp->p5)!=0, 2); |
| 2677 | if( typeMask & pOp->p5 ){ |
| 2678 | goto jump_to_p2; |
| 2679 | } |
drh | 71c770f | 2021-08-19 16:29:33 +0000 | [diff] [blame] | 2680 | break; |
| 2681 | } |
| 2682 | |
drh | 871e7ff | 2021-03-29 14:40:48 +0000 | [diff] [blame] | 2683 | /* Opcode: ZeroOrNull P1 P2 P3 * * |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2684 | ** Synopsis: r[P2] = 0 OR NULL |
drh | 871e7ff | 2021-03-29 14:40:48 +0000 | [diff] [blame] | 2685 | ** |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2686 | ** If all both registers P1 and P3 are NOT NULL, then store a zero in |
| 2687 | ** register P2. If either registers P1 or P3 are NULL then put |
| 2688 | ** a NULL in register P2. |
drh | 871e7ff | 2021-03-29 14:40:48 +0000 | [diff] [blame] | 2689 | */ |
drh | 4bc2045 | 2021-03-29 18:53:47 +0000 | [diff] [blame] | 2690 | case OP_ZeroOrNull: { /* in1, in2, out2, in3 */ |
drh | 871e7ff | 2021-03-29 14:40:48 +0000 | [diff] [blame] | 2691 | if( (aMem[pOp->p1].flags & MEM_Null)!=0 |
| 2692 | || (aMem[pOp->p3].flags & MEM_Null)!=0 |
| 2693 | ){ |
| 2694 | sqlite3VdbeMemSetNull(aMem + pOp->p2); |
| 2695 | }else{ |
| 2696 | sqlite3VdbeMemSetInt64(aMem + pOp->p2, 0); |
| 2697 | } |
| 2698 | break; |
| 2699 | } |
| 2700 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 2701 | /* Opcode: NotNull P1 P2 * * * |
drh | fc8d4f9 | 2013-11-08 15:19:46 +0000 | [diff] [blame] | 2702 | ** Synopsis: if r[P1]!=NULL goto P2 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2703 | ** |
drh | 6a288a3 | 2008-01-07 19:20:24 +0000 | [diff] [blame] | 2704 | ** Jump to P2 if the value in register P1 is not NULL. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2705 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2706 | case OP_NotNull: { /* same as TK_NOTNULL, jump, in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 2707 | pIn1 = &aMem[pOp->p1]; |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 2708 | VdbeBranchTaken( (pIn1->flags & MEM_Null)==0, 2); |
drh | 6a288a3 | 2008-01-07 19:20:24 +0000 | [diff] [blame] | 2709 | if( (pIn1->flags & MEM_Null)==0 ){ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 2710 | goto jump_to_p2; |
drh | 6a288a3 | 2008-01-07 19:20:24 +0000 | [diff] [blame] | 2711 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 2712 | break; |
| 2713 | } |
| 2714 | |
drh | 31d6fd5 | 2017-04-14 19:03:10 +0000 | [diff] [blame] | 2715 | /* Opcode: IfNullRow P1 P2 P3 * * |
| 2716 | ** Synopsis: if P1.nullRow then r[P3]=NULL, goto P2 |
| 2717 | ** |
| 2718 | ** Check the cursor P1 to see if it is currently pointing at a NULL row. |
| 2719 | ** If it is, then set register P3 to NULL and jump immediately to P2. |
| 2720 | ** If P1 is not on a NULL row, then fall through without making any |
| 2721 | ** changes. |
drh | d198183 | 2022-06-23 15:15:03 +0000 | [diff] [blame] | 2722 | ** |
| 2723 | ** If P1 is not an open cursor, then this opcode is a no-op. |
drh | 31d6fd5 | 2017-04-14 19:03:10 +0000 | [diff] [blame] | 2724 | */ |
| 2725 | case OP_IfNullRow: { /* jump */ |
drh | d198183 | 2022-06-23 15:15:03 +0000 | [diff] [blame] | 2726 | VdbeCursor *pC; |
drh | 31d6fd5 | 2017-04-14 19:03:10 +0000 | [diff] [blame] | 2727 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | d198183 | 2022-06-23 15:15:03 +0000 | [diff] [blame] | 2728 | pC = p->apCsr[pOp->p1]; |
drh | 54f1fc4 | 2022-06-25 20:32:29 +0000 | [diff] [blame] | 2729 | if( ALWAYS(pC) && pC->nullRow ){ |
drh | 31d6fd5 | 2017-04-14 19:03:10 +0000 | [diff] [blame] | 2730 | sqlite3VdbeMemSetNull(aMem + pOp->p3); |
| 2731 | goto jump_to_p2; |
| 2732 | } |
| 2733 | break; |
| 2734 | } |
| 2735 | |
drh | 092457b | 2017-12-29 15:04:49 +0000 | [diff] [blame] | 2736 | #ifdef SQLITE_ENABLE_OFFSET_SQL_FUNC |
| 2737 | /* Opcode: Offset P1 P2 P3 * * |
| 2738 | ** Synopsis: r[P3] = sqlite_offset(P1) |
drh | 2fc865c | 2017-12-16 20:20:37 +0000 | [diff] [blame] | 2739 | ** |
drh | 092457b | 2017-12-29 15:04:49 +0000 | [diff] [blame] | 2740 | ** Store in register r[P3] the byte offset into the database file that is the |
drh | 2fc865c | 2017-12-16 20:20:37 +0000 | [diff] [blame] | 2741 | ** start of the payload for the record at which that cursor P1 is currently |
| 2742 | ** pointing. |
drh | fe6d20e | 2017-12-29 14:33:54 +0000 | [diff] [blame] | 2743 | ** |
drh | 092457b | 2017-12-29 15:04:49 +0000 | [diff] [blame] | 2744 | ** P2 is the column number for the argument to the sqlite_offset() function. |
drh | fe6d20e | 2017-12-29 14:33:54 +0000 | [diff] [blame] | 2745 | ** This opcode does not use P2 itself, but the P2 value is used by the |
| 2746 | ** code generator. The P1, P2, and P3 operands to this opcode are the |
mistachkin | 5e9825e | 2018-03-01 18:09:02 +0000 | [diff] [blame] | 2747 | ** same as for OP_Column. |
drh | 092457b | 2017-12-29 15:04:49 +0000 | [diff] [blame] | 2748 | ** |
| 2749 | ** This opcode is only available if SQLite is compiled with the |
| 2750 | ** -DSQLITE_ENABLE_OFFSET_SQL_FUNC option. |
drh | 2fc865c | 2017-12-16 20:20:37 +0000 | [diff] [blame] | 2751 | */ |
drh | 092457b | 2017-12-29 15:04:49 +0000 | [diff] [blame] | 2752 | case OP_Offset: { /* out3 */ |
drh | 2fc865c | 2017-12-16 20:20:37 +0000 | [diff] [blame] | 2753 | VdbeCursor *pC; /* The VDBE cursor */ |
| 2754 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 2755 | pC = p->apCsr[pOp->p1]; |
drh | fe6d20e | 2017-12-29 14:33:54 +0000 | [diff] [blame] | 2756 | pOut = &p->aMem[pOp->p3]; |
drh | 8f32d92 | 2022-03-05 19:36:29 +0000 | [diff] [blame] | 2757 | if( pC==0 || pC->eCurType!=CURTYPE_BTREE ){ |
drh | fe6d20e | 2017-12-29 14:33:54 +0000 | [diff] [blame] | 2758 | sqlite3VdbeMemSetNull(pOut); |
drh | 2fc865c | 2017-12-16 20:20:37 +0000 | [diff] [blame] | 2759 | }else{ |
drh | 8f32d92 | 2022-03-05 19:36:29 +0000 | [diff] [blame] | 2760 | if( pC->deferredMoveto ){ |
| 2761 | rc = sqlite3VdbeFinishMoveto(pC); |
| 2762 | if( rc ) goto abort_due_to_error; |
| 2763 | } |
drh | dc95136 | 2022-03-05 23:52:05 +0000 | [diff] [blame] | 2764 | if( sqlite3BtreeEof(pC->uc.pCursor) ){ |
drh | 8f32d92 | 2022-03-05 19:36:29 +0000 | [diff] [blame] | 2765 | sqlite3VdbeMemSetNull(pOut); |
| 2766 | }else{ |
| 2767 | sqlite3VdbeMemSetInt64(pOut, sqlite3BtreeOffset(pC->uc.pCursor)); |
| 2768 | } |
drh | 2fc865c | 2017-12-16 20:20:37 +0000 | [diff] [blame] | 2769 | } |
| 2770 | break; |
| 2771 | } |
drh | 092457b | 2017-12-29 15:04:49 +0000 | [diff] [blame] | 2772 | #endif /* SQLITE_ENABLE_OFFSET_SQL_FUNC */ |
drh | 2fc865c | 2017-12-16 20:20:37 +0000 | [diff] [blame] | 2773 | |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 2774 | /* Opcode: Column P1 P2 P3 P4 P5 |
drh | 088b615 | 2022-04-18 13:57:57 +0000 | [diff] [blame] | 2775 | ** Synopsis: r[P3]=PX cursor P1 column P2 |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2776 | ** |
danielk1977 | cfcdaef | 2004-05-12 07:33:33 +0000 | [diff] [blame] | 2777 | ** Interpret the data that cursor P1 points to as a structure built using |
| 2778 | ** the MakeRecord instruction. (See the MakeRecord opcode for additional |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 2779 | ** information about the format of the data.) Extract the P2-th column |
drh | 7ca4af6 | 2022-10-13 14:01:11 +0000 | [diff] [blame] | 2780 | ** from this record. If there are less than (P2+1) |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 2781 | ** values in the record, extract a NULL. |
| 2782 | ** |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 2783 | ** The value extracted is stored in register P3. |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2784 | ** |
drh | 1cc3a36 | 2017-04-03 13:17:31 +0000 | [diff] [blame] | 2785 | ** If the record contains fewer than P2 fields, then extract a NULL. Or, |
danielk1977 | 1f4aa33 | 2008-01-03 09:51:55 +0000 | [diff] [blame] | 2786 | ** if the P4 argument is a P4_MEM use the value of the P4 argument as |
| 2787 | ** the result. |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 2788 | ** |
drh | eddfa98 | 2022-10-13 14:54:32 +0000 | [diff] [blame] | 2789 | ** If the OPFLAG_LENGTHARG bit is set in P5 then the result is guaranteed |
| 2790 | ** to only be used by the length() function or the equivalent. The content |
| 2791 | ** of large blobs is not loaded, thus saving CPU cycles. If the |
| 2792 | ** OPFLAG_TYPEOFARG bit is set then the result will only be used by the |
| 2793 | ** typeof() function or the IS NULL or IS NOT NULL operators or the |
| 2794 | ** equivalent. In this case, all content loading can be omitted. |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2795 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 2796 | case OP_Column: { /* ncycle */ |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 2797 | u32 p2; /* column number to retrieve */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 2798 | VdbeCursor *pC; /* The VDBE cursor */ |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 2799 | BtCursor *pCrsr; /* The B-Tree cursor corresponding to pC */ |
drh | d3194f5 | 2004-05-27 19:59:32 +0000 | [diff] [blame] | 2800 | u32 *aOffset; /* aOffset[i] is offset to start of data for i-th column */ |
danielk1977 | cfcdaef | 2004-05-12 07:33:33 +0000 | [diff] [blame] | 2801 | int len; /* The length of the serialized data for the column */ |
drh | d3194f5 | 2004-05-27 19:59:32 +0000 | [diff] [blame] | 2802 | int i; /* Loop counter */ |
drh | d4e70eb | 2008-01-02 00:34:36 +0000 | [diff] [blame] | 2803 | Mem *pDest; /* Where to write the extracted value */ |
drh | d3194f5 | 2004-05-27 19:59:32 +0000 | [diff] [blame] | 2804 | Mem sMem; /* For storing the record being decoded */ |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 2805 | const u8 *zData; /* Part of the record being decoded */ |
| 2806 | const u8 *zHdr; /* Next unparsed byte of the header */ |
| 2807 | const u8 *zEndHdr; /* Pointer to first byte after the header */ |
drh | c6ce3883 | 2015-10-15 21:30:24 +0000 | [diff] [blame] | 2808 | u64 offset64; /* 64-bit offset */ |
drh | 5a077b7 | 2011-08-29 02:16:18 +0000 | [diff] [blame] | 2809 | u32 t; /* A type code from the record header */ |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 2810 | Mem *pReg; /* PseudoTable input register */ |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2811 | |
drh | 8c7715d | 2019-12-20 14:37:56 +0000 | [diff] [blame] | 2812 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 2813 | assert( pOp->p3>0 && pOp->p3<=(p->nMem+1 - p->nCursor) ); |
dan | de892d9 | 2016-01-29 19:29:45 +0000 | [diff] [blame] | 2814 | pC = p->apCsr[pOp->p1]; |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 2815 | p2 = (u32)pOp->p2; |
dan | de892d9 | 2016-01-29 19:29:45 +0000 | [diff] [blame] | 2816 | |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 2817 | op_column_restart: |
danielk1977 | 6c92409 | 2007-11-12 08:09:34 +0000 | [diff] [blame] | 2818 | assert( pC!=0 ); |
drh | 7c96039 | 2022-04-13 18:20:23 +0000 | [diff] [blame] | 2819 | assert( p2<(u32)pC->nField |
| 2820 | || (pC->eCurType==CURTYPE_PSEUDO && pC->seekResult==0) ); |
drh | b53a5a9 | 2014-10-12 22:37:22 +0000 | [diff] [blame] | 2821 | aOffset = pC->aOffset; |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 2822 | assert( aOffset==pC->aType+pC->nField ); |
drh | 62aaa6c | 2015-11-21 17:27:42 +0000 | [diff] [blame] | 2823 | assert( pC->eCurType!=CURTYPE_VTAB ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 2824 | assert( pC->eCurType!=CURTYPE_PSEUDO || pC->nullRow ); |
| 2825 | assert( pC->eCurType!=CURTYPE_SORTER ); |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 2826 | |
drh | a43a02e | 2016-05-19 17:51:19 +0000 | [diff] [blame] | 2827 | if( pC->cacheStatus!=p->cacheCtr ){ /*OPTIMIZATION-IF-FALSE*/ |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2828 | if( pC->nullRow ){ |
drh | 3ac6243 | 2022-04-13 17:41:03 +0000 | [diff] [blame] | 2829 | if( pC->eCurType==CURTYPE_PSEUDO && pC->seekResult>0 ){ |
drh | fe0cf7a | 2017-08-16 19:20:20 +0000 | [diff] [blame] | 2830 | /* For the special case of as pseudo-cursor, the seekResult field |
| 2831 | ** identifies the register that holds the record */ |
drh | fe0cf7a | 2017-08-16 19:20:20 +0000 | [diff] [blame] | 2832 | pReg = &aMem[pC->seekResult]; |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2833 | assert( pReg->flags & MEM_Blob ); |
| 2834 | assert( memIsValid(pReg) ); |
drh | 6cd8c8c | 2017-08-15 14:14:36 +0000 | [diff] [blame] | 2835 | pC->payloadSize = pC->szRow = pReg->n; |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2836 | pC->aRow = (u8*)pReg->z; |
| 2837 | }else{ |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 2838 | pDest = &aMem[pOp->p3]; |
| 2839 | memAboutToChange(p, pDest); |
drh | 6b5631e | 2014-11-05 15:57:39 +0000 | [diff] [blame] | 2840 | sqlite3VdbeMemSetNull(pDest); |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 2841 | goto op_column_out; |
| 2842 | } |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2843 | }else{ |
drh | 06a09a8 | 2016-11-25 17:03:03 +0000 | [diff] [blame] | 2844 | pCrsr = pC->uc.pCursor; |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 2845 | if( pC->deferredMoveto ){ |
| 2846 | u32 iMap; |
| 2847 | assert( !pC->isEphemeral ); |
| 2848 | if( pC->ub.aAltMap && (iMap = pC->ub.aAltMap[1+p2])>0 ){ |
| 2849 | pC = pC->pAltCursor; |
| 2850 | p2 = iMap - 1; |
| 2851 | goto op_column_restart; |
| 2852 | } |
| 2853 | rc = sqlite3VdbeFinishMoveto(pC); |
| 2854 | if( rc ) goto abort_due_to_error; |
| 2855 | }else if( sqlite3BtreeCursorHasMoved(pCrsr) ){ |
| 2856 | rc = sqlite3VdbeHandleMovedCursor(pC); |
| 2857 | if( rc ) goto abort_due_to_error; |
| 2858 | goto op_column_restart; |
| 2859 | } |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 2860 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2861 | assert( pCrsr ); |
drh | a7c90c4 | 2016-06-04 20:37:10 +0000 | [diff] [blame] | 2862 | assert( sqlite3BtreeCursorIsValid(pCrsr) ); |
| 2863 | pC->payloadSize = sqlite3BtreePayloadSize(pCrsr); |
drh | 6cd8c8c | 2017-08-15 14:14:36 +0000 | [diff] [blame] | 2864 | pC->aRow = sqlite3BtreePayloadFetch(pCrsr, &pC->szRow); |
| 2865 | assert( pC->szRow<=pC->payloadSize ); |
| 2866 | assert( pC->szRow<=65536 ); /* Maximum page size is 64KiB */ |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2867 | } |
drh | b73857f | 2006-03-17 00:25:59 +0000 | [diff] [blame] | 2868 | pC->cacheStatus = p->cacheCtr; |
drh | c2808f3 | 2022-04-02 22:47:47 +0000 | [diff] [blame] | 2869 | if( (aOffset[0] = pC->aRow[0])<0x80 ){ |
| 2870 | pC->iHdrOffset = 1; |
| 2871 | }else{ |
| 2872 | pC->iHdrOffset = sqlite3GetVarint32(pC->aRow, aOffset); |
| 2873 | } |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 2874 | pC->nHdrParsed = 0; |
drh | 35cd643 | 2009-06-05 14:17:21 +0000 | [diff] [blame] | 2875 | |
drh | 1f613c4 | 2017-08-16 14:16:19 +0000 | [diff] [blame] | 2876 | if( pC->szRow<aOffset[0] ){ /*OPTIMIZATION-IF-FALSE*/ |
drh | c81aa2e | 2014-10-11 23:31:52 +0000 | [diff] [blame] | 2877 | /* pC->aRow does not have to hold the entire row, but it does at least |
| 2878 | ** need to cover the header of the record. If pC->aRow does not contain |
| 2879 | ** the complete header, then set it to zero, forcing the header to be |
| 2880 | ** dynamically allocated. */ |
| 2881 | pC->aRow = 0; |
| 2882 | pC->szRow = 0; |
drh | 848a332 | 2015-10-16 12:53:47 +0000 | [diff] [blame] | 2883 | |
| 2884 | /* Make sure a corrupt database has not given us an oversize header. |
| 2885 | ** Do this now to avoid an oversize memory allocation. |
| 2886 | ** |
| 2887 | ** Type entries can be between 1 and 5 bytes each. But 4 and 5 byte |
| 2888 | ** types use so much data space that there can only be 4096 and 32 of |
| 2889 | ** them, respectively. So the maximum header length results from a |
| 2890 | ** 3-byte type for each of the maximum of 32768 columns plus three |
| 2891 | ** extra bytes for the header length itself. 32768*3 + 3 = 98307. |
| 2892 | */ |
drh | 1f613c4 | 2017-08-16 14:16:19 +0000 | [diff] [blame] | 2893 | if( aOffset[0] > 98307 || aOffset[0] > pC->payloadSize ){ |
drh | 74588ce | 2017-09-13 00:13:05 +0000 | [diff] [blame] | 2894 | goto op_column_corrupt; |
drh | 848a332 | 2015-10-16 12:53:47 +0000 | [diff] [blame] | 2895 | } |
drh | 95b225a | 2017-08-16 11:04:22 +0000 | [diff] [blame] | 2896 | }else{ |
| 2897 | /* This is an optimization. By skipping over the first few tests |
| 2898 | ** (ex: pC->nHdrParsed<=p2) in the next section, we achieve a |
| 2899 | ** measurable performance gain. |
| 2900 | ** |
drh | 1f613c4 | 2017-08-16 14:16:19 +0000 | [diff] [blame] | 2901 | ** This branch is taken even if aOffset[0]==0. Such a record is never |
drh | 95b225a | 2017-08-16 11:04:22 +0000 | [diff] [blame] | 2902 | ** generated by SQLite, and could be considered corruption, but we |
drh | 1f613c4 | 2017-08-16 14:16:19 +0000 | [diff] [blame] | 2903 | ** accept it for historical reasons. When aOffset[0]==0, the code this |
drh | 95b225a | 2017-08-16 11:04:22 +0000 | [diff] [blame] | 2904 | ** branch jumps to reads past the end of the record, but never more |
| 2905 | ** than a few bytes. Even if the record occurs at the end of the page |
| 2906 | ** content area, the "page header" comes after the page content and so |
| 2907 | ** this overread is harmless. Similar overreads can occur for a corrupt |
| 2908 | ** database file. |
drh | 0eda6cd | 2016-05-19 16:58:42 +0000 | [diff] [blame] | 2909 | */ |
| 2910 | zData = pC->aRow; |
| 2911 | assert( pC->nHdrParsed<=p2 ); /* Conditional skipped */ |
drh | 1f613c4 | 2017-08-16 14:16:19 +0000 | [diff] [blame] | 2912 | testcase( aOffset[0]==0 ); |
drh | 0eda6cd | 2016-05-19 16:58:42 +0000 | [diff] [blame] | 2913 | goto op_column_read_header; |
drh | c81aa2e | 2014-10-11 23:31:52 +0000 | [diff] [blame] | 2914 | } |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 2915 | }else if( sqlite3BtreeCursorHasMoved(pC->uc.pCursor) ){ |
| 2916 | rc = sqlite3VdbeHandleMovedCursor(pC); |
| 2917 | if( rc ) goto abort_due_to_error; |
| 2918 | goto op_column_restart; |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 2919 | } |
drh | 35cd643 | 2009-06-05 14:17:21 +0000 | [diff] [blame] | 2920 | |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 2921 | /* Make sure at least the first p2+1 entries of the header have been |
drh | 0c8f760 | 2014-09-19 16:56:45 +0000 | [diff] [blame] | 2922 | ** parsed and valid information is in aOffset[] and pC->aType[]. |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 2923 | */ |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2924 | if( pC->nHdrParsed<=p2 ){ |
drh | 380d685 | 2013-11-20 20:58:00 +0000 | [diff] [blame] | 2925 | /* If there is more header available for parsing in the record, try |
| 2926 | ** to extract additional fields up through the p2+1-th field |
drh | 35cd643 | 2009-06-05 14:17:21 +0000 | [diff] [blame] | 2927 | */ |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2928 | if( pC->iHdrOffset<aOffset[0] ){ |
| 2929 | /* Make sure zData points to enough of the record to cover the header. */ |
| 2930 | if( pC->aRow==0 ){ |
| 2931 | memset(&sMem, 0, sizeof(sMem)); |
drh | 2a74006 | 2020-02-05 18:28:17 +0000 | [diff] [blame] | 2932 | rc = sqlite3VdbeMemFromBtreeZeroOffset(pC->uc.pCursor,aOffset[0],&sMem); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 2933 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2934 | zData = (u8*)sMem.z; |
| 2935 | }else{ |
| 2936 | zData = pC->aRow; |
drh | 9188b38 | 2004-05-14 21:12:22 +0000 | [diff] [blame] | 2937 | } |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2938 | |
drh | 0c8f760 | 2014-09-19 16:56:45 +0000 | [diff] [blame] | 2939 | /* Fill in pC->aType[i] and aOffset[i] values through the p2-th field. */ |
drh | 0eda6cd | 2016-05-19 16:58:42 +0000 | [diff] [blame] | 2940 | op_column_read_header: |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2941 | i = pC->nHdrParsed; |
drh | c6ce3883 | 2015-10-15 21:30:24 +0000 | [diff] [blame] | 2942 | offset64 = aOffset[i]; |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2943 | zHdr = zData + pC->iHdrOffset; |
| 2944 | zEndHdr = zData + aOffset[0]; |
drh | 95b225a | 2017-08-16 11:04:22 +0000 | [diff] [blame] | 2945 | testcase( zHdr>=zEndHdr ); |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2946 | do{ |
drh | c332e04 | 2019-02-12 21:04:33 +0000 | [diff] [blame] | 2947 | if( (pC->aType[i] = t = zHdr[0])<0x80 ){ |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2948 | zHdr++; |
drh | faf3727 | 2015-10-16 14:23:42 +0000 | [diff] [blame] | 2949 | offset64 += sqlite3VdbeOneByteSerialTypeLen(t); |
drh | 5a077b7 | 2011-08-29 02:16:18 +0000 | [diff] [blame] | 2950 | }else{ |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2951 | zHdr += sqlite3GetVarint32(zHdr, &t); |
drh | c332e04 | 2019-02-12 21:04:33 +0000 | [diff] [blame] | 2952 | pC->aType[i] = t; |
drh | faf3727 | 2015-10-16 14:23:42 +0000 | [diff] [blame] | 2953 | offset64 += sqlite3VdbeSerialTypeLen(t); |
drh | 5a077b7 | 2011-08-29 02:16:18 +0000 | [diff] [blame] | 2954 | } |
drh | c332e04 | 2019-02-12 21:04:33 +0000 | [diff] [blame] | 2955 | aOffset[++i] = (u32)(offset64 & 0xffffffff); |
drh | 8deae5a | 2020-07-29 12:23:20 +0000 | [diff] [blame] | 2956 | }while( (u32)i<=p2 && zHdr<zEndHdr ); |
drh | 170c276 | 2016-05-20 21:40:11 +0000 | [diff] [blame] | 2957 | |
drh | 8dd8362 | 2014-10-13 23:39:02 +0000 | [diff] [blame] | 2958 | /* The record is corrupt if any of the following are true: |
| 2959 | ** (1) the bytes of the header extend past the declared header size |
drh | 8dd8362 | 2014-10-13 23:39:02 +0000 | [diff] [blame] | 2960 | ** (2) the entire header was used but not all data was used |
drh | 8dd8362 | 2014-10-13 23:39:02 +0000 | [diff] [blame] | 2961 | ** (3) the end of the data extends beyond the end of the record. |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2962 | */ |
drh | c6ce3883 | 2015-10-15 21:30:24 +0000 | [diff] [blame] | 2963 | if( (zHdr>=zEndHdr && (zHdr>zEndHdr || offset64!=pC->payloadSize)) |
| 2964 | || (offset64 > pC->payloadSize) |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2965 | ){ |
drh | 95b225a | 2017-08-16 11:04:22 +0000 | [diff] [blame] | 2966 | if( aOffset[0]==0 ){ |
| 2967 | i = 0; |
| 2968 | zHdr = zEndHdr; |
| 2969 | }else{ |
| 2970 | if( pC->aRow==0 ) sqlite3VdbeMemRelease(&sMem); |
drh | 74588ce | 2017-09-13 00:13:05 +0000 | [diff] [blame] | 2971 | goto op_column_corrupt; |
drh | 95b225a | 2017-08-16 11:04:22 +0000 | [diff] [blame] | 2972 | } |
danielk1977 | dedf45b | 2006-01-13 17:12:01 +0000 | [diff] [blame] | 2973 | } |
drh | ddb2b4a | 2016-03-25 12:10:32 +0000 | [diff] [blame] | 2974 | |
drh | 170c276 | 2016-05-20 21:40:11 +0000 | [diff] [blame] | 2975 | pC->nHdrParsed = i; |
| 2976 | pC->iHdrOffset = (u32)(zHdr - zData); |
| 2977 | if( pC->aRow==0 ) sqlite3VdbeMemRelease(&sMem); |
mistachkin | 8c7cd6a | 2015-12-16 21:09:53 +0000 | [diff] [blame] | 2978 | }else{ |
drh | 9fbc885 | 2016-01-04 03:48:46 +0000 | [diff] [blame] | 2979 | t = 0; |
drh | 9188b38 | 2004-05-14 21:12:22 +0000 | [diff] [blame] | 2980 | } |
drh | d3194f5 | 2004-05-27 19:59:32 +0000 | [diff] [blame] | 2981 | |
drh | f2db338 | 2015-04-30 20:33:25 +0000 | [diff] [blame] | 2982 | /* If after trying to extract new entries from the header, nHdrParsed is |
drh | 380d685 | 2013-11-20 20:58:00 +0000 | [diff] [blame] | 2983 | ** still not up to p2, that means that the record has fewer than p2 |
| 2984 | ** columns. So the result will be either the default value or a NULL. |
drh | d3194f5 | 2004-05-27 19:59:32 +0000 | [diff] [blame] | 2985 | */ |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2986 | if( pC->nHdrParsed<=p2 ){ |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 2987 | pDest = &aMem[pOp->p3]; |
| 2988 | memAboutToChange(p, pDest); |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2989 | if( pOp->p4type==P4_MEM ){ |
| 2990 | sqlite3VdbeMemShallowCopy(pDest, pOp->p4.pMem, MEM_Static); |
| 2991 | }else{ |
drh | 22e8d83 | 2014-10-29 00:58:38 +0000 | [diff] [blame] | 2992 | sqlite3VdbeMemSetNull(pDest); |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 2993 | } |
danielk1977 | 3c9cc8d | 2005-01-17 03:40:08 +0000 | [diff] [blame] | 2994 | goto op_column_out; |
drh | d3194f5 | 2004-05-27 19:59:32 +0000 | [diff] [blame] | 2995 | } |
drh | 95fa606 | 2015-10-16 13:50:08 +0000 | [diff] [blame] | 2996 | }else{ |
| 2997 | t = pC->aType[p2]; |
danielk1977 | cfcdaef | 2004-05-12 07:33:33 +0000 | [diff] [blame] | 2998 | } |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 2999 | |
drh | 380d685 | 2013-11-20 20:58:00 +0000 | [diff] [blame] | 3000 | /* Extract the content for the p2+1-th column. Control can only |
drh | 0c8f760 | 2014-09-19 16:56:45 +0000 | [diff] [blame] | 3001 | ** reach this point if aOffset[p2], aOffset[p2+1], and pC->aType[p2] are |
drh | 380d685 | 2013-11-20 20:58:00 +0000 | [diff] [blame] | 3002 | ** all valid. |
drh | 9188b38 | 2004-05-14 21:12:22 +0000 | [diff] [blame] | 3003 | */ |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 3004 | assert( p2<pC->nHdrParsed ); |
| 3005 | assert( rc==SQLITE_OK ); |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 3006 | pDest = &aMem[pOp->p3]; |
| 3007 | memAboutToChange(p, pDest); |
drh | 75fd054 | 2014-03-01 16:24:44 +0000 | [diff] [blame] | 3008 | assert( sqlite3VdbeCheckMemInvariants(pDest) ); |
drh | a1851ef | 2016-05-20 19:51:28 +0000 | [diff] [blame] | 3009 | if( VdbeMemDynamic(pDest) ){ |
| 3010 | sqlite3VdbeMemSetNull(pDest); |
| 3011 | } |
drh | 95fa606 | 2015-10-16 13:50:08 +0000 | [diff] [blame] | 3012 | assert( t==pC->aType[p2] ); |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 3013 | if( pC->szRow>=aOffset[p2+1] ){ |
drh | 380d685 | 2013-11-20 20:58:00 +0000 | [diff] [blame] | 3014 | /* This is the common case where the desired content fits on the original |
| 3015 | ** page - where the content is not on an overflow page */ |
drh | 69f6e25 | 2016-01-11 18:05:00 +0000 | [diff] [blame] | 3016 | zData = pC->aRow + aOffset[p2]; |
| 3017 | if( t<12 ){ |
| 3018 | sqlite3VdbeSerialGet(zData, t, pDest); |
| 3019 | }else{ |
| 3020 | /* If the column value is a string, we need a persistent value, not |
| 3021 | ** a MEM_Ephem value. This branch is a fast short-cut that is equivalent |
| 3022 | ** to calling sqlite3VdbeSerialGet() and sqlite3VdbeDeephemeralize(). |
| 3023 | */ |
| 3024 | static const u16 aFlag[] = { MEM_Blob, MEM_Str|MEM_Term }; |
| 3025 | pDest->n = len = (t-12)/2; |
drh | a1851ef | 2016-05-20 19:51:28 +0000 | [diff] [blame] | 3026 | pDest->enc = encoding; |
drh | 69f6e25 | 2016-01-11 18:05:00 +0000 | [diff] [blame] | 3027 | if( pDest->szMalloc < len+2 ){ |
drh | 9090df6 | 2022-02-26 14:39:08 +0000 | [diff] [blame] | 3028 | if( len>db->aLimit[SQLITE_LIMIT_LENGTH] ) goto too_big; |
drh | 69f6e25 | 2016-01-11 18:05:00 +0000 | [diff] [blame] | 3029 | pDest->flags = MEM_Null; |
| 3030 | if( sqlite3VdbeMemGrow(pDest, len+2, 0) ) goto no_mem; |
| 3031 | }else{ |
| 3032 | pDest->z = pDest->zMalloc; |
| 3033 | } |
| 3034 | memcpy(pDest->z, zData, len); |
| 3035 | pDest->z[len] = 0; |
| 3036 | pDest->z[len+1] = 0; |
| 3037 | pDest->flags = aFlag[t&1]; |
| 3038 | } |
danielk1977 | 36963fd | 2005-02-19 08:18:05 +0000 | [diff] [blame] | 3039 | }else{ |
drh | a1851ef | 2016-05-20 19:51:28 +0000 | [diff] [blame] | 3040 | pDest->enc = encoding; |
drh | 58c9608 | 2013-12-23 11:33:32 +0000 | [diff] [blame] | 3041 | /* This branch happens only when content is on overflow pages */ |
drh | 380d685 | 2013-11-20 20:58:00 +0000 | [diff] [blame] | 3042 | if( ((pOp->p5 & (OPFLAG_LENGTHARG|OPFLAG_TYPEOFARG))!=0 |
| 3043 | && ((t>=12 && (t&1)==0) || (pOp->p5 & OPFLAG_TYPEOFARG)!=0)) |
| 3044 | || (len = sqlite3VdbeSerialTypeLen(t))==0 |
drh | c8606e4 | 2013-11-20 19:28:03 +0000 | [diff] [blame] | 3045 | ){ |
drh | 2a2a696 | 2014-09-16 18:22:44 +0000 | [diff] [blame] | 3046 | /* Content is irrelevant for |
| 3047 | ** 1. the typeof() function, |
| 3048 | ** 2. the length(X) function if X is a blob, and |
| 3049 | ** 3. if the content length is zero. |
| 3050 | ** So we might as well use bogus content rather than reading |
dan | 1f9144e | 2017-03-17 13:59:06 +0000 | [diff] [blame] | 3051 | ** content from disk. |
| 3052 | ** |
| 3053 | ** Although sqlite3VdbeSerialGet() may read at most 8 bytes from the |
| 3054 | ** buffer passed to it, debugging function VdbeMemPrettyPrint() may |
drh | cbae3f8 | 2020-01-06 20:48:45 +0000 | [diff] [blame] | 3055 | ** read more. Use the global constant sqlite3CtypeMap[] as the array, |
| 3056 | ** as that array is 256 bytes long (plenty for VdbeMemPrettyPrint()) |
| 3057 | ** and it begins with a bunch of zeros. |
dan | 1f9144e | 2017-03-17 13:59:06 +0000 | [diff] [blame] | 3058 | */ |
drh | cbae3f8 | 2020-01-06 20:48:45 +0000 | [diff] [blame] | 3059 | sqlite3VdbeSerialGet((u8*)sqlite3CtypeMap, t, pDest); |
danielk1977 | aee18ef | 2005-03-09 12:26:50 +0000 | [diff] [blame] | 3060 | }else{ |
drh | 9090df6 | 2022-02-26 14:39:08 +0000 | [diff] [blame] | 3061 | if( len>db->aLimit[SQLITE_LIMIT_LENGTH] ) goto too_big; |
drh | cb3cabd | 2016-11-25 19:18:28 +0000 | [diff] [blame] | 3062 | rc = sqlite3VdbeMemFromBtree(pC->uc.pCursor, aOffset[p2], len, pDest); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 3063 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
| 3064 | sqlite3VdbeSerialGet((const u8*)pDest->z, t, pDest); |
| 3065 | pDest->flags &= ~MEM_Ephem; |
danielk1977 | aee18ef | 2005-03-09 12:26:50 +0000 | [diff] [blame] | 3066 | } |
danielk1977 | cfcdaef | 2004-05-12 07:33:33 +0000 | [diff] [blame] | 3067 | } |
drh | d3194f5 | 2004-05-27 19:59:32 +0000 | [diff] [blame] | 3068 | |
danielk1977 | 3c9cc8d | 2005-01-17 03:40:08 +0000 | [diff] [blame] | 3069 | op_column_out: |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 3070 | UPDATE_MAX_BLOBSIZE(pDest); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 3071 | REGISTER_TRACE(pOp->p3, pDest); |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 3072 | break; |
drh | 74588ce | 2017-09-13 00:13:05 +0000 | [diff] [blame] | 3073 | |
| 3074 | op_column_corrupt: |
| 3075 | if( aOp[0].p3>0 ){ |
| 3076 | pOp = &aOp[aOp[0].p3-1]; |
| 3077 | break; |
| 3078 | }else{ |
| 3079 | rc = SQLITE_CORRUPT_BKPT; |
| 3080 | goto abort_due_to_error; |
| 3081 | } |
danielk1977 | 192ac1d | 2004-05-10 07:17:30 +0000 | [diff] [blame] | 3082 | } |
| 3083 | |
drh | 926aac5 | 2021-11-03 14:02:48 +0000 | [diff] [blame] | 3084 | /* Opcode: TypeCheck P1 P2 P3 P4 * |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3085 | ** Synopsis: typecheck(r[P1@P2]) |
| 3086 | ** |
| 3087 | ** Apply affinities to the range of P2 registers beginning with P1. |
| 3088 | ** Take the affinities from the Table object in P4. If any value |
| 3089 | ** cannot be coerced into the correct type, then raise an error. |
| 3090 | ** |
| 3091 | ** This opcode is similar to OP_Affinity except that this opcode |
| 3092 | ** forces the register type to the Table column type. This is used |
| 3093 | ** to implement "strict affinity". |
drh | 71c770f | 2021-08-19 16:29:33 +0000 | [diff] [blame] | 3094 | ** |
drh | 926aac5 | 2021-11-03 14:02:48 +0000 | [diff] [blame] | 3095 | ** GENERATED ALWAYS AS ... STATIC columns are only checked if P3 |
| 3096 | ** is zero. When P3 is non-zero, no type checking occurs for |
| 3097 | ** static generated columns. Virtual columns are computed at query time |
| 3098 | ** and so they are never checked. |
| 3099 | ** |
drh | 71c770f | 2021-08-19 16:29:33 +0000 | [diff] [blame] | 3100 | ** Preconditions: |
| 3101 | ** |
| 3102 | ** <ul> |
| 3103 | ** <li> P2 should be the number of non-virtual columns in the |
| 3104 | ** table of P4. |
| 3105 | ** <li> Table P4 should be a STRICT table. |
| 3106 | ** </ul> |
| 3107 | ** |
| 3108 | ** If any precondition is false, an assertion fault occurs. |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3109 | */ |
| 3110 | case OP_TypeCheck: { |
| 3111 | Table *pTab; |
| 3112 | Column *aCol; |
| 3113 | int i; |
| 3114 | |
| 3115 | assert( pOp->p4type==P4_TABLE ); |
| 3116 | pTab = pOp->p4.pTab; |
| 3117 | assert( pTab->tabFlags & TF_Strict ); |
drh | 71c770f | 2021-08-19 16:29:33 +0000 | [diff] [blame] | 3118 | assert( pTab->nNVCol==pOp->p2 ); |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3119 | aCol = pTab->aCol; |
| 3120 | pIn1 = &aMem[pOp->p1]; |
| 3121 | for(i=0; i<pTab->nCol; i++){ |
drh | 926aac5 | 2021-11-03 14:02:48 +0000 | [diff] [blame] | 3122 | if( aCol[i].colFlags & COLFLAG_GENERATED ){ |
| 3123 | if( aCol[i].colFlags & COLFLAG_VIRTUAL ) continue; |
| 3124 | if( pOp->p3 ){ pIn1++; continue; } |
| 3125 | } |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3126 | assert( pIn1 < &aMem[pOp->p1+pOp->p2] ); |
| 3127 | applyAffinity(pIn1, aCol[i].affinity, encoding); |
| 3128 | if( (pIn1->flags & MEM_Null)==0 ){ |
| 3129 | switch( aCol[i].eCType ){ |
| 3130 | case COLTYPE_BLOB: { |
| 3131 | if( (pIn1->flags & MEM_Blob)==0 ) goto vdbe_type_error; |
| 3132 | break; |
| 3133 | } |
| 3134 | case COLTYPE_INTEGER: |
| 3135 | case COLTYPE_INT: { |
| 3136 | if( (pIn1->flags & MEM_Int)==0 ) goto vdbe_type_error; |
| 3137 | break; |
| 3138 | } |
| 3139 | case COLTYPE_TEXT: { |
| 3140 | if( (pIn1->flags & MEM_Str)==0 ) goto vdbe_type_error; |
| 3141 | break; |
| 3142 | } |
drh | 2a0eefd | 2021-08-21 20:54:19 +0000 | [diff] [blame] | 3143 | case COLTYPE_REAL: { |
drh | 1f3366c | 2022-01-17 23:37:25 +0000 | [diff] [blame] | 3144 | testcase( (pIn1->flags & (MEM_Real|MEM_IntReal))==MEM_Real ); |
drh | 50da6ac | 2023-01-05 14:41:18 +0000 | [diff] [blame] | 3145 | assert( (pIn1->flags & MEM_IntReal)==0 ); |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3146 | if( pIn1->flags & MEM_Int ){ |
| 3147 | /* When applying REAL affinity, if the result is still an MEM_Int |
| 3148 | ** that will fit in 6 bytes, then change the type to MEM_IntReal |
| 3149 | ** so that we keep the high-resolution integer value but know that |
| 3150 | ** the type really wants to be REAL. */ |
| 3151 | testcase( pIn1->u.i==140737488355328LL ); |
| 3152 | testcase( pIn1->u.i==140737488355327LL ); |
| 3153 | testcase( pIn1->u.i==-140737488355328LL ); |
| 3154 | testcase( pIn1->u.i==-140737488355329LL ); |
| 3155 | if( pIn1->u.i<=140737488355327LL && pIn1->u.i>=-140737488355328LL){ |
| 3156 | pIn1->flags |= MEM_IntReal; |
| 3157 | pIn1->flags &= ~MEM_Int; |
| 3158 | }else{ |
| 3159 | pIn1->u.r = (double)pIn1->u.i; |
| 3160 | pIn1->flags |= MEM_Real; |
| 3161 | pIn1->flags &= ~MEM_Int; |
| 3162 | } |
drh | 1f3366c | 2022-01-17 23:37:25 +0000 | [diff] [blame] | 3163 | }else if( (pIn1->flags & (MEM_Real|MEM_IntReal))==0 ){ |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3164 | goto vdbe_type_error; |
| 3165 | } |
| 3166 | break; |
| 3167 | } |
drh | 2a0eefd | 2021-08-21 20:54:19 +0000 | [diff] [blame] | 3168 | default: { |
drh | b9fd010 | 2021-08-23 10:28:02 +0000 | [diff] [blame] | 3169 | /* COLTYPE_ANY. Accept anything. */ |
drh | 2a0eefd | 2021-08-21 20:54:19 +0000 | [diff] [blame] | 3170 | break; |
| 3171 | } |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3172 | } |
| 3173 | } |
| 3174 | REGISTER_TRACE((int)(pIn1-aMem), pIn1); |
| 3175 | pIn1++; |
| 3176 | } |
| 3177 | assert( pIn1 == &aMem[pOp->p1+pOp->p2] ); |
| 3178 | break; |
| 3179 | |
| 3180 | vdbe_type_error: |
drh | faf9c77 | 2021-08-20 08:05:42 +0000 | [diff] [blame] | 3181 | sqlite3VdbeError(p, "cannot store %s value in %s column %s.%s", |
| 3182 | vdbeMemTypeName(pIn1), sqlite3StdType[aCol[i].eCType-1], |
| 3183 | pTab->zName, aCol[i].zCnName); |
drh | 72532f5 | 2021-08-18 19:22:27 +0000 | [diff] [blame] | 3184 | rc = SQLITE_CONSTRAINT_DATATYPE; |
| 3185 | goto abort_due_to_error; |
| 3186 | } |
| 3187 | |
danielk1977 | 751de56 | 2008-04-18 09:01:15 +0000 | [diff] [blame] | 3188 | /* Opcode: Affinity P1 P2 * P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 3189 | ** Synopsis: affinity(r[P1@P2]) |
danielk1977 | 751de56 | 2008-04-18 09:01:15 +0000 | [diff] [blame] | 3190 | ** |
| 3191 | ** Apply affinities to a range of P2 registers starting with P1. |
| 3192 | ** |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 3193 | ** P4 is a string that is P2 characters long. The N-th character of the |
| 3194 | ** string indicates the column affinity that should be used for the N-th |
danielk1977 | 751de56 | 2008-04-18 09:01:15 +0000 | [diff] [blame] | 3195 | ** memory cell in the range. |
| 3196 | */ |
| 3197 | case OP_Affinity: { |
drh | 039fc32 | 2009-11-17 18:31:47 +0000 | [diff] [blame] | 3198 | const char *zAffinity; /* The affinity to be applied */ |
danielk1977 | 751de56 | 2008-04-18 09:01:15 +0000 | [diff] [blame] | 3199 | |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3200 | zAffinity = pOp->p4.z; |
drh | 039fc32 | 2009-11-17 18:31:47 +0000 | [diff] [blame] | 3201 | assert( zAffinity!=0 ); |
drh | 662c50e | 2017-04-01 20:14:01 +0000 | [diff] [blame] | 3202 | assert( pOp->p2>0 ); |
drh | 039fc32 | 2009-11-17 18:31:47 +0000 | [diff] [blame] | 3203 | assert( zAffinity[pOp->p2]==0 ); |
| 3204 | pIn1 = &aMem[pOp->p1]; |
drh | 122c514 | 2019-07-29 05:23:01 +0000 | [diff] [blame] | 3205 | while( 1 /*exit-by-break*/ ){ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 3206 | assert( pIn1 <= &p->aMem[(p->nMem+1 - p->nCursor)] ); |
drh | b5f6243 | 2019-12-10 02:48:41 +0000 | [diff] [blame] | 3207 | assert( zAffinity[0]==SQLITE_AFF_NONE || memIsValid(pIn1) ); |
drh | 83a1daf | 2019-05-01 18:59:33 +0000 | [diff] [blame] | 3208 | applyAffinity(pIn1, zAffinity[0], encoding); |
| 3209 | if( zAffinity[0]==SQLITE_AFF_REAL && (pIn1->flags & MEM_Int)!=0 ){ |
drh | 337cc39 | 2019-07-29 06:06:53 +0000 | [diff] [blame] | 3210 | /* When applying REAL affinity, if the result is still an MEM_Int |
| 3211 | ** that will fit in 6 bytes, then change the type to MEM_IntReal |
| 3212 | ** so that we keep the high-resolution integer value but know that |
| 3213 | ** the type really wants to be REAL. */ |
| 3214 | testcase( pIn1->u.i==140737488355328LL ); |
| 3215 | testcase( pIn1->u.i==140737488355327LL ); |
| 3216 | testcase( pIn1->u.i==-140737488355328LL ); |
| 3217 | testcase( pIn1->u.i==-140737488355329LL ); |
| 3218 | if( pIn1->u.i<=140737488355327LL && pIn1->u.i>=-140737488355328LL ){ |
| 3219 | pIn1->flags |= MEM_IntReal; |
| 3220 | pIn1->flags &= ~MEM_Int; |
| 3221 | }else{ |
| 3222 | pIn1->u.r = (double)pIn1->u.i; |
| 3223 | pIn1->flags |= MEM_Real; |
| 3224 | pIn1->flags &= ~MEM_Int; |
| 3225 | } |
drh | 83a1daf | 2019-05-01 18:59:33 +0000 | [diff] [blame] | 3226 | } |
drh | 6fcc1ec | 2019-05-01 14:41:47 +0000 | [diff] [blame] | 3227 | REGISTER_TRACE((int)(pIn1-aMem), pIn1); |
drh | 83a1daf | 2019-05-01 18:59:33 +0000 | [diff] [blame] | 3228 | zAffinity++; |
| 3229 | if( zAffinity[0]==0 ) break; |
drh | 039fc32 | 2009-11-17 18:31:47 +0000 | [diff] [blame] | 3230 | pIn1++; |
drh | 83a1daf | 2019-05-01 18:59:33 +0000 | [diff] [blame] | 3231 | } |
danielk1977 | 751de56 | 2008-04-18 09:01:15 +0000 | [diff] [blame] | 3232 | break; |
| 3233 | } |
| 3234 | |
drh | 1db639c | 2008-01-17 02:36:28 +0000 | [diff] [blame] | 3235 | /* Opcode: MakeRecord P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 3236 | ** Synopsis: r[P3]=mkrec(r[P1@P2]) |
drh | 7a224de | 2004-06-02 01:22:02 +0000 | [diff] [blame] | 3237 | ** |
drh | 710c484 | 2010-08-30 01:17:20 +0000 | [diff] [blame] | 3238 | ** Convert P2 registers beginning with P1 into the [record format] |
| 3239 | ** use as a data record in a database table or as a key |
| 3240 | ** in an index. The OP_Column opcode can decode the record later. |
drh | 7a224de | 2004-06-02 01:22:02 +0000 | [diff] [blame] | 3241 | ** |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 3242 | ** P4 may be a string that is P2 characters long. The N-th character of the |
| 3243 | ** string indicates the column affinity that should be used for the N-th |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 3244 | ** field of the index key. |
drh | 7a224de | 2004-06-02 01:22:02 +0000 | [diff] [blame] | 3245 | ** |
drh | 8a51256 | 2005-11-14 22:29:05 +0000 | [diff] [blame] | 3246 | ** The mapping from character to affinity is given by the SQLITE_AFF_ |
| 3247 | ** macros defined in sqliteInt.h. |
drh | 7a224de | 2004-06-02 01:22:02 +0000 | [diff] [blame] | 3248 | ** |
drh | 05883a3 | 2015-06-02 15:32:08 +0000 | [diff] [blame] | 3249 | ** If P4 is NULL then all index fields have the affinity BLOB. |
drh | da36933 | 2020-06-29 20:09:04 +0000 | [diff] [blame] | 3250 | ** |
| 3251 | ** The meaning of P5 depends on whether or not the SQLITE_ENABLE_NULL_TRIM |
| 3252 | ** compile-time option is enabled: |
| 3253 | ** |
| 3254 | ** * If SQLITE_ENABLE_NULL_TRIM is enabled, then the P5 is the index |
| 3255 | ** of the right-most table that can be null-trimmed. |
| 3256 | ** |
| 3257 | ** * If SQLITE_ENABLE_NULL_TRIM is omitted, then P5 has the value |
| 3258 | ** OPFLAG_NOCHNG_MAGIC if the OP_MakeRecord opcode is allowed to |
| 3259 | ** accept no-change records with serial_type 10. This value is |
| 3260 | ** only used inside an assert() and does not affect the end result. |
drh | 7f057c9 | 2005-06-24 03:53:06 +0000 | [diff] [blame] | 3261 | */ |
drh | 1db639c | 2008-01-17 02:36:28 +0000 | [diff] [blame] | 3262 | case OP_MakeRecord: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3263 | Mem *pRec; /* The new record */ |
| 3264 | u64 nData; /* Number of bytes of data space */ |
| 3265 | int nHdr; /* Number of bytes of header space */ |
| 3266 | i64 nByte; /* Data space required for this record */ |
drh | 4a33507 | 2015-04-11 02:08:48 +0000 | [diff] [blame] | 3267 | i64 nZero; /* Number of zero bytes at the end of the record */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3268 | int nVarint; /* Number of bytes in a varint */ |
| 3269 | u32 serial_type; /* Type field */ |
| 3270 | Mem *pData0; /* First field to be combined into the record */ |
| 3271 | Mem *pLast; /* Last field of the record */ |
| 3272 | int nField; /* Number of fields in the record */ |
| 3273 | char *zAffinity; /* The affinity string for the record */ |
drh | be37c12 | 2015-10-16 14:54:17 +0000 | [diff] [blame] | 3274 | u32 len; /* Length of a field */ |
drh | b70b0df | 2019-04-30 01:08:42 +0000 | [diff] [blame] | 3275 | u8 *zHdr; /* Where to write next byte of the header */ |
| 3276 | u8 *zPayload; /* Where to write next byte of the payload */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3277 | |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 3278 | /* Assuming the record contains N fields, the record format looks |
| 3279 | ** like this: |
| 3280 | ** |
drh | 7a224de | 2004-06-02 01:22:02 +0000 | [diff] [blame] | 3281 | ** ------------------------------------------------------------------------ |
| 3282 | ** | hdr-size | type 0 | type 1 | ... | type N-1 | data0 | ... | data N-1 | |
| 3283 | ** ------------------------------------------------------------------------ |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 3284 | ** |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 3285 | ** Data(0) is taken from register P1. Data(1) comes from register P1+1 |
peter.d.reid | 60ec914 | 2014-09-06 16:39:46 +0000 | [diff] [blame] | 3286 | ** and so forth. |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 3287 | ** |
| 3288 | ** Each type field is a varint representing the serial type of the |
| 3289 | ** corresponding data element (see sqlite3VdbeSerialType()). The |
drh | 7a224de | 2004-06-02 01:22:02 +0000 | [diff] [blame] | 3290 | ** hdr-size field is also a varint which is the offset from the beginning |
| 3291 | ** of the record to data0. |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 3292 | */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3293 | nData = 0; /* Number of bytes of data space */ |
| 3294 | nHdr = 0; /* Number of bytes of header space */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3295 | nZero = 0; /* Number of zero bytes at the end of the record */ |
drh | 1db639c | 2008-01-17 02:36:28 +0000 | [diff] [blame] | 3296 | nField = pOp->p1; |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 3297 | zAffinity = pOp->p4.z; |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 3298 | assert( nField>0 && pOp->p2>0 && pOp->p2+nField<=(p->nMem+1 - p->nCursor)+1 ); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 3299 | pData0 = &aMem[nField]; |
drh | 1db639c | 2008-01-17 02:36:28 +0000 | [diff] [blame] | 3300 | nField = pOp->p2; |
| 3301 | pLast = &pData0[nField-1]; |
danielk1977 | 8d05984 | 2004-05-12 11:24:02 +0000 | [diff] [blame] | 3302 | |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 3303 | /* Identify the output register */ |
| 3304 | assert( pOp->p3<pOp->p1 || pOp->p3>=pOp->p1+pOp->p2 ); |
| 3305 | pOut = &aMem[pOp->p3]; |
| 3306 | memAboutToChange(p, pOut); |
| 3307 | |
drh | 3e6c060 | 2013-12-10 20:53:01 +0000 | [diff] [blame] | 3308 | /* Apply the requested affinity to all inputs |
| 3309 | */ |
| 3310 | assert( pData0<=pLast ); |
| 3311 | if( zAffinity ){ |
| 3312 | pRec = pData0; |
| 3313 | do{ |
drh | 5ad1251 | 2019-05-09 16:22:51 +0000 | [diff] [blame] | 3314 | applyAffinity(pRec, zAffinity[0], encoding); |
dan | be81262 | 2019-05-17 15:59:11 +0000 | [diff] [blame] | 3315 | if( zAffinity[0]==SQLITE_AFF_REAL && (pRec->flags & MEM_Int) ){ |
| 3316 | pRec->flags |= MEM_IntReal; |
| 3317 | pRec->flags &= ~(MEM_Int); |
| 3318 | } |
drh | 5ad1251 | 2019-05-09 16:22:51 +0000 | [diff] [blame] | 3319 | REGISTER_TRACE((int)(pRec-aMem), pRec); |
| 3320 | zAffinity++; |
| 3321 | pRec++; |
drh | 57bf4a8 | 2014-02-17 14:59:22 +0000 | [diff] [blame] | 3322 | assert( zAffinity[0]==0 || pRec<=pLast ); |
| 3323 | }while( zAffinity[0] ); |
drh | 3e6c060 | 2013-12-10 20:53:01 +0000 | [diff] [blame] | 3324 | } |
| 3325 | |
drh | d447dce | 2017-01-25 20:55:11 +0000 | [diff] [blame] | 3326 | #ifdef SQLITE_ENABLE_NULL_TRIM |
drh | 585ce19 | 2017-01-25 14:58:27 +0000 | [diff] [blame] | 3327 | /* NULLs can be safely trimmed from the end of the record, as long as |
| 3328 | ** as the schema format is 2 or more and none of the omitted columns |
| 3329 | ** have a non-NULL default value. Also, the record must be left with |
| 3330 | ** at least one field. If P5>0 then it will be one more than the |
| 3331 | ** index of the right-most column with a non-NULL default value */ |
| 3332 | if( pOp->p5 ){ |
| 3333 | while( (pLast->flags & MEM_Null)!=0 && nField>pOp->p5 ){ |
| 3334 | pLast--; |
| 3335 | nField--; |
| 3336 | } |
| 3337 | } |
drh | d447dce | 2017-01-25 20:55:11 +0000 | [diff] [blame] | 3338 | #endif |
drh | 585ce19 | 2017-01-25 14:58:27 +0000 | [diff] [blame] | 3339 | |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 3340 | /* Loop through the elements that will make up the record to figure |
drh | 76fd7be | 2019-07-11 19:50:18 +0000 | [diff] [blame] | 3341 | ** out how much space is required for the new record. After this loop, |
| 3342 | ** the Mem.uTemp field of each term should hold the serial-type that will |
| 3343 | ** be used for that term in the generated record: |
| 3344 | ** |
| 3345 | ** Mem.uTemp value type |
| 3346 | ** --------------- --------------- |
| 3347 | ** 0 NULL |
| 3348 | ** 1 1-byte signed integer |
| 3349 | ** 2 2-byte signed integer |
| 3350 | ** 3 3-byte signed integer |
| 3351 | ** 4 4-byte signed integer |
| 3352 | ** 5 6-byte signed integer |
| 3353 | ** 6 8-byte signed integer |
| 3354 | ** 7 IEEE float |
| 3355 | ** 8 Integer constant 0 |
| 3356 | ** 9 Integer constant 1 |
| 3357 | ** 10,11 reserved for expansion |
| 3358 | ** N>=12 and even BLOB |
| 3359 | ** N>=13 and odd text |
| 3360 | ** |
| 3361 | ** The following additional values are computed: |
| 3362 | ** nHdr Number of bytes needed for the record header |
| 3363 | ** nData Number of bytes of data space needed for the record |
| 3364 | ** nZero Zero bytes at the end of the record |
danielk1977 | 8d05984 | 2004-05-12 11:24:02 +0000 | [diff] [blame] | 3365 | */ |
drh | 038b7bc | 2013-12-09 23:17:22 +0000 | [diff] [blame] | 3366 | pRec = pLast; |
drh | 59bf00c | 2013-12-08 23:33:28 +0000 | [diff] [blame] | 3367 | do{ |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 3368 | assert( memIsValid(pRec) ); |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3369 | if( pRec->flags & MEM_Null ){ |
| 3370 | if( pRec->flags & MEM_Zero ){ |
drh | 41fb367 | 2018-01-12 23:18:38 +0000 | [diff] [blame] | 3371 | /* Values with MEM_Null and MEM_Zero are created by xColumn virtual |
| 3372 | ** table methods that never invoke sqlite3_result_xxxxx() while |
| 3373 | ** computing an unchanging column value in an UPDATE statement. |
| 3374 | ** Give such values a special internal-use-only serial-type of 10 |
| 3375 | ** so that they can be passed through to xUpdate and have |
| 3376 | ** a true sqlite3_value_nochange(). */ |
drh | da36933 | 2020-06-29 20:09:04 +0000 | [diff] [blame] | 3377 | #ifndef SQLITE_ENABLE_NULL_TRIM |
drh | 41fb367 | 2018-01-12 23:18:38 +0000 | [diff] [blame] | 3378 | assert( pOp->p5==OPFLAG_NOCHNG_MAGIC || CORRUPT_DB ); |
drh | da36933 | 2020-06-29 20:09:04 +0000 | [diff] [blame] | 3379 | #endif |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3380 | pRec->uTemp = 10; |
drh | 038b7bc | 2013-12-09 23:17:22 +0000 | [diff] [blame] | 3381 | }else{ |
drh | 76fd7be | 2019-07-11 19:50:18 +0000 | [diff] [blame] | 3382 | pRec->uTemp = 0; |
drh | 038b7bc | 2013-12-09 23:17:22 +0000 | [diff] [blame] | 3383 | } |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3384 | nHdr++; |
| 3385 | }else if( pRec->flags & (MEM_Int|MEM_IntReal) ){ |
| 3386 | /* Figure out whether to use 1, 2, 4, 6 or 8 bytes. */ |
| 3387 | i64 i = pRec->u.i; |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3388 | u64 uu; |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3389 | testcase( pRec->flags & MEM_Int ); |
| 3390 | testcase( pRec->flags & MEM_IntReal ); |
| 3391 | if( i<0 ){ |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3392 | uu = ~i; |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3393 | }else{ |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3394 | uu = i; |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3395 | } |
| 3396 | nHdr++; |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3397 | testcase( uu==127 ); testcase( uu==128 ); |
| 3398 | testcase( uu==32767 ); testcase( uu==32768 ); |
| 3399 | testcase( uu==8388607 ); testcase( uu==8388608 ); |
drh | 16f56e8 | 2022-02-21 14:30:59 +0000 | [diff] [blame] | 3400 | testcase( uu==2147483647 ); testcase( uu==2147483648LL ); |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3401 | testcase( uu==140737488355327LL ); testcase( uu==140737488355328LL ); |
| 3402 | if( uu<=127 ){ |
drh | a0318fd | 2022-02-26 23:01:25 +0000 | [diff] [blame] | 3403 | if( (i&1)==i && p->minWriteFileFormat>=4 ){ |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3404 | pRec->uTemp = 8+(u32)uu; |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3405 | }else{ |
| 3406 | nData++; |
| 3407 | pRec->uTemp = 1; |
| 3408 | } |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3409 | }else if( uu<=32767 ){ |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3410 | nData += 2; |
| 3411 | pRec->uTemp = 2; |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3412 | }else if( uu<=8388607 ){ |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3413 | nData += 3; |
| 3414 | pRec->uTemp = 3; |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3415 | }else if( uu<=2147483647 ){ |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3416 | nData += 4; |
| 3417 | pRec->uTemp = 4; |
drh | 9c3bb59 | 2019-07-30 21:00:13 +0000 | [diff] [blame] | 3418 | }else if( uu<=140737488355327LL ){ |
drh | c1da439 | 2019-07-11 19:22:36 +0000 | [diff] [blame] | 3419 | nData += 6; |
| 3420 | pRec->uTemp = 5; |
| 3421 | }else{ |
| 3422 | nData += 8; |
| 3423 | if( pRec->flags & MEM_IntReal ){ |
| 3424 | /* If the value is IntReal and is going to take up 8 bytes to store |
| 3425 | ** as an integer, then we might as well make it an 8-byte floating |
| 3426 | ** point value */ |
| 3427 | pRec->u.r = (double)pRec->u.i; |
| 3428 | pRec->flags &= ~MEM_IntReal; |
| 3429 | pRec->flags |= MEM_Real; |
| 3430 | pRec->uTemp = 7; |
| 3431 | }else{ |
| 3432 | pRec->uTemp = 6; |
| 3433 | } |
| 3434 | } |
| 3435 | }else if( pRec->flags & MEM_Real ){ |
| 3436 | nHdr++; |
| 3437 | nData += 8; |
| 3438 | pRec->uTemp = 7; |
| 3439 | }else{ |
| 3440 | assert( db->mallocFailed || pRec->flags&(MEM_Str|MEM_Blob) ); |
| 3441 | assert( pRec->n>=0 ); |
| 3442 | len = (u32)pRec->n; |
| 3443 | serial_type = (len*2) + 12 + ((pRec->flags & MEM_Str)!=0); |
| 3444 | if( pRec->flags & MEM_Zero ){ |
| 3445 | serial_type += pRec->u.nZero*2; |
| 3446 | if( nData ){ |
| 3447 | if( sqlite3VdbeMemExpandBlob(pRec) ) goto no_mem; |
| 3448 | len += pRec->u.nZero; |
| 3449 | }else{ |
| 3450 | nZero += pRec->u.nZero; |
| 3451 | } |
| 3452 | } |
| 3453 | nData += len; |
| 3454 | nHdr += sqlite3VarintLen(serial_type); |
| 3455 | pRec->uTemp = serial_type; |
drh | fdf972a | 2007-05-02 13:30:27 +0000 | [diff] [blame] | 3456 | } |
drh | 45c3c66 | 2016-04-07 14:16:16 +0000 | [diff] [blame] | 3457 | if( pRec==pData0 ) break; |
| 3458 | pRec--; |
| 3459 | }while(1); |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 3460 | |
drh | 654858d | 2014-11-20 02:18:14 +0000 | [diff] [blame] | 3461 | /* EVIDENCE-OF: R-22564-11647 The header begins with a single varint |
| 3462 | ** which determines the total number of bytes in the header. The varint |
| 3463 | ** value is the size of the header in bytes including the size varint |
| 3464 | ** itself. */ |
drh | 59bf00c | 2013-12-08 23:33:28 +0000 | [diff] [blame] | 3465 | testcase( nHdr==126 ); |
| 3466 | testcase( nHdr==127 ); |
drh | 2a24287 | 2013-12-08 22:59:29 +0000 | [diff] [blame] | 3467 | if( nHdr<=126 ){ |
| 3468 | /* The common case */ |
| 3469 | nHdr += 1; |
| 3470 | }else{ |
| 3471 | /* Rare case of a really large header */ |
| 3472 | nVarint = sqlite3VarintLen(nHdr); |
| 3473 | nHdr += nVarint; |
| 3474 | if( nVarint<sqlite3VarintLen(nHdr) ) nHdr++; |
drh | cb9882a | 2005-03-17 03:15:40 +0000 | [diff] [blame] | 3475 | } |
drh | 038b7bc | 2013-12-09 23:17:22 +0000 | [diff] [blame] | 3476 | nByte = nHdr+nData; |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 3477 | |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 3478 | /* Make sure the output register has a buffer large enough to store |
| 3479 | ** the new record. The output register (pOp->p3) is not allowed to |
| 3480 | ** be one of the input registers (because the following call to |
drh | 322f285 | 2014-09-19 00:43:39 +0000 | [diff] [blame] | 3481 | ** sqlite3VdbeMemClearAndResize() could clobber the value before it is used). |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 3482 | */ |
drh | 0d7f0cc | 2018-09-21 13:07:14 +0000 | [diff] [blame] | 3483 | if( nByte+nZero<=pOut->szMalloc ){ |
| 3484 | /* The output register is already large enough to hold the record. |
| 3485 | ** No error checks or buffer enlargement is required */ |
| 3486 | pOut->z = pOut->zMalloc; |
| 3487 | }else{ |
| 3488 | /* Need to make sure that the output is not too big and then enlarge |
| 3489 | ** the output register to hold the full result */ |
| 3490 | if( nByte+nZero>db->aLimit[SQLITE_LIMIT_LENGTH] ){ |
| 3491 | goto too_big; |
| 3492 | } |
| 3493 | if( sqlite3VdbeMemClearAndResize(pOut, (int)nByte) ){ |
| 3494 | goto no_mem; |
| 3495 | } |
danielk1977 | 8d05984 | 2004-05-12 11:24:02 +0000 | [diff] [blame] | 3496 | } |
drh | 9c1905f | 2008-12-10 22:32:56 +0000 | [diff] [blame] | 3497 | pOut->n = (int)nByte; |
drh | c91b2fd | 2014-03-01 18:13:23 +0000 | [diff] [blame] | 3498 | pOut->flags = MEM_Blob; |
drh | fdf972a | 2007-05-02 13:30:27 +0000 | [diff] [blame] | 3499 | if( nZero ){ |
drh | 8df3284 | 2008-12-09 02:51:23 +0000 | [diff] [blame] | 3500 | pOut->u.nZero = nZero; |
drh | 477df4b | 2008-01-05 18:48:24 +0000 | [diff] [blame] | 3501 | pOut->flags |= MEM_Zero; |
drh | fdf972a | 2007-05-02 13:30:27 +0000 | [diff] [blame] | 3502 | } |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 3503 | UPDATE_MAX_BLOBSIZE(pOut); |
drh | b70b0df | 2019-04-30 01:08:42 +0000 | [diff] [blame] | 3504 | zHdr = (u8 *)pOut->z; |
| 3505 | zPayload = zHdr + nHdr; |
| 3506 | |
| 3507 | /* Write the record */ |
drh | b47b1f6 | 2022-04-01 21:01:37 +0000 | [diff] [blame] | 3508 | if( nHdr<0x80 ){ |
| 3509 | *(zHdr++) = nHdr; |
| 3510 | }else{ |
| 3511 | zHdr += sqlite3PutVarint(zHdr,nHdr); |
| 3512 | } |
drh | b70b0df | 2019-04-30 01:08:42 +0000 | [diff] [blame] | 3513 | assert( pData0<=pLast ); |
| 3514 | pRec = pData0; |
drh | 759e507 | 2022-04-01 20:39:40 +0000 | [diff] [blame] | 3515 | while( 1 /*exit-by-break*/ ){ |
drh | b70b0df | 2019-04-30 01:08:42 +0000 | [diff] [blame] | 3516 | serial_type = pRec->uTemp; |
| 3517 | /* EVIDENCE-OF: R-06529-47362 Following the size varint are one or more |
drh | d859dc2 | 2022-04-02 14:30:58 +0000 | [diff] [blame] | 3518 | ** additional varints, one per column. |
| 3519 | ** EVIDENCE-OF: R-64536-51728 The values for each column in the record |
| 3520 | ** immediately follow the header. */ |
| 3521 | if( serial_type<=7 ){ |
drh | b47b1f6 | 2022-04-01 21:01:37 +0000 | [diff] [blame] | 3522 | *(zHdr++) = serial_type; |
drh | d859dc2 | 2022-04-02 14:30:58 +0000 | [diff] [blame] | 3523 | if( serial_type==0 ){ |
| 3524 | /* NULL value. No change in zPayload */ |
| 3525 | }else{ |
| 3526 | u64 v; |
drh | 1f416db | 2022-04-02 20:08:48 +0000 | [diff] [blame] | 3527 | u32 i; |
drh | d859dc2 | 2022-04-02 14:30:58 +0000 | [diff] [blame] | 3528 | if( serial_type==7 ){ |
| 3529 | assert( sizeof(v)==sizeof(pRec->u.r) ); |
| 3530 | memcpy(&v, &pRec->u.r, sizeof(v)); |
| 3531 | swapMixedEndianFloat(v); |
| 3532 | }else{ |
| 3533 | v = pRec->u.i; |
| 3534 | } |
| 3535 | len = i = sqlite3SmallTypeSizes[serial_type]; |
| 3536 | assert( i>0 ); |
drh | 2c144b0 | 2022-04-02 15:19:02 +0000 | [diff] [blame] | 3537 | while( 1 /*exit-by-break*/ ){ |
drh | d859dc2 | 2022-04-02 14:30:58 +0000 | [diff] [blame] | 3538 | zPayload[--i] = (u8)(v&0xFF); |
drh | 2c144b0 | 2022-04-02 15:19:02 +0000 | [diff] [blame] | 3539 | if( i==0 ) break; |
drh | d859dc2 | 2022-04-02 14:30:58 +0000 | [diff] [blame] | 3540 | v >>= 8; |
drh | 2c144b0 | 2022-04-02 15:19:02 +0000 | [diff] [blame] | 3541 | } |
drh | d859dc2 | 2022-04-02 14:30:58 +0000 | [diff] [blame] | 3542 | zPayload += len; |
| 3543 | } |
| 3544 | }else if( serial_type<0x80 ){ |
| 3545 | *(zHdr++) = serial_type; |
drh | d13527d | 2022-04-02 19:21:58 +0000 | [diff] [blame] | 3546 | if( serial_type>=14 && pRec->n>0 ){ |
| 3547 | assert( pRec->z!=0 ); |
drh | d859dc2 | 2022-04-02 14:30:58 +0000 | [diff] [blame] | 3548 | memcpy(zPayload, pRec->z, pRec->n); |
| 3549 | zPayload += pRec->n; |
| 3550 | } |
drh | b47b1f6 | 2022-04-01 21:01:37 +0000 | [diff] [blame] | 3551 | }else{ |
| 3552 | zHdr += sqlite3PutVarint(zHdr, serial_type); |
drh | d13527d | 2022-04-02 19:21:58 +0000 | [diff] [blame] | 3553 | if( pRec->n ){ |
| 3554 | assert( pRec->z!=0 ); |
| 3555 | memcpy(zPayload, pRec->z, pRec->n); |
| 3556 | zPayload += pRec->n; |
| 3557 | } |
drh | b47b1f6 | 2022-04-01 21:01:37 +0000 | [diff] [blame] | 3558 | } |
drh | 759e507 | 2022-04-01 20:39:40 +0000 | [diff] [blame] | 3559 | if( pRec==pLast ) break; |
| 3560 | pRec++; |
| 3561 | } |
drh | b70b0df | 2019-04-30 01:08:42 +0000 | [diff] [blame] | 3562 | assert( nHdr==(int)(zHdr - (u8*)pOut->z) ); |
| 3563 | assert( nByte==(int)(zPayload - (u8*)pOut->z) ); |
| 3564 | |
| 3565 | assert( pOp->p3>0 && pOp->p3<=(p->nMem+1 - p->nCursor) ); |
| 3566 | REGISTER_TRACE(pOp->p3, pOut); |
danielk1977 | 8d05984 | 2004-05-12 11:24:02 +0000 | [diff] [blame] | 3567 | break; |
| 3568 | } |
| 3569 | |
drh | 50fb7e0 | 2021-12-06 20:16:53 +0000 | [diff] [blame] | 3570 | /* Opcode: Count P1 P2 P3 * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 3571 | ** Synopsis: r[P2]=count() |
danielk1977 | a553316 | 2009-02-24 10:01:51 +0000 | [diff] [blame] | 3572 | ** |
| 3573 | ** Store the number of entries (an integer value) in the table or index |
drh | 9f27463 | 2020-03-17 17:11:23 +0000 | [diff] [blame] | 3574 | ** opened by cursor P1 in register P2. |
| 3575 | ** |
| 3576 | ** If P3==0, then an exact count is obtained, which involves visiting |
| 3577 | ** every btree page of the table. But if P3 is non-zero, an estimate |
| 3578 | ** is returned based on the current cursor position. |
danielk1977 | a553316 | 2009-02-24 10:01:51 +0000 | [diff] [blame] | 3579 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 3580 | case OP_Count: { /* out2 */ |
danielk1977 | a553316 | 2009-02-24 10:01:51 +0000 | [diff] [blame] | 3581 | i64 nEntry; |
drh | c54a617 | 2009-06-02 16:06:03 +0000 | [diff] [blame] | 3582 | BtCursor *pCrsr; |
| 3583 | |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 3584 | assert( p->apCsr[pOp->p1]->eCurType==CURTYPE_BTREE ); |
| 3585 | pCrsr = p->apCsr[pOp->p1]->uc.pCursor; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 3586 | assert( pCrsr ); |
drh | 9f27463 | 2020-03-17 17:11:23 +0000 | [diff] [blame] | 3587 | if( pOp->p3 ){ |
| 3588 | nEntry = sqlite3BtreeRowCountEst(pCrsr); |
| 3589 | }else{ |
| 3590 | nEntry = 0; /* Not needed. Only used to silence a warning. */ |
| 3591 | rc = sqlite3BtreeCount(db, pCrsr, &nEntry); |
| 3592 | if( rc ) goto abort_due_to_error; |
| 3593 | } |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 3594 | pOut = out2Prerelease(p, pOp); |
danielk1977 | a553316 | 2009-02-24 10:01:51 +0000 | [diff] [blame] | 3595 | pOut->u.i = nEntry; |
drh | 21f6daa | 2019-10-11 14:21:48 +0000 | [diff] [blame] | 3596 | goto check_for_interrupt; |
danielk1977 | a553316 | 2009-02-24 10:01:51 +0000 | [diff] [blame] | 3597 | } |
danielk1977 | a553316 | 2009-02-24 10:01:51 +0000 | [diff] [blame] | 3598 | |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3599 | /* Opcode: Savepoint P1 * * P4 * |
| 3600 | ** |
| 3601 | ** Open, release or rollback the savepoint named by parameter P4, depending |
drh | 2ce9b6b | 2019-05-10 14:03:07 +0000 | [diff] [blame] | 3602 | ** on the value of P1. To open a new savepoint set P1==0 (SAVEPOINT_BEGIN). |
| 3603 | ** To release (commit) an existing savepoint set P1==1 (SAVEPOINT_RELEASE). |
| 3604 | ** To rollback an existing savepoint set P1==2 (SAVEPOINT_ROLLBACK). |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3605 | */ |
| 3606 | case OP_Savepoint: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3607 | int p1; /* Value of P1 operand */ |
| 3608 | char *zName; /* Name of savepoint */ |
| 3609 | int nName; |
| 3610 | Savepoint *pNew; |
| 3611 | Savepoint *pSavepoint; |
| 3612 | Savepoint *pTmp; |
| 3613 | int iSavepoint; |
| 3614 | int ii; |
| 3615 | |
| 3616 | p1 = pOp->p1; |
| 3617 | zName = pOp->p4.z; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3618 | |
| 3619 | /* Assert that the p1 parameter is valid. Also that if there is no open |
| 3620 | ** transaction, then there cannot be any savepoints. |
| 3621 | */ |
| 3622 | assert( db->pSavepoint==0 || db->autoCommit==0 ); |
| 3623 | assert( p1==SAVEPOINT_BEGIN||p1==SAVEPOINT_RELEASE||p1==SAVEPOINT_ROLLBACK ); |
| 3624 | assert( db->pSavepoint || db->isTransactionSavepoint==0 ); |
| 3625 | assert( checkSavepointCount(db) ); |
dan | c0537fe | 2013-06-28 19:41:43 +0000 | [diff] [blame] | 3626 | assert( p->bIsReader ); |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3627 | |
| 3628 | if( p1==SAVEPOINT_BEGIN ){ |
drh | 4f7d3a5 | 2013-06-27 23:54:02 +0000 | [diff] [blame] | 3629 | if( db->nVdbeWrite>0 ){ |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3630 | /* A new savepoint cannot be created if there are active write |
| 3631 | ** statements (i.e. open read/write incremental blob handles). |
| 3632 | */ |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 3633 | sqlite3VdbeError(p, "cannot open savepoint - SQL statements in progress"); |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3634 | rc = SQLITE_BUSY; |
| 3635 | }else{ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3636 | nName = sqlite3Strlen30(zName); |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3637 | |
drh | be07ec5 | 2011-06-03 12:15:26 +0000 | [diff] [blame] | 3638 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
dan | d9495cd | 2011-04-27 12:08:04 +0000 | [diff] [blame] | 3639 | /* This call is Ok even if this savepoint is actually a transaction |
| 3640 | ** savepoint (and therefore should not prompt xSavepoint()) callbacks. |
| 3641 | ** If this is a transaction savepoint being opened, it is guaranteed |
| 3642 | ** that the db->aVTrans[] array is empty. */ |
| 3643 | assert( db->autoCommit==0 || db->nVTrans==0 ); |
drh | a24bc9c | 2011-05-24 00:35:56 +0000 | [diff] [blame] | 3644 | rc = sqlite3VtabSavepoint(db, SAVEPOINT_BEGIN, |
| 3645 | db->nStatement+db->nSavepoint); |
dan | d9495cd | 2011-04-27 12:08:04 +0000 | [diff] [blame] | 3646 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
drh | 305ebab | 2011-05-26 14:19:14 +0000 | [diff] [blame] | 3647 | #endif |
dan | d9495cd | 2011-04-27 12:08:04 +0000 | [diff] [blame] | 3648 | |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3649 | /* Create a new savepoint structure. */ |
drh | 575fad6 | 2016-02-05 13:38:36 +0000 | [diff] [blame] | 3650 | pNew = sqlite3DbMallocRawNN(db, sizeof(Savepoint)+nName+1); |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3651 | if( pNew ){ |
| 3652 | pNew->zName = (char *)&pNew[1]; |
| 3653 | memcpy(pNew->zName, zName, nName+1); |
| 3654 | |
| 3655 | /* If there is no open transaction, then mark this as a special |
| 3656 | ** "transaction savepoint". */ |
| 3657 | if( db->autoCommit ){ |
| 3658 | db->autoCommit = 0; |
| 3659 | db->isTransactionSavepoint = 1; |
| 3660 | }else{ |
| 3661 | db->nSavepoint++; |
danielk1977 | d829335 | 2009-04-30 09:10:37 +0000 | [diff] [blame] | 3662 | } |
dan | 21e8d01 | 2011-03-03 20:05:59 +0000 | [diff] [blame] | 3663 | |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3664 | /* Link the new savepoint into the database handle's list. */ |
| 3665 | pNew->pNext = db->pSavepoint; |
| 3666 | db->pSavepoint = pNew; |
dan | ba9108b | 2009-09-22 07:13:42 +0000 | [diff] [blame] | 3667 | pNew->nDeferredCons = db->nDeferredCons; |
dan | cb3e4b7 | 2013-07-03 19:53:05 +0000 | [diff] [blame] | 3668 | pNew->nDeferredImmCons = db->nDeferredImmCons; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3669 | } |
| 3670 | } |
| 3671 | }else{ |
drh | 2ce9b6b | 2019-05-10 14:03:07 +0000 | [diff] [blame] | 3672 | assert( p1==SAVEPOINT_RELEASE || p1==SAVEPOINT_ROLLBACK ); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3673 | iSavepoint = 0; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3674 | |
| 3675 | /* Find the named savepoint. If there is no such savepoint, then an |
| 3676 | ** an error is returned to the user. */ |
| 3677 | for( |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3678 | pSavepoint = db->pSavepoint; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3679 | pSavepoint && sqlite3StrICmp(pSavepoint->zName, zName); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3680 | pSavepoint = pSavepoint->pNext |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3681 | ){ |
| 3682 | iSavepoint++; |
| 3683 | } |
| 3684 | if( !pSavepoint ){ |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 3685 | sqlite3VdbeError(p, "no such savepoint: %s", zName); |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3686 | rc = SQLITE_ERROR; |
drh | 4f7d3a5 | 2013-06-27 23:54:02 +0000 | [diff] [blame] | 3687 | }else if( db->nVdbeWrite>0 && p1==SAVEPOINT_RELEASE ){ |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3688 | /* It is not possible to release (commit) a savepoint if there are |
drh | 0f198a7 | 2012-02-13 16:43:16 +0000 | [diff] [blame] | 3689 | ** active write statements. |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3690 | */ |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 3691 | sqlite3VdbeError(p, "cannot release savepoint - " |
| 3692 | "SQL statements in progress"); |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3693 | rc = SQLITE_BUSY; |
| 3694 | }else{ |
| 3695 | |
| 3696 | /* Determine whether or not this is a transaction savepoint. If so, |
danielk1977 | 34cf35d | 2008-12-18 18:31:38 +0000 | [diff] [blame] | 3697 | ** and this is a RELEASE command, then the current transaction |
| 3698 | ** is committed. |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3699 | */ |
| 3700 | int isTransaction = pSavepoint->pNext==0 && db->isTransactionSavepoint; |
| 3701 | if( isTransaction && p1==SAVEPOINT_RELEASE ){ |
dan | 32b09f2 | 2009-09-23 17:29:59 +0000 | [diff] [blame] | 3702 | if( (rc = sqlite3VdbeCheckFk(p, 1))!=SQLITE_OK ){ |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 3703 | goto vdbe_return; |
| 3704 | } |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3705 | db->autoCommit = 1; |
| 3706 | if( sqlite3VdbeHalt(p)==SQLITE_BUSY ){ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 3707 | p->pc = (int)(pOp - aOp); |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3708 | db->autoCommit = 0; |
| 3709 | p->rc = rc = SQLITE_BUSY; |
| 3710 | goto vdbe_return; |
| 3711 | } |
danielk1977 | 34cf35d | 2008-12-18 18:31:38 +0000 | [diff] [blame] | 3712 | rc = p->rc; |
drh | 94649b6 | 2019-12-18 02:12:04 +0000 | [diff] [blame] | 3713 | if( rc ){ |
| 3714 | db->autoCommit = 0; |
| 3715 | }else{ |
| 3716 | db->isTransactionSavepoint = 0; |
| 3717 | } |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3718 | }else{ |
drh | 47b7fc7 | 2014-11-11 01:33:57 +0000 | [diff] [blame] | 3719 | int isSchemaChange; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3720 | iSavepoint = db->nSavepoint - iSavepoint - 1; |
drh | 31f1005 | 2012-03-31 17:17:26 +0000 | [diff] [blame] | 3721 | if( p1==SAVEPOINT_ROLLBACK ){ |
drh | 8257aa8 | 2017-07-26 19:59:13 +0000 | [diff] [blame] | 3722 | isSchemaChange = (db->mDbFlags & DBFLAG_SchemaChange)!=0; |
drh | 31f1005 | 2012-03-31 17:17:26 +0000 | [diff] [blame] | 3723 | for(ii=0; ii<db->nDb; ii++){ |
drh | 77b1dee | 2014-11-17 17:13:06 +0000 | [diff] [blame] | 3724 | rc = sqlite3BtreeTripAllCursors(db->aDb[ii].pBt, |
| 3725 | SQLITE_ABORT_ROLLBACK, |
drh | 47b7fc7 | 2014-11-11 01:33:57 +0000 | [diff] [blame] | 3726 | isSchemaChange==0); |
dan | 8023104 | 2014-11-12 14:56:02 +0000 | [diff] [blame] | 3727 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
drh | 31f1005 | 2012-03-31 17:17:26 +0000 | [diff] [blame] | 3728 | } |
drh | 47b7fc7 | 2014-11-11 01:33:57 +0000 | [diff] [blame] | 3729 | }else{ |
drh | 2ce9b6b | 2019-05-10 14:03:07 +0000 | [diff] [blame] | 3730 | assert( p1==SAVEPOINT_RELEASE ); |
drh | 47b7fc7 | 2014-11-11 01:33:57 +0000 | [diff] [blame] | 3731 | isSchemaChange = 0; |
drh | 0f198a7 | 2012-02-13 16:43:16 +0000 | [diff] [blame] | 3732 | } |
| 3733 | for(ii=0; ii<db->nDb; ii++){ |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3734 | rc = sqlite3BtreeSavepoint(db->aDb[ii].pBt, p1, iSavepoint); |
| 3735 | if( rc!=SQLITE_OK ){ |
| 3736 | goto abort_due_to_error; |
danielk1977 | bd43455 | 2009-03-18 10:33:00 +0000 | [diff] [blame] | 3737 | } |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3738 | } |
drh | 47b7fc7 | 2014-11-11 01:33:57 +0000 | [diff] [blame] | 3739 | if( isSchemaChange ){ |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 3740 | sqlite3ExpirePreparedStatements(db, 0); |
drh | 81028a4 | 2012-05-15 18:28:27 +0000 | [diff] [blame] | 3741 | sqlite3ResetAllSchemasOfConnection(db); |
drh | 8257aa8 | 2017-07-26 19:59:13 +0000 | [diff] [blame] | 3742 | db->mDbFlags |= DBFLAG_SchemaChange; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3743 | } |
| 3744 | } |
drh | 95866af | 2019-12-15 00:36:33 +0000 | [diff] [blame] | 3745 | if( rc ) goto abort_due_to_error; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3746 | |
| 3747 | /* Regardless of whether this is a RELEASE or ROLLBACK, destroy all |
| 3748 | ** savepoints nested inside of the savepoint being operated on. */ |
| 3749 | while( db->pSavepoint!=pSavepoint ){ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3750 | pTmp = db->pSavepoint; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3751 | db->pSavepoint = pTmp->pNext; |
| 3752 | sqlite3DbFree(db, pTmp); |
| 3753 | db->nSavepoint--; |
| 3754 | } |
| 3755 | |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 3756 | /* If it is a RELEASE, then destroy the savepoint being operated on |
| 3757 | ** too. If it is a ROLLBACK TO, then set the number of deferred |
| 3758 | ** constraint violations present in the database to the value stored |
| 3759 | ** when the savepoint was created. */ |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3760 | if( p1==SAVEPOINT_RELEASE ){ |
| 3761 | assert( pSavepoint==db->pSavepoint ); |
| 3762 | db->pSavepoint = pSavepoint->pNext; |
| 3763 | sqlite3DbFree(db, pSavepoint); |
| 3764 | if( !isTransaction ){ |
| 3765 | db->nSavepoint--; |
| 3766 | } |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 3767 | }else{ |
drh | 2ce9b6b | 2019-05-10 14:03:07 +0000 | [diff] [blame] | 3768 | assert( p1==SAVEPOINT_ROLLBACK ); |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 3769 | db->nDeferredCons = pSavepoint->nDeferredCons; |
dan | cb3e4b7 | 2013-07-03 19:53:05 +0000 | [diff] [blame] | 3770 | db->nDeferredImmCons = pSavepoint->nDeferredImmCons; |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3771 | } |
dan | d9495cd | 2011-04-27 12:08:04 +0000 | [diff] [blame] | 3772 | |
dan | ea8562e | 2015-04-18 16:25:54 +0000 | [diff] [blame] | 3773 | if( !isTransaction || p1==SAVEPOINT_ROLLBACK ){ |
dan | d9495cd | 2011-04-27 12:08:04 +0000 | [diff] [blame] | 3774 | rc = sqlite3VtabSavepoint(db, p1, iSavepoint); |
| 3775 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
| 3776 | } |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3777 | } |
| 3778 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 3779 | if( rc ) goto abort_due_to_error; |
drh | 8703edd | 2022-04-03 22:35:13 +0000 | [diff] [blame] | 3780 | if( p->eVdbeState==VDBE_HALT_STATE ){ |
| 3781 | rc = SQLITE_DONE; |
| 3782 | goto vdbe_return; |
| 3783 | } |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3784 | break; |
| 3785 | } |
| 3786 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 3787 | /* Opcode: AutoCommit P1 P2 * * * |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3788 | ** |
| 3789 | ** Set the database auto-commit flag to P1 (1 or 0). If P2 is true, roll |
danielk1977 | 46c43ed | 2004-06-30 06:30:25 +0000 | [diff] [blame] | 3790 | ** back any currently active btree transactions. If there are any active |
drh | c25eabe | 2009-02-24 18:57:31 +0000 | [diff] [blame] | 3791 | ** VMs (apart from this one), then a ROLLBACK fails. A COMMIT fails if |
| 3792 | ** there are active writing VMs or active VMs that use shared cache. |
drh | 92f02c3 | 2004-09-02 14:57:08 +0000 | [diff] [blame] | 3793 | ** |
| 3794 | ** This instruction causes the VM to halt. |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3795 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 3796 | case OP_AutoCommit: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3797 | int desiredAutoCommit; |
shane | 68c0273 | 2009-06-09 18:14:18 +0000 | [diff] [blame] | 3798 | int iRollback; |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3799 | |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 3800 | desiredAutoCommit = pOp->p1; |
shane | 68c0273 | 2009-06-09 18:14:18 +0000 | [diff] [blame] | 3801 | iRollback = pOp->p2; |
drh | ad4a4b8 | 2008-11-05 16:37:34 +0000 | [diff] [blame] | 3802 | assert( desiredAutoCommit==1 || desiredAutoCommit==0 ); |
shane | 68c0273 | 2009-06-09 18:14:18 +0000 | [diff] [blame] | 3803 | assert( desiredAutoCommit==1 || iRollback==0 ); |
drh | 4f7d3a5 | 2013-06-27 23:54:02 +0000 | [diff] [blame] | 3804 | assert( db->nVdbeActive>0 ); /* At least this one VM is active */ |
dan | c0537fe | 2013-06-28 19:41:43 +0000 | [diff] [blame] | 3805 | assert( p->bIsReader ); |
danielk1977 | 46c43ed | 2004-06-30 06:30:25 +0000 | [diff] [blame] | 3806 | |
drh | b0c8865 | 2016-02-01 13:21:13 +0000 | [diff] [blame] | 3807 | if( desiredAutoCommit!=db->autoCommit ){ |
shane | 68c0273 | 2009-06-09 18:14:18 +0000 | [diff] [blame] | 3808 | if( iRollback ){ |
drh | ad4a4b8 | 2008-11-05 16:37:34 +0000 | [diff] [blame] | 3809 | assert( desiredAutoCommit==1 ); |
drh | 21021a5 | 2012-02-13 17:01:51 +0000 | [diff] [blame] | 3810 | sqlite3RollbackAll(db, SQLITE_ABORT_ROLLBACK); |
danielk1977 | f3f06bb | 2005-12-16 15:24:28 +0000 | [diff] [blame] | 3811 | db->autoCommit = 1; |
drh | b0c8865 | 2016-02-01 13:21:13 +0000 | [diff] [blame] | 3812 | }else if( desiredAutoCommit && db->nVdbeWrite>0 ){ |
| 3813 | /* If this instruction implements a COMMIT and other VMs are writing |
| 3814 | ** return an error indicating that the other VMs must complete first. |
| 3815 | */ |
| 3816 | sqlite3VdbeError(p, "cannot commit transaction - " |
| 3817 | "SQL statements in progress"); |
| 3818 | rc = SQLITE_BUSY; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 3819 | goto abort_due_to_error; |
dan | 32b09f2 | 2009-09-23 17:29:59 +0000 | [diff] [blame] | 3820 | }else if( (rc = sqlite3VdbeCheckFk(p, 1))!=SQLITE_OK ){ |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 3821 | goto vdbe_return; |
danielk1977 | f3f06bb | 2005-12-16 15:24:28 +0000 | [diff] [blame] | 3822 | }else{ |
shane | 7d3846a | 2008-12-11 02:58:26 +0000 | [diff] [blame] | 3823 | db->autoCommit = (u8)desiredAutoCommit; |
drh | 8ff2587 | 2015-07-31 18:59:56 +0000 | [diff] [blame] | 3824 | } |
| 3825 | if( sqlite3VdbeHalt(p)==SQLITE_BUSY ){ |
| 3826 | p->pc = (int)(pOp - aOp); |
| 3827 | db->autoCommit = (u8)(1-desiredAutoCommit); |
| 3828 | p->rc = rc = SQLITE_BUSY; |
| 3829 | goto vdbe_return; |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3830 | } |
danielk1977 | fd7f045 | 2008-12-17 17:30:26 +0000 | [diff] [blame] | 3831 | sqlite3CloseSavepoints(db); |
drh | 83968c4 | 2007-04-18 16:45:24 +0000 | [diff] [blame] | 3832 | if( p->rc==SQLITE_OK ){ |
drh | 900b31e | 2007-08-28 02:27:51 +0000 | [diff] [blame] | 3833 | rc = SQLITE_DONE; |
drh | 83968c4 | 2007-04-18 16:45:24 +0000 | [diff] [blame] | 3834 | }else{ |
drh | 900b31e | 2007-08-28 02:27:51 +0000 | [diff] [blame] | 3835 | rc = SQLITE_ERROR; |
drh | 83968c4 | 2007-04-18 16:45:24 +0000 | [diff] [blame] | 3836 | } |
drh | 900b31e | 2007-08-28 02:27:51 +0000 | [diff] [blame] | 3837 | goto vdbe_return; |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3838 | }else{ |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 3839 | sqlite3VdbeError(p, |
drh | ad4a4b8 | 2008-11-05 16:37:34 +0000 | [diff] [blame] | 3840 | (!desiredAutoCommit)?"cannot start a transaction within a transaction":( |
shane | 68c0273 | 2009-06-09 18:14:18 +0000 | [diff] [blame] | 3841 | (iRollback)?"cannot rollback - no transaction is active": |
drh | f089aa4 | 2008-07-08 19:34:06 +0000 | [diff] [blame] | 3842 | "cannot commit - no transaction is active")); |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3843 | |
| 3844 | rc = SQLITE_ERROR; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 3845 | goto abort_due_to_error; |
drh | 663fc63 | 2002-02-02 18:49:19 +0000 | [diff] [blame] | 3846 | } |
drh | 8616cff | 2019-07-13 16:15:23 +0000 | [diff] [blame] | 3847 | /*NOTREACHED*/ assert(0); |
drh | 663fc63 | 2002-02-02 18:49:19 +0000 | [diff] [blame] | 3848 | } |
| 3849 | |
drh | b22f7c8 | 2014-02-06 23:56:27 +0000 | [diff] [blame] | 3850 | /* Opcode: Transaction P1 P2 P3 P4 P5 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 3851 | ** |
drh | 05a86c5 | 2014-02-16 01:55:49 +0000 | [diff] [blame] | 3852 | ** Begin a transaction on database P1 if a transaction is not already |
| 3853 | ** active. |
| 3854 | ** If P2 is non-zero, then a write-transaction is started, or if a |
| 3855 | ** read-transaction is already active, it is upgraded to a write-transaction. |
drh | 1ca037f | 2020-10-12 13:24:00 +0000 | [diff] [blame] | 3856 | ** If P2 is zero, then a read-transaction is started. If P2 is 2 or more |
| 3857 | ** then an exclusive transaction is started. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 3858 | ** |
drh | 001bbcb | 2003-03-19 03:14:00 +0000 | [diff] [blame] | 3859 | ** P1 is the index of the database file on which the transaction is |
| 3860 | ** started. Index 0 is the main database file and index 1 is the |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 3861 | ** file used for temporary tables. Indices of 2 or more are used for |
| 3862 | ** attached databases. |
drh | cabb081 | 2002-09-14 13:47:32 +0000 | [diff] [blame] | 3863 | ** |
dan | e0af83a | 2009-09-08 19:15:01 +0000 | [diff] [blame] | 3864 | ** If a write-transaction is started and the Vdbe.usesStmtJournal flag is |
| 3865 | ** true (this flag is set if the Vdbe may modify more than one row and may |
| 3866 | ** throw an ABORT exception), a statement transaction may also be opened. |
| 3867 | ** More specifically, a statement transaction is opened iff the database |
| 3868 | ** connection is currently not in autocommit mode, or if there are other |
drh | a451017 | 2012-02-02 15:50:17 +0000 | [diff] [blame] | 3869 | ** active statements. A statement transaction allows the changes made by this |
dan | e0af83a | 2009-09-08 19:15:01 +0000 | [diff] [blame] | 3870 | ** VDBE to be rolled back after an error without having to roll back the |
| 3871 | ** entire transaction. If no error is encountered, the statement transaction |
| 3872 | ** will automatically commit when the VDBE halts. |
| 3873 | ** |
drh | b22f7c8 | 2014-02-06 23:56:27 +0000 | [diff] [blame] | 3874 | ** If P5!=0 then this opcode also checks the schema cookie against P3 |
| 3875 | ** and the schema generation counter against P4. |
| 3876 | ** The cookie changes its value whenever the database schema changes. |
| 3877 | ** This operation is used to detect when that the cookie has changed |
drh | 05a86c5 | 2014-02-16 01:55:49 +0000 | [diff] [blame] | 3878 | ** and that the current process needs to reread the schema. If the schema |
| 3879 | ** cookie in P3 differs from the schema cookie in the database header or |
| 3880 | ** if the schema generation counter in P4 differs from the current |
| 3881 | ** generation counter, then an SQLITE_SCHEMA error is raised and execution |
| 3882 | ** halts. The sqlite3_step() wrapper function might then reprepare the |
| 3883 | ** statement and rerun it from the beginning. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 3884 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 3885 | case OP_Transaction: { |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3886 | Btree *pBt; |
drh | 8ee75f7 | 2022-04-03 10:42:06 +0000 | [diff] [blame] | 3887 | Db *pDb; |
drh | bb2d9b1 | 2018-06-06 16:28:40 +0000 | [diff] [blame] | 3888 | int iMeta = 0; |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3889 | |
drh | 1713afb | 2013-06-28 01:24:57 +0000 | [diff] [blame] | 3890 | assert( p->bIsReader ); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 3891 | assert( p->readOnly==0 || pOp->p2==0 ); |
drh | 1ca037f | 2020-10-12 13:24:00 +0000 | [diff] [blame] | 3892 | assert( pOp->p2>=0 && pOp->p2<=2 ); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 3893 | assert( pOp->p1>=0 && pOp->p1<db->nDb ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 3894 | assert( DbMaskTest(p->btreeMask, pOp->p1) ); |
drh | 8cb63f5 | 2021-10-29 09:59:06 +0000 | [diff] [blame] | 3895 | assert( rc==SQLITE_OK ); |
drh | 46c425b | 2021-11-10 10:59:10 +0000 | [diff] [blame] | 3896 | if( pOp->p2 && (db->flags & (SQLITE_QueryOnly|SQLITE_CorruptRdOnly))!=0 ){ |
| 3897 | if( db->flags & SQLITE_QueryOnly ){ |
| 3898 | /* Writes prohibited by the "PRAGMA query_only=TRUE" statement */ |
| 3899 | rc = SQLITE_READONLY; |
| 3900 | }else{ |
| 3901 | /* Writes prohibited due to a prior SQLITE_CORRUPT in the current |
| 3902 | ** transaction */ |
| 3903 | rc = SQLITE_CORRUPT; |
| 3904 | } |
drh | 13447bf | 2013-07-10 13:33:49 +0000 | [diff] [blame] | 3905 | goto abort_due_to_error; |
| 3906 | } |
drh | 8ee75f7 | 2022-04-03 10:42:06 +0000 | [diff] [blame] | 3907 | pDb = &db->aDb[pOp->p1]; |
| 3908 | pBt = pDb->pBt; |
danielk1977 | 1d850a7 | 2004-05-31 08:26:49 +0000 | [diff] [blame] | 3909 | |
danielk1977 | 24162fe | 2004-06-04 06:22:00 +0000 | [diff] [blame] | 3910 | if( pBt ){ |
drh | bb2d9b1 | 2018-06-06 16:28:40 +0000 | [diff] [blame] | 3911 | rc = sqlite3BtreeBeginTrans(pBt, pOp->p2, &iMeta); |
drh | cbd8db3 | 2015-08-20 17:18:32 +0000 | [diff] [blame] | 3912 | testcase( rc==SQLITE_BUSY_SNAPSHOT ); |
| 3913 | testcase( rc==SQLITE_BUSY_RECOVERY ); |
drh | 9e9f1bd | 2009-10-13 15:36:51 +0000 | [diff] [blame] | 3914 | if( rc!=SQLITE_OK ){ |
drh | fadd2b1 | 2016-09-19 23:39:34 +0000 | [diff] [blame] | 3915 | if( (rc&0xff)==SQLITE_BUSY ){ |
| 3916 | p->pc = (int)(pOp - aOp); |
| 3917 | p->rc = rc; |
| 3918 | goto vdbe_return; |
| 3919 | } |
danielk1977 | 24162fe | 2004-06-04 06:22:00 +0000 | [diff] [blame] | 3920 | goto abort_due_to_error; |
drh | 90bfcda | 2001-09-23 19:46:51 +0000 | [diff] [blame] | 3921 | } |
dan | e0af83a | 2009-09-08 19:15:01 +0000 | [diff] [blame] | 3922 | |
drh | 4d29448 | 2019-10-05 15:28:24 +0000 | [diff] [blame] | 3923 | if( p->usesStmtJournal |
| 3924 | && pOp->p2 |
dan | c0537fe | 2013-06-28 19:41:43 +0000 | [diff] [blame] | 3925 | && (db->autoCommit==0 || db->nVdbeRead>1) |
dan | e0af83a | 2009-09-08 19:15:01 +0000 | [diff] [blame] | 3926 | ){ |
drh | 99744fa | 2020-08-25 19:09:07 +0000 | [diff] [blame] | 3927 | assert( sqlite3BtreeTxnState(pBt)==SQLITE_TXN_WRITE ); |
dan | e0af83a | 2009-09-08 19:15:01 +0000 | [diff] [blame] | 3928 | if( p->iStatement==0 ){ |
| 3929 | assert( db->nStatement>=0 && db->nSavepoint>=0 ); |
| 3930 | db->nStatement++; |
| 3931 | p->iStatement = db->nSavepoint + db->nStatement; |
| 3932 | } |
dan | a311b80 | 2011-04-26 19:21:34 +0000 | [diff] [blame] | 3933 | |
drh | 346506f | 2011-05-25 01:16:42 +0000 | [diff] [blame] | 3934 | rc = sqlite3VtabSavepoint(db, SAVEPOINT_BEGIN, p->iStatement-1); |
dan | a311b80 | 2011-04-26 19:21:34 +0000 | [diff] [blame] | 3935 | if( rc==SQLITE_OK ){ |
| 3936 | rc = sqlite3BtreeBeginStmt(pBt, p->iStatement); |
| 3937 | } |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 3938 | |
| 3939 | /* Store the current value of the database handles deferred constraint |
| 3940 | ** counter. If the statement transaction needs to be rolled back, |
| 3941 | ** the value of this counter needs to be restored too. */ |
| 3942 | p->nStmtDefCons = db->nDeferredCons; |
dan | cb3e4b7 | 2013-07-03 19:53:05 +0000 | [diff] [blame] | 3943 | p->nStmtDefImmCons = db->nDeferredImmCons; |
dan | e0af83a | 2009-09-08 19:15:01 +0000 | [diff] [blame] | 3944 | } |
drh | 397776a | 2018-06-06 17:45:51 +0000 | [diff] [blame] | 3945 | } |
| 3946 | assert( pOp->p5==0 || pOp->p4type==P4_INT32 ); |
drh | e4e1af5 | 2021-10-29 16:19:03 +0000 | [diff] [blame] | 3947 | if( rc==SQLITE_OK |
| 3948 | && pOp->p5 |
drh | 8ee75f7 | 2022-04-03 10:42:06 +0000 | [diff] [blame] | 3949 | && (iMeta!=pOp->p3 || pDb->pSchema->iGeneration!=pOp->p4.i) |
drh | 397776a | 2018-06-06 17:45:51 +0000 | [diff] [blame] | 3950 | ){ |
dan | d2ffc97 | 2020-12-10 19:20:15 +0000 | [diff] [blame] | 3951 | /* |
| 3952 | ** IMPLEMENTATION-OF: R-03189-51135 As each SQL statement runs, the schema |
| 3953 | ** version is checked to ensure that the schema has not changed since the |
| 3954 | ** SQL statement was prepared. |
| 3955 | */ |
| 3956 | sqlite3DbFree(db, p->zErrMsg); |
| 3957 | p->zErrMsg = sqlite3DbStrDup(db, "database schema has changed"); |
drh | b22f7c8 | 2014-02-06 23:56:27 +0000 | [diff] [blame] | 3958 | /* If the schema-cookie from the database file matches the cookie |
| 3959 | ** stored with the in-memory representation of the schema, do |
| 3960 | ** not reload the schema from the database file. |
| 3961 | ** |
| 3962 | ** If virtual-tables are in use, this is not just an optimization. |
| 3963 | ** Often, v-tables store their data in other SQLite tables, which |
| 3964 | ** are queried from within xNext() and other v-table methods using |
| 3965 | ** prepared queries. If such a query is out-of-date, we do not want to |
| 3966 | ** discard the database schema, as the user code implementing the |
| 3967 | ** v-table would have to be ready for the sqlite3_vtab structure itself |
| 3968 | ** to be invalidated whenever sqlite3_step() is called from within |
| 3969 | ** a v-table method. |
| 3970 | */ |
| 3971 | if( db->aDb[pOp->p1].pSchema->schema_cookie!=iMeta ){ |
| 3972 | sqlite3ResetOneSchema(db, pOp->p1); |
| 3973 | } |
| 3974 | p->expired = 1; |
| 3975 | rc = SQLITE_SCHEMA; |
dan | 0a841a2 | 2022-06-08 18:20:36 +0000 | [diff] [blame] | 3976 | |
| 3977 | /* Set changeCntOn to 0 to prevent the value returned by sqlite3_changes() |
| 3978 | ** from being modified in sqlite3VdbeHalt(). If this statement is |
| 3979 | ** reprepared, changeCntOn will be set again. */ |
| 3980 | p->changeCntOn = 0; |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 3981 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 3982 | if( rc ) goto abort_due_to_error; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 3983 | break; |
| 3984 | } |
| 3985 | |
drh | b1fdb2a | 2008-01-05 04:06:03 +0000 | [diff] [blame] | 3986 | /* Opcode: ReadCookie P1 P2 P3 * * |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 3987 | ** |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 3988 | ** Read cookie number P3 from database P1 and write it into register P2. |
danielk1977 | 0d19f7a | 2009-06-03 11:25:07 +0000 | [diff] [blame] | 3989 | ** P3==1 is the schema version. P3==2 is the database format. |
| 3990 | ** P3==3 is the recommended pager cache size, and so forth. P1==0 is |
drh | 001bbcb | 2003-03-19 03:14:00 +0000 | [diff] [blame] | 3991 | ** the main database file and P1==1 is the database file used to store |
| 3992 | ** temporary tables. |
drh | 4a32431 | 2001-12-21 14:30:42 +0000 | [diff] [blame] | 3993 | ** |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 3994 | ** There must be a read-lock on the database (either a transaction |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 3995 | ** must be started or there must be an open cursor) before |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 3996 | ** executing this instruction. |
| 3997 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 3998 | case OP_ReadCookie: { /* out2 */ |
drh | f328bc8 | 2004-05-10 23:29:49 +0000 | [diff] [blame] | 3999 | int iMeta; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4000 | int iDb; |
| 4001 | int iCookie; |
danielk1977 | 180b56a | 2007-06-24 08:00:42 +0000 | [diff] [blame] | 4002 | |
drh | 1713afb | 2013-06-28 01:24:57 +0000 | [diff] [blame] | 4003 | assert( p->bIsReader ); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4004 | iDb = pOp->p1; |
| 4005 | iCookie = pOp->p3; |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 4006 | assert( pOp->p3<SQLITE_N_BTREE_META ); |
danielk1977 | 180b56a | 2007-06-24 08:00:42 +0000 | [diff] [blame] | 4007 | assert( iDb>=0 && iDb<db->nDb ); |
| 4008 | assert( db->aDb[iDb].pBt!=0 ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 4009 | assert( DbMaskTest(p->btreeMask, iDb) ); |
danielk1977 | 0d19f7a | 2009-06-03 11:25:07 +0000 | [diff] [blame] | 4010 | |
danielk1977 | 602b466 | 2009-07-02 07:47:33 +0000 | [diff] [blame] | 4011 | sqlite3BtreeGetMeta(db->aDb[iDb].pBt, iCookie, (u32 *)&iMeta); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 4012 | pOut = out2Prerelease(p, pOp); |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 4013 | pOut->u.i = iMeta; |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 4014 | break; |
| 4015 | } |
| 4016 | |
drh | e3863b5 | 2020-07-01 16:19:14 +0000 | [diff] [blame] | 4017 | /* Opcode: SetCookie P1 P2 P3 * P5 |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 4018 | ** |
drh | 1861afc | 2016-02-01 21:48:34 +0000 | [diff] [blame] | 4019 | ** Write the integer value P3 into cookie number P2 of database P1. |
| 4020 | ** P2==1 is the schema version. P2==2 is the database format. |
| 4021 | ** P2==3 is the recommended pager cache |
danielk1977 | 0d19f7a | 2009-06-03 11:25:07 +0000 | [diff] [blame] | 4022 | ** size, and so forth. P1==0 is the main database file and P1==1 is the |
| 4023 | ** database file used to store temporary tables. |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 4024 | ** |
| 4025 | ** A transaction must be started before executing this opcode. |
drh | e3863b5 | 2020-07-01 16:19:14 +0000 | [diff] [blame] | 4026 | ** |
| 4027 | ** If P2 is the SCHEMA_VERSION cookie (cookie number 1) then the internal |
| 4028 | ** schema version is set to P3-P5. The "PRAGMA schema_version=N" statement |
| 4029 | ** has P5 set to 1, so that the internal schema version will be different |
| 4030 | ** from the database schema version, resulting in a schema reset. |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 4031 | */ |
drh | 1861afc | 2016-02-01 21:48:34 +0000 | [diff] [blame] | 4032 | case OP_SetCookie: { |
drh | 3f7d4e4 | 2004-07-24 14:35:58 +0000 | [diff] [blame] | 4033 | Db *pDb; |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 4034 | |
| 4035 | sqlite3VdbeIncrWriteCounter(p, 0); |
drh | 4a32431 | 2001-12-21 14:30:42 +0000 | [diff] [blame] | 4036 | assert( pOp->p2<SQLITE_N_BTREE_META ); |
drh | 001bbcb | 2003-03-19 03:14:00 +0000 | [diff] [blame] | 4037 | assert( pOp->p1>=0 && pOp->p1<db->nDb ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 4038 | assert( DbMaskTest(p->btreeMask, pOp->p1) ); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 4039 | assert( p->readOnly==0 ); |
drh | 3f7d4e4 | 2004-07-24 14:35:58 +0000 | [diff] [blame] | 4040 | pDb = &db->aDb[pOp->p1]; |
| 4041 | assert( pDb->pBt!=0 ); |
drh | 2120608 | 2011-04-04 18:22:02 +0000 | [diff] [blame] | 4042 | assert( sqlite3SchemaMutexHeld(db, pOp->p1, 0) ); |
drh | a3b321d | 2004-05-11 09:31:31 +0000 | [diff] [blame] | 4043 | /* See note about index shifting on OP_ReadCookie */ |
drh | 1861afc | 2016-02-01 21:48:34 +0000 | [diff] [blame] | 4044 | rc = sqlite3BtreeUpdateMeta(pDb->pBt, pOp->p2, pOp->p3); |
danielk1977 | 0d19f7a | 2009-06-03 11:25:07 +0000 | [diff] [blame] | 4045 | if( pOp->p2==BTREE_SCHEMA_VERSION ){ |
drh | 3f7d4e4 | 2004-07-24 14:35:58 +0000 | [diff] [blame] | 4046 | /* When the schema cookie changes, record the new cookie internally */ |
drh | 86bc5e4 | 2022-06-24 12:56:48 +0000 | [diff] [blame] | 4047 | *(u32*)&pDb->pSchema->schema_cookie = *(u32*)&pOp->p3 - pOp->p5; |
drh | 8257aa8 | 2017-07-26 19:59:13 +0000 | [diff] [blame] | 4048 | db->mDbFlags |= DBFLAG_SchemaChange; |
drh | 44a5c02 | 2022-01-02 12:01:03 +0000 | [diff] [blame] | 4049 | sqlite3FkClearTriggerCache(db, pOp->p1); |
danielk1977 | 0d19f7a | 2009-06-03 11:25:07 +0000 | [diff] [blame] | 4050 | }else if( pOp->p2==BTREE_FILE_FORMAT ){ |
drh | d28bcb3 | 2005-12-21 14:43:11 +0000 | [diff] [blame] | 4051 | /* Record changes in the file format */ |
drh | 1861afc | 2016-02-01 21:48:34 +0000 | [diff] [blame] | 4052 | pDb->pSchema->file_format = pOp->p3; |
drh | 3f7d4e4 | 2004-07-24 14:35:58 +0000 | [diff] [blame] | 4053 | } |
drh | fd426c6 | 2006-01-30 15:34:22 +0000 | [diff] [blame] | 4054 | if( pOp->p1==1 ){ |
| 4055 | /* Invalidate all prepared statements whenever the TEMP database |
| 4056 | ** schema is changed. Ticket #1644 */ |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 4057 | sqlite3ExpirePreparedStatements(db, 0); |
dan | fa401de | 2009-10-16 14:55:03 +0000 | [diff] [blame] | 4058 | p->expired = 0; |
drh | fd426c6 | 2006-01-30 15:34:22 +0000 | [diff] [blame] | 4059 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 4060 | if( rc ) goto abort_due_to_error; |
drh | 50e5dad | 2001-09-15 00:57:28 +0000 | [diff] [blame] | 4061 | break; |
| 4062 | } |
| 4063 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 4064 | /* Opcode: OpenRead P1 P2 P3 P4 P5 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 4065 | ** Synopsis: root=P2 iDb=P3 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4066 | ** |
drh | ecdc753 | 2001-09-23 02:35:53 +0000 | [diff] [blame] | 4067 | ** Open a read-only cursor for the database table whose root page is |
danielk1977 | 207872a | 2008-01-03 07:54:23 +0000 | [diff] [blame] | 4068 | ** P2 in a database file. The database file is determined by P3. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 4069 | ** P3==0 means the main database, P3==1 means the database used for |
| 4070 | ** temporary tables, and P3>1 means used the corresponding attached |
| 4071 | ** database. Give the new cursor an identifier of P1. The P1 |
danielk1977 | 207872a | 2008-01-03 07:54:23 +0000 | [diff] [blame] | 4072 | ** values need not be contiguous but all P1 values should be small integers. |
| 4073 | ** It is an error for P1 to be negative. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4074 | ** |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4075 | ** Allowed P5 bits: |
| 4076 | ** <ul> |
| 4077 | ** <li> <b>0x02 OPFLAG_SEEKEQ</b>: This cursor will only be used for |
| 4078 | ** equality lookups (implemented as a pair of opcodes OP_SeekGE/OP_IdxGT |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4079 | ** of OP_SeekLE/OP_IdxLT) |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4080 | ** </ul> |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 4081 | ** |
danielk1977 | d336e22 | 2009-02-20 10:58:41 +0000 | [diff] [blame] | 4082 | ** The P4 value may be either an integer (P4_INT32) or a pointer to |
| 4083 | ** a KeyInfo structure (P4_KEYINFO). If it is a pointer to a KeyInfo |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4084 | ** object, then table being opened must be an [index b-tree] where the |
| 4085 | ** KeyInfo object defines the content and collating |
| 4086 | ** sequence of that index b-tree. Otherwise, if P4 is an integer |
| 4087 | ** value, then the table being opened must be a [table b-tree] with a |
| 4088 | ** number of columns no less than the value of P4. |
drh | f57b339 | 2001-10-08 13:22:32 +0000 | [diff] [blame] | 4089 | ** |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4090 | ** See also: OpenWrite, ReopenIdx |
| 4091 | */ |
| 4092 | /* Opcode: ReopenIdx P1 P2 P3 P4 P5 |
| 4093 | ** Synopsis: root=P2 iDb=P3 |
| 4094 | ** |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4095 | ** The ReopenIdx opcode works like OP_OpenRead except that it first |
| 4096 | ** checks to see if the cursor on P1 is already open on the same |
| 4097 | ** b-tree and if it is this opcode becomes a no-op. In other words, |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4098 | ** if the cursor is already open, do not reopen it. |
| 4099 | ** |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4100 | ** The ReopenIdx opcode may only be used with P5==0 or P5==OPFLAG_SEEKEQ |
| 4101 | ** and with P4 being a P4_KEYINFO object. Furthermore, the P3 value must |
| 4102 | ** be the same as every other ReopenIdx or OpenRead for the same cursor |
| 4103 | ** number. |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4104 | ** |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4105 | ** Allowed P5 bits: |
| 4106 | ** <ul> |
| 4107 | ** <li> <b>0x02 OPFLAG_SEEKEQ</b>: This cursor will only be used for |
| 4108 | ** equality lookups (implemented as a pair of opcodes OP_SeekGE/OP_IdxGT |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4109 | ** of OP_SeekLE/OP_IdxLT) |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4110 | ** </ul> |
| 4111 | ** |
| 4112 | ** See also: OP_OpenRead, OP_OpenWrite |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4113 | */ |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 4114 | /* Opcode: OpenWrite P1 P2 P3 P4 P5 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 4115 | ** Synopsis: root=P2 iDb=P3 |
drh | ecdc753 | 2001-09-23 02:35:53 +0000 | [diff] [blame] | 4116 | ** |
| 4117 | ** Open a read/write cursor named P1 on the table or index whose root |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4118 | ** page is P2 (or whose root page is held in register P2 if the |
| 4119 | ** OPFLAG_P2ISREG bit is set in P5 - see below). |
drh | ecdc753 | 2001-09-23 02:35:53 +0000 | [diff] [blame] | 4120 | ** |
danielk1977 | d336e22 | 2009-02-20 10:58:41 +0000 | [diff] [blame] | 4121 | ** The P4 value may be either an integer (P4_INT32) or a pointer to |
| 4122 | ** a KeyInfo structure (P4_KEYINFO). If it is a pointer to a KeyInfo |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4123 | ** object, then table being opened must be an [index b-tree] where the |
| 4124 | ** KeyInfo object defines the content and collating |
| 4125 | ** sequence of that index b-tree. Otherwise, if P4 is an integer |
| 4126 | ** value, then the table being opened must be a [table b-tree] with a |
| 4127 | ** number of columns no less than the value of P4. |
jplyon | 5a56422 | 2003-06-02 06:15:58 +0000 | [diff] [blame] | 4128 | ** |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4129 | ** Allowed P5 bits: |
| 4130 | ** <ul> |
| 4131 | ** <li> <b>0x02 OPFLAG_SEEKEQ</b>: This cursor will only be used for |
| 4132 | ** equality lookups (implemented as a pair of opcodes OP_SeekGE/OP_IdxGT |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4133 | ** of OP_SeekLE/OP_IdxLT) |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4134 | ** <li> <b>0x08 OPFLAG_FORDELETE</b>: This cursor is used only to seek |
| 4135 | ** and subsequently delete entries in an index btree. This is a |
| 4136 | ** hint to the storage engine that the storage engine is allowed to |
| 4137 | ** ignore. The hint is not used by the official SQLite b*tree storage |
| 4138 | ** engine, but is used by COMDB2. |
| 4139 | ** <li> <b>0x10 OPFLAG_P2ISREG</b>: Use the content of register P2 |
| 4140 | ** as the root page, not the value of P2 itself. |
| 4141 | ** </ul> |
drh | f57b339 | 2001-10-08 13:22:32 +0000 | [diff] [blame] | 4142 | ** |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4143 | ** This instruction works like OpenRead except that it opens the cursor |
| 4144 | ** in read/write mode. |
| 4145 | ** |
| 4146 | ** See also: OP_OpenRead, OP_ReopenIdx |
drh | ecdc753 | 2001-09-23 02:35:53 +0000 | [diff] [blame] | 4147 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4148 | case OP_ReopenIdx: { /* ncycle */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4149 | int nField; |
| 4150 | KeyInfo *pKeyInfo; |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 4151 | u32 p2; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4152 | int iDb; |
drh | f57b339 | 2001-10-08 13:22:32 +0000 | [diff] [blame] | 4153 | int wrFlag; |
| 4154 | Btree *pX; |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 4155 | VdbeCursor *pCur; |
drh | d946db0 | 2005-12-29 19:23:06 +0000 | [diff] [blame] | 4156 | Db *pDb; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4157 | |
drh | e0997b3 | 2015-03-20 14:57:50 +0000 | [diff] [blame] | 4158 | assert( pOp->p5==0 || pOp->p5==OPFLAG_SEEKEQ ); |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4159 | assert( pOp->p4type==P4_KEYINFO ); |
| 4160 | pCur = p->apCsr[pOp->p1]; |
drh | e8f2c9d | 2014-08-06 17:49:13 +0000 | [diff] [blame] | 4161 | if( pCur && pCur->pgnoRoot==(u32)pOp->p2 ){ |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4162 | assert( pCur->iDb==pOp->p3 ); /* Guaranteed by the code generator */ |
drh | 4422b3a | 2021-06-25 14:48:24 +0000 | [diff] [blame] | 4163 | assert( pCur->eCurType==CURTYPE_BTREE ); |
| 4164 | sqlite3BtreeClearCursor(pCur->uc.pCursor); |
drh | e0997b3 | 2015-03-20 14:57:50 +0000 | [diff] [blame] | 4165 | goto open_cursor_set_hints; |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4166 | } |
| 4167 | /* If the cursor is not currently open or is open on a different |
| 4168 | ** index, then fall through into OP_OpenRead to force a reopen */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4169 | case OP_OpenRead: /* ncycle */ |
drh | 1fa509a | 2015-03-20 16:34:49 +0000 | [diff] [blame] | 4170 | case OP_OpenWrite: |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4171 | |
drh | e0997b3 | 2015-03-20 14:57:50 +0000 | [diff] [blame] | 4172 | assert( pOp->opcode==OP_OpenWrite || pOp->p5==0 || pOp->p5==OPFLAG_SEEKEQ ); |
drh | 1713afb | 2013-06-28 01:24:57 +0000 | [diff] [blame] | 4173 | assert( p->bIsReader ); |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4174 | assert( pOp->opcode==OP_OpenRead || pOp->opcode==OP_ReopenIdx |
| 4175 | || p->readOnly==0 ); |
dan | 428c218 | 2012-08-06 18:50:11 +0000 | [diff] [blame] | 4176 | |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 4177 | if( p->expired==1 ){ |
drh | 47b7fc7 | 2014-11-11 01:33:57 +0000 | [diff] [blame] | 4178 | rc = SQLITE_ABORT_ROLLBACK; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 4179 | goto abort_due_to_error; |
dan | fa401de | 2009-10-16 14:55:03 +0000 | [diff] [blame] | 4180 | } |
| 4181 | |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4182 | nField = 0; |
| 4183 | pKeyInfo = 0; |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 4184 | p2 = (u32)pOp->p2; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4185 | iDb = pOp->p3; |
drh | 6810ce6 | 2004-01-31 19:22:56 +0000 | [diff] [blame] | 4186 | assert( iDb>=0 && iDb<db->nDb ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 4187 | assert( DbMaskTest(p->btreeMask, iDb) ); |
drh | d946db0 | 2005-12-29 19:23:06 +0000 | [diff] [blame] | 4188 | pDb = &db->aDb[iDb]; |
| 4189 | pX = pDb->pBt; |
drh | 6810ce6 | 2004-01-31 19:22:56 +0000 | [diff] [blame] | 4190 | assert( pX!=0 ); |
drh | d946db0 | 2005-12-29 19:23:06 +0000 | [diff] [blame] | 4191 | if( pOp->opcode==OP_OpenWrite ){ |
dan | fd261ec | 2015-10-22 20:54:33 +0000 | [diff] [blame] | 4192 | assert( OPFLAG_FORDELETE==BTREE_FORDELETE ); |
| 4193 | wrFlag = BTREE_WRCSR | (pOp->p5 & OPFLAG_FORDELETE); |
drh | 2120608 | 2011-04-04 18:22:02 +0000 | [diff] [blame] | 4194 | assert( sqlite3SchemaMutexHeld(db, iDb, 0) ); |
danielk1977 | da18423 | 2006-01-05 11:34:32 +0000 | [diff] [blame] | 4195 | if( pDb->pSchema->file_format < p->minWriteFileFormat ){ |
| 4196 | p->minWriteFileFormat = pDb->pSchema->file_format; |
drh | d946db0 | 2005-12-29 19:23:06 +0000 | [diff] [blame] | 4197 | } |
| 4198 | }else{ |
| 4199 | wrFlag = 0; |
| 4200 | } |
dan | 428c218 | 2012-08-06 18:50:11 +0000 | [diff] [blame] | 4201 | if( pOp->p5 & OPFLAG_P2ISREG ){ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 4202 | assert( p2>0 ); |
mistachkin | cec5f1d | 2020-08-04 16:11:37 +0000 | [diff] [blame] | 4203 | assert( p2<=(u32)(p->nMem+1 - p->nCursor) ); |
drh | 8e9deb6 | 2018-06-05 13:43:02 +0000 | [diff] [blame] | 4204 | assert( pOp->opcode==OP_OpenWrite ); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 4205 | pIn2 = &aMem[p2]; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 4206 | assert( memIsValid(pIn2) ); |
| 4207 | assert( (pIn2->flags & MEM_Int)!=0 ); |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 4208 | sqlite3VdbeMemIntegerify(pIn2); |
drh | 9c1905f | 2008-12-10 22:32:56 +0000 | [diff] [blame] | 4209 | p2 = (int)pIn2->u.i; |
drh | 0f3f766 | 2017-08-18 14:34:28 +0000 | [diff] [blame] | 4210 | /* The p2 value always comes from a prior OP_CreateBtree opcode and |
drh | 9a65f2c | 2009-06-22 19:05:40 +0000 | [diff] [blame] | 4211 | ** that opcode will always set the p2 value to 2 or more or else fail. |
| 4212 | ** If there were a failure, the prepared statement would have halted |
| 4213 | ** before reaching this instruction. */ |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 4214 | assert( p2>=2 ); |
drh | 5edc312 | 2001-09-13 21:53:09 +0000 | [diff] [blame] | 4215 | } |
danielk1977 | d336e22 | 2009-02-20 10:58:41 +0000 | [diff] [blame] | 4216 | if( pOp->p4type==P4_KEYINFO ){ |
| 4217 | pKeyInfo = pOp->p4.pKeyInfo; |
drh | 41e13e1 | 2013-11-07 14:09:39 +0000 | [diff] [blame] | 4218 | assert( pKeyInfo->enc==ENC(db) ); |
| 4219 | assert( pKeyInfo->db==db ); |
drh | a485ad1 | 2017-08-02 22:43:14 +0000 | [diff] [blame] | 4220 | nField = pKeyInfo->nAllField; |
danielk1977 | d336e22 | 2009-02-20 10:58:41 +0000 | [diff] [blame] | 4221 | }else if( pOp->p4type==P4_INT32 ){ |
| 4222 | nField = pOp->p4.i; |
| 4223 | } |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 4224 | assert( pOp->p1>=0 ); |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 4225 | assert( nField>=0 ); |
| 4226 | testcase( nField==0 ); /* Table with INTEGER PRIMARY KEY and nothing else */ |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4227 | pCur = allocateCursor(p, pOp->p1, nField, CURTYPE_BTREE); |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 4228 | if( pCur==0 ) goto no_mem; |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4229 | pCur->iDb = iDb; |
drh | f328bc8 | 2004-05-10 23:29:49 +0000 | [diff] [blame] | 4230 | pCur->nullRow = 1; |
drh | d4187c7 | 2010-08-30 22:15:45 +0000 | [diff] [blame] | 4231 | pCur->isOrdered = 1; |
drh | 3526319 | 2014-07-22 20:02:19 +0000 | [diff] [blame] | 4232 | pCur->pgnoRoot = p2; |
drh | b89aeb6 | 2016-01-27 15:49:32 +0000 | [diff] [blame] | 4233 | #ifdef SQLITE_DEBUG |
| 4234 | pCur->wrFlag = wrFlag; |
| 4235 | #endif |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4236 | rc = sqlite3BtreeCursor(pX, p2, wrFlag, pKeyInfo, pCur->uc.pCursor); |
danielk1977 | d336e22 | 2009-02-20 10:58:41 +0000 | [diff] [blame] | 4237 | pCur->pKeyInfo = pKeyInfo; |
drh | 14da87f | 2013-11-20 21:51:33 +0000 | [diff] [blame] | 4238 | /* Set the VdbeCursor.isTable variable. Previous versions of |
danielk1977 | 172114a | 2009-07-07 15:47:12 +0000 | [diff] [blame] | 4239 | ** SQLite used to check if the root-page flags were sane at this point |
| 4240 | ** and report database corruption if they were not, but this check has |
| 4241 | ** since moved into the btree layer. */ |
| 4242 | pCur->isTable = pOp->p4type!=P4_KEYINFO; |
drh | e0997b3 | 2015-03-20 14:57:50 +0000 | [diff] [blame] | 4243 | |
| 4244 | open_cursor_set_hints: |
| 4245 | assert( OPFLAG_BULKCSR==BTREE_BULKLOAD ); |
| 4246 | assert( OPFLAG_SEEKEQ==BTREE_SEEK_EQ ); |
drh | 0403cb3 | 2015-08-14 23:57:04 +0000 | [diff] [blame] | 4247 | testcase( pOp->p5 & OPFLAG_BULKCSR ); |
drh | 0403cb3 | 2015-08-14 23:57:04 +0000 | [diff] [blame] | 4248 | testcase( pOp->p2 & OPFLAG_SEEKEQ ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4249 | sqlite3BtreeCursorHintFlags(pCur->uc.pCursor, |
drh | f7854c7 | 2015-10-27 13:24:37 +0000 | [diff] [blame] | 4250 | (pOp->p5 & (OPFLAG_BULKCSR|OPFLAG_SEEKEQ))); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 4251 | if( rc ) goto abort_due_to_error; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4252 | break; |
| 4253 | } |
| 4254 | |
drh | e08e8d6 | 2017-05-01 15:15:41 +0000 | [diff] [blame] | 4255 | /* Opcode: OpenDup P1 P2 * * * |
| 4256 | ** |
| 4257 | ** Open a new cursor P1 that points to the same ephemeral table as |
| 4258 | ** cursor P2. The P2 cursor must have been opened by a prior OP_OpenEphemeral |
| 4259 | ** opcode. Only ephemeral cursors may be duplicated. |
| 4260 | ** |
| 4261 | ** Duplicate ephemeral cursors are used for self-joins of materialized views. |
| 4262 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4263 | case OP_OpenDup: { /* ncycle */ |
drh | e08e8d6 | 2017-05-01 15:15:41 +0000 | [diff] [blame] | 4264 | VdbeCursor *pOrig; /* The original cursor to be duplicated */ |
| 4265 | VdbeCursor *pCx; /* The new cursor */ |
| 4266 | |
| 4267 | pOrig = p->apCsr[pOp->p2]; |
dan | 2811ea6 | 2019-12-23 14:20:46 +0000 | [diff] [blame] | 4268 | assert( pOrig ); |
drh | 5a4a15f | 2021-03-18 15:42:59 +0000 | [diff] [blame] | 4269 | assert( pOrig->isEphemeral ); /* Only ephemeral cursors can be duplicated */ |
drh | e08e8d6 | 2017-05-01 15:15:41 +0000 | [diff] [blame] | 4270 | |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4271 | pCx = allocateCursor(p, pOp->p1, pOrig->nField, CURTYPE_BTREE); |
drh | e08e8d6 | 2017-05-01 15:15:41 +0000 | [diff] [blame] | 4272 | if( pCx==0 ) goto no_mem; |
| 4273 | pCx->nullRow = 1; |
| 4274 | pCx->isEphemeral = 1; |
| 4275 | pCx->pKeyInfo = pOrig->pKeyInfo; |
| 4276 | pCx->isTable = pOrig->isTable; |
drh | 2c04131 | 2018-12-24 02:34:49 +0000 | [diff] [blame] | 4277 | pCx->pgnoRoot = pOrig->pgnoRoot; |
dan | a0f6b83 | 2019-03-14 16:36:20 +0000 | [diff] [blame] | 4278 | pCx->isOrdered = pOrig->isOrdered; |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4279 | pCx->ub.pBtx = pOrig->ub.pBtx; |
drh | 27a242c | 2022-06-14 22:21:23 +0000 | [diff] [blame] | 4280 | pCx->noReuse = 1; |
| 4281 | pOrig->noReuse = 1; |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4282 | rc = sqlite3BtreeCursor(pCx->ub.pBtx, pCx->pgnoRoot, BTREE_WRCSR, |
drh | e08e8d6 | 2017-05-01 15:15:41 +0000 | [diff] [blame] | 4283 | pCx->pKeyInfo, pCx->uc.pCursor); |
drh | 3f4df4c | 2017-05-02 17:54:19 +0000 | [diff] [blame] | 4284 | /* The sqlite3BtreeCursor() routine can only fail for the first cursor |
| 4285 | ** opened for a database. Since there is already an open cursor when this |
| 4286 | ** opcode is run, the sqlite3BtreeCursor() cannot fail */ |
| 4287 | assert( rc==SQLITE_OK ); |
drh | e08e8d6 | 2017-05-01 15:15:41 +0000 | [diff] [blame] | 4288 | break; |
| 4289 | } |
| 4290 | |
| 4291 | |
drh | 32881be | 2020-11-17 21:26:13 +0000 | [diff] [blame] | 4292 | /* Opcode: OpenEphemeral P1 P2 P3 P4 P5 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 4293 | ** Synopsis: nColumn=P2 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4294 | ** |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 4295 | ** Open a new cursor P1 to a transient table. |
drh | 9170dd7 | 2005-07-08 17:13:46 +0000 | [diff] [blame] | 4296 | ** The cursor is always opened read/write even if |
drh | 25d3adb | 2010-04-05 15:11:08 +0000 | [diff] [blame] | 4297 | ** the main database is read-only. The ephemeral |
drh | 9170dd7 | 2005-07-08 17:13:46 +0000 | [diff] [blame] | 4298 | ** table is deleted automatically when the cursor is closed. |
drh | c6b52df | 2002-01-04 03:09:29 +0000 | [diff] [blame] | 4299 | ** |
drh | dfe3b58 | 2019-01-04 12:35:50 +0000 | [diff] [blame] | 4300 | ** If the cursor P1 is already opened on an ephemeral table, the table |
drh | 4afdfa1 | 2018-12-31 16:36:42 +0000 | [diff] [blame] | 4301 | ** is cleared (all content is erased). |
| 4302 | ** |
drh | 25d3adb | 2010-04-05 15:11:08 +0000 | [diff] [blame] | 4303 | ** P2 is the number of columns in the ephemeral table. |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 4304 | ** The cursor points to a BTree table if P4==0 and to a BTree index |
| 4305 | ** if P4 is not 0. If P4 is not NULL, it points to a KeyInfo structure |
drh | d3d39e9 | 2004-05-20 22:16:29 +0000 | [diff] [blame] | 4306 | ** that defines the format of keys in the index. |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 4307 | ** |
drh | 2a5d990 | 2011-08-26 00:34:45 +0000 | [diff] [blame] | 4308 | ** The P5 parameter can be a mask of the BTREE_* flags defined |
| 4309 | ** in btree.h. These flags control aspects of the operation of |
| 4310 | ** the btree. The BTREE_OMIT_JOURNAL and BTREE_SINGLE flags are |
| 4311 | ** added automatically. |
drh | 32881be | 2020-11-17 21:26:13 +0000 | [diff] [blame] | 4312 | ** |
| 4313 | ** If P3 is positive, then reg[P3] is modified slightly so that it |
| 4314 | ** can be used as zero-length data for OP_Insert. This is an optimization |
| 4315 | ** that avoids an extra OP_Blob opcode to initialize that register. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4316 | */ |
drh | a21a64d | 2010-04-06 22:33:55 +0000 | [diff] [blame] | 4317 | /* Opcode: OpenAutoindex P1 P2 * P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 4318 | ** Synopsis: nColumn=P2 |
drh | a21a64d | 2010-04-06 22:33:55 +0000 | [diff] [blame] | 4319 | ** |
| 4320 | ** This opcode works the same as OP_OpenEphemeral. It has a |
| 4321 | ** different name to distinguish its use. Tables created using |
| 4322 | ** by this opcode will be used for automatically created transient |
| 4323 | ** indices in joins. |
| 4324 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4325 | case OP_OpenAutoindex: /* ncycle */ |
| 4326 | case OP_OpenEphemeral: { /* ncycle */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 4327 | VdbeCursor *pCx; |
drh | 41e13e1 | 2013-11-07 14:09:39 +0000 | [diff] [blame] | 4328 | KeyInfo *pKeyInfo; |
| 4329 | |
drh | d4187c7 | 2010-08-30 22:15:45 +0000 | [diff] [blame] | 4330 | static const int vfsFlags = |
drh | 33f4e02 | 2007-09-03 15:19:34 +0000 | [diff] [blame] | 4331 | SQLITE_OPEN_READWRITE | |
| 4332 | SQLITE_OPEN_CREATE | |
| 4333 | SQLITE_OPEN_EXCLUSIVE | |
| 4334 | SQLITE_OPEN_DELETEONCLOSE | |
| 4335 | SQLITE_OPEN_TRANSIENT_DB; |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 4336 | assert( pOp->p1>=0 ); |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 4337 | assert( pOp->p2>=0 ); |
drh | 32881be | 2020-11-17 21:26:13 +0000 | [diff] [blame] | 4338 | if( pOp->p3>0 ){ |
| 4339 | /* Make register reg[P3] into a value that can be used as the data |
| 4340 | ** form sqlite3BtreeInsert() where the length of the data is zero. */ |
| 4341 | assert( pOp->p2==0 ); /* Only used when number of columns is zero */ |
| 4342 | assert( pOp->opcode==OP_OpenEphemeral ); |
| 4343 | assert( aMem[pOp->p3].flags & MEM_Null ); |
| 4344 | aMem[pOp->p3].n = 0; |
| 4345 | aMem[pOp->p3].z = ""; |
| 4346 | } |
drh | 4afdfa1 | 2018-12-31 16:36:42 +0000 | [diff] [blame] | 4347 | pCx = p->apCsr[pOp->p1]; |
drh | 27a242c | 2022-06-14 22:21:23 +0000 | [diff] [blame] | 4348 | if( pCx && !pCx->noReuse && ALWAYS(pOp->p2<=pCx->nField) ){ |
drh | 5a4a15f | 2021-03-18 15:42:59 +0000 | [diff] [blame] | 4349 | /* If the ephermeral table is already open and has no duplicates from |
| 4350 | ** OP_OpenDup, then erase all existing content so that the table is |
| 4351 | ** empty again, rather than creating a new table. */ |
dan | a512972 | 2019-05-03 18:50:24 +0000 | [diff] [blame] | 4352 | assert( pCx->isEphemeral ); |
dan | 855b5d1 | 2019-06-26 21:04:30 +0000 | [diff] [blame] | 4353 | pCx->seqCount = 0; |
| 4354 | pCx->cacheStatus = CACHE_STALE; |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4355 | rc = sqlite3BtreeClearTable(pCx->ub.pBtx, pCx->pgnoRoot, 0); |
drh | d0fb796 | 2018-12-31 17:58:05 +0000 | [diff] [blame] | 4356 | }else{ |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4357 | pCx = allocateCursor(p, pOp->p1, pOp->p2, CURTYPE_BTREE); |
drh | d0fb796 | 2018-12-31 17:58:05 +0000 | [diff] [blame] | 4358 | if( pCx==0 ) goto no_mem; |
drh | d0fb796 | 2018-12-31 17:58:05 +0000 | [diff] [blame] | 4359 | pCx->isEphemeral = 1; |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4360 | rc = sqlite3BtreeOpen(db->pVfs, 0, db, &pCx->ub.pBtx, |
drh | d0fb796 | 2018-12-31 17:58:05 +0000 | [diff] [blame] | 4361 | BTREE_OMIT_JOURNAL | BTREE_SINGLE | pOp->p5, |
| 4362 | vfsFlags); |
| 4363 | if( rc==SQLITE_OK ){ |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4364 | rc = sqlite3BtreeBeginTrans(pCx->ub.pBtx, 1, 0); |
dan | eeee8a5 | 2021-03-18 14:31:37 +0000 | [diff] [blame] | 4365 | if( rc==SQLITE_OK ){ |
| 4366 | /* If a transient index is required, create it by calling |
| 4367 | ** sqlite3BtreeCreateTable() with the BTREE_BLOBKEY flag before |
| 4368 | ** opening it. If a transient table is required, just use the |
| 4369 | ** automatically created table with root-page 1 (an BLOB_INTKEY table). |
| 4370 | */ |
| 4371 | if( (pCx->pKeyInfo = pKeyInfo = pOp->p4.pKeyInfo)!=0 ){ |
| 4372 | assert( pOp->p4type==P4_KEYINFO ); |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4373 | rc = sqlite3BtreeCreateTable(pCx->ub.pBtx, &pCx->pgnoRoot, |
dan | eeee8a5 | 2021-03-18 14:31:37 +0000 | [diff] [blame] | 4374 | BTREE_BLOBKEY | pOp->p5); |
| 4375 | if( rc==SQLITE_OK ){ |
| 4376 | assert( pCx->pgnoRoot==SCHEMA_ROOT+1 ); |
| 4377 | assert( pKeyInfo->db==db ); |
| 4378 | assert( pKeyInfo->enc==ENC(db) ); |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4379 | rc = sqlite3BtreeCursor(pCx->ub.pBtx, pCx->pgnoRoot, BTREE_WRCSR, |
dan | eeee8a5 | 2021-03-18 14:31:37 +0000 | [diff] [blame] | 4380 | pKeyInfo, pCx->uc.pCursor); |
| 4381 | } |
| 4382 | pCx->isTable = 0; |
| 4383 | }else{ |
| 4384 | pCx->pgnoRoot = SCHEMA_ROOT; |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4385 | rc = sqlite3BtreeCursor(pCx->ub.pBtx, SCHEMA_ROOT, BTREE_WRCSR, |
dan | eeee8a5 | 2021-03-18 14:31:37 +0000 | [diff] [blame] | 4386 | 0, pCx->uc.pCursor); |
| 4387 | pCx->isTable = 1; |
drh | d0fb796 | 2018-12-31 17:58:05 +0000 | [diff] [blame] | 4388 | } |
dan | eeee8a5 | 2021-03-18 14:31:37 +0000 | [diff] [blame] | 4389 | } |
| 4390 | pCx->isOrdered = (pOp->p5!=BTREE_UNORDERED); |
| 4391 | if( rc ){ |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4392 | sqlite3BtreeClose(pCx->ub.pBtx); |
drh | d0fb796 | 2018-12-31 17:58:05 +0000 | [diff] [blame] | 4393 | } |
| 4394 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4395 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 4396 | if( rc ) goto abort_due_to_error; |
dan | 855b5d1 | 2019-06-26 21:04:30 +0000 | [diff] [blame] | 4397 | pCx->nullRow = 1; |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 4398 | break; |
| 4399 | } |
| 4400 | |
dan | fad9f9a | 2014-04-01 18:41:51 +0000 | [diff] [blame] | 4401 | /* Opcode: SorterOpen P1 P2 P3 P4 * |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 4402 | ** |
| 4403 | ** This opcode works like OP_OpenEphemeral except that it opens |
| 4404 | ** a transient index that is specifically designed to sort large |
| 4405 | ** tables using an external merge-sort algorithm. |
dan | fad9f9a | 2014-04-01 18:41:51 +0000 | [diff] [blame] | 4406 | ** |
| 4407 | ** If argument P3 is non-zero, then it indicates that the sorter may |
| 4408 | ** assume that a stable sort considering the first P3 fields of each |
| 4409 | ** key is sufficient to produce the required results. |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 4410 | */ |
drh | ca892a7 | 2011-09-03 00:17:51 +0000 | [diff] [blame] | 4411 | case OP_SorterOpen: { |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 4412 | VdbeCursor *pCx; |
drh | 3a94987 | 2012-09-18 13:20:13 +0000 | [diff] [blame] | 4413 | |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 4414 | assert( pOp->p1>=0 ); |
| 4415 | assert( pOp->p2>=0 ); |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4416 | pCx = allocateCursor(p, pOp->p1, pOp->p2, CURTYPE_SORTER); |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 4417 | if( pCx==0 ) goto no_mem; |
| 4418 | pCx->pKeyInfo = pOp->p4.pKeyInfo; |
drh | 41e13e1 | 2013-11-07 14:09:39 +0000 | [diff] [blame] | 4419 | assert( pCx->pKeyInfo->db==db ); |
| 4420 | assert( pCx->pKeyInfo->enc==ENC(db) ); |
dan | fad9f9a | 2014-04-01 18:41:51 +0000 | [diff] [blame] | 4421 | rc = sqlite3VdbeSorterInit(db, pOp->p3, pCx); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 4422 | if( rc ) goto abort_due_to_error; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4423 | break; |
| 4424 | } |
| 4425 | |
dan | 78d5843 | 2014-03-25 15:04:07 +0000 | [diff] [blame] | 4426 | /* Opcode: SequenceTest P1 P2 * * * |
| 4427 | ** Synopsis: if( cursor[P1].ctr++ ) pc = P2 |
| 4428 | ** |
| 4429 | ** P1 is a sorter cursor. If the sequence counter is currently zero, jump |
| 4430 | ** to P2. Regardless of whether or not the jump is taken, increment the |
| 4431 | ** the sequence value. |
| 4432 | */ |
| 4433 | case OP_SequenceTest: { |
| 4434 | VdbeCursor *pC; |
| 4435 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 4436 | pC = p->apCsr[pOp->p1]; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4437 | assert( isSorter(pC) ); |
dan | 78d5843 | 2014-03-25 15:04:07 +0000 | [diff] [blame] | 4438 | if( (pC->seqCount++)==0 ){ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 4439 | goto jump_to_p2; |
dan | 78d5843 | 2014-03-25 15:04:07 +0000 | [diff] [blame] | 4440 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4441 | break; |
| 4442 | } |
| 4443 | |
drh | 5f61229 | 2014-02-08 23:20:32 +0000 | [diff] [blame] | 4444 | /* Opcode: OpenPseudo P1 P2 P3 * * |
drh | 60830e3 | 2014-02-10 15:56:34 +0000 | [diff] [blame] | 4445 | ** Synopsis: P3 columns in r[P2] |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 4446 | ** |
| 4447 | ** Open a new cursor that points to a fake table that contains a single |
drh | 5f61229 | 2014-02-08 23:20:32 +0000 | [diff] [blame] | 4448 | ** row of data. The content of that one row is the content of memory |
| 4449 | ** register P2. In other words, cursor P1 becomes an alias for the |
| 4450 | ** MEM_Blob content contained in register P2. |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 4451 | ** |
drh | 2d8d7ce | 2010-02-15 15:17:05 +0000 | [diff] [blame] | 4452 | ** A pseudo-table created by this opcode is used to hold a single |
drh | cdd536f | 2006-03-17 00:04:03 +0000 | [diff] [blame] | 4453 | ** row output from the sorter so that the row can be decomposed into |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 4454 | ** individual columns using the OP_Column opcode. The OP_Column opcode |
| 4455 | ** is the only cursor opcode that works with a pseudo-table. |
danielk1977 | d336e22 | 2009-02-20 10:58:41 +0000 | [diff] [blame] | 4456 | ** |
| 4457 | ** P3 is the number of fields in the records that will be stored by |
| 4458 | ** the pseudo-table. |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 4459 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 4460 | case OP_OpenPseudo: { |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 4461 | VdbeCursor *pCx; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 4462 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 4463 | assert( pOp->p1>=0 ); |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 4464 | assert( pOp->p3>=0 ); |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 4465 | pCx = allocateCursor(p, pOp->p1, pOp->p3, CURTYPE_PSEUDO); |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 4466 | if( pCx==0 ) goto no_mem; |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 4467 | pCx->nullRow = 1; |
drh | fe0cf7a | 2017-08-16 19:20:20 +0000 | [diff] [blame] | 4468 | pCx->seekResult = pOp->p2; |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 4469 | pCx->isTable = 1; |
drh | fe0cf7a | 2017-08-16 19:20:20 +0000 | [diff] [blame] | 4470 | /* Give this pseudo-cursor a fake BtCursor pointer so that pCx |
| 4471 | ** can be safely passed to sqlite3VdbeCursorMoveto(). This avoids a test |
| 4472 | ** for pCx->eCurType==CURTYPE_BTREE inside of sqlite3VdbeCursorMoveto() |
| 4473 | ** which is a performance optimization */ |
| 4474 | pCx->uc.pCursor = sqlite3BtreeFakeValidCursor(); |
drh | 5f61229 | 2014-02-08 23:20:32 +0000 | [diff] [blame] | 4475 | assert( pOp->p5==0 ); |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 4476 | break; |
| 4477 | } |
| 4478 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 4479 | /* Opcode: Close P1 * * * * |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4480 | ** |
| 4481 | ** Close a cursor previously opened as P1. If P1 is not |
| 4482 | ** currently open, this instruction is a no-op. |
| 4483 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4484 | case OP_Close: { /* ncycle */ |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 4485 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 4486 | sqlite3VdbeFreeCursor(p, p->apCsr[pOp->p1]); |
| 4487 | p->apCsr[pOp->p1] = 0; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4488 | break; |
| 4489 | } |
| 4490 | |
drh | 97bae79 | 2015-06-05 15:59:57 +0000 | [diff] [blame] | 4491 | #ifdef SQLITE_ENABLE_COLUMN_USED_MASK |
| 4492 | /* Opcode: ColumnsUsed P1 * * P4 * |
| 4493 | ** |
| 4494 | ** This opcode (which only exists if SQLite was compiled with |
| 4495 | ** SQLITE_ENABLE_COLUMN_USED_MASK) identifies which columns of the |
| 4496 | ** table or index for cursor P1 are used. P4 is a 64-bit integer |
| 4497 | ** (P4_INT64) in which the first 63 bits are one for each of the |
| 4498 | ** first 63 columns of the table or index that are actually used |
| 4499 | ** by the cursor. The high-order bit is set if any column after |
| 4500 | ** the 64th is used. |
| 4501 | */ |
| 4502 | case OP_ColumnsUsed: { |
| 4503 | VdbeCursor *pC; |
| 4504 | pC = p->apCsr[pOp->p1]; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4505 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | 97bae79 | 2015-06-05 15:59:57 +0000 | [diff] [blame] | 4506 | pC->maskUsed = *(u64*)pOp->p4.pI64; |
| 4507 | break; |
| 4508 | } |
| 4509 | #endif |
| 4510 | |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4511 | /* Opcode: SeekGE P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 4512 | ** Synopsis: key=r[P3@P4] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4513 | ** |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4514 | ** If cursor P1 refers to an SQL table (B-Tree that uses integer keys), |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 4515 | ** use the value in register P3 as the key. If cursor P1 refers |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4516 | ** to an SQL index, then P3 is the first in an array of P4 registers |
| 4517 | ** that are used as an unpacked index key. |
| 4518 | ** |
| 4519 | ** Reposition cursor P1 so that it points to the smallest entry that |
| 4520 | ** is greater than or equal to the key value. If there are no records |
| 4521 | ** greater than or equal to the key and P2 is not zero, then jump to P2. |
drh | 7cf6e4d | 2004-05-19 14:56:55 +0000 | [diff] [blame] | 4522 | ** |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4523 | ** If the cursor P1 was opened using the OPFLAG_SEEKEQ flag, then this |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4524 | ** opcode will either land on a record that exactly matches the key, or |
| 4525 | ** else it will cause a jump to P2. When the cursor is OPFLAG_SEEKEQ, |
| 4526 | ** this opcode must be followed by an IdxLE opcode with the same arguments. |
| 4527 | ** The IdxGT opcode will be skipped if this opcode succeeds, but the |
| 4528 | ** IdxGT opcode will be used on subsequent loop iterations. The |
| 4529 | ** OPFLAG_SEEKEQ flags is a hint to the btree layer to say that this |
| 4530 | ** is an equality search. |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4531 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4532 | ** This opcode leaves the cursor configured to move in forward order, |
drh | bc5cf38 | 2014-08-06 01:08:07 +0000 | [diff] [blame] | 4533 | ** from the beginning toward the end. In other words, the cursor is |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 4534 | ** configured to use Next, not Prev. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4535 | ** |
drh | 935850e | 2014-05-24 17:15:15 +0000 | [diff] [blame] | 4536 | ** See also: Found, NotFound, SeekLt, SeekGt, SeekLe |
drh | 7cf6e4d | 2004-05-19 14:56:55 +0000 | [diff] [blame] | 4537 | */ |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4538 | /* Opcode: SeekGT P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 4539 | ** Synopsis: key=r[P3@P4] |
drh | 7cf6e4d | 2004-05-19 14:56:55 +0000 | [diff] [blame] | 4540 | ** |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4541 | ** If cursor P1 refers to an SQL table (B-Tree that uses integer keys), |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 4542 | ** use the value in register P3 as a key. If cursor P1 refers |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4543 | ** to an SQL index, then P3 is the first in an array of P4 registers |
| 4544 | ** that are used as an unpacked index key. |
| 4545 | ** |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4546 | ** Reposition cursor P1 so that it points to the smallest entry that |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4547 | ** is greater than the key value. If there are no records greater than |
| 4548 | ** the key and P2 is not zero, then jump to P2. |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 4549 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4550 | ** This opcode leaves the cursor configured to move in forward order, |
drh | 4ed2fb9 | 2014-08-14 13:06:25 +0000 | [diff] [blame] | 4551 | ** from the beginning toward the end. In other words, the cursor is |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 4552 | ** configured to use Next, not Prev. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4553 | ** |
drh | 935850e | 2014-05-24 17:15:15 +0000 | [diff] [blame] | 4554 | ** See also: Found, NotFound, SeekLt, SeekGe, SeekLe |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4555 | */ |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4556 | /* Opcode: SeekLT P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 4557 | ** Synopsis: key=r[P3@P4] |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 4558 | ** |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4559 | ** If cursor P1 refers to an SQL table (B-Tree that uses integer keys), |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 4560 | ** use the value in register P3 as a key. If cursor P1 refers |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4561 | ** to an SQL index, then P3 is the first in an array of P4 registers |
| 4562 | ** that are used as an unpacked index key. |
| 4563 | ** |
| 4564 | ** Reposition cursor P1 so that it points to the largest entry that |
| 4565 | ** is less than the key value. If there are no records less than |
| 4566 | ** the key and P2 is not zero, then jump to P2. |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 4567 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4568 | ** This opcode leaves the cursor configured to move in reverse order, |
| 4569 | ** from the end toward the beginning. In other words, the cursor is |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 4570 | ** configured to use Prev, not Next. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4571 | ** |
drh | 935850e | 2014-05-24 17:15:15 +0000 | [diff] [blame] | 4572 | ** See also: Found, NotFound, SeekGt, SeekGe, SeekLe |
drh | 7cf6e4d | 2004-05-19 14:56:55 +0000 | [diff] [blame] | 4573 | */ |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4574 | /* Opcode: SeekLE P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 4575 | ** Synopsis: key=r[P3@P4] |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 4576 | ** |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4577 | ** If cursor P1 refers to an SQL table (B-Tree that uses integer keys), |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 4578 | ** use the value in register P3 as a key. If cursor P1 refers |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4579 | ** to an SQL index, then P3 is the first in an array of P4 registers |
| 4580 | ** that are used as an unpacked index key. |
danielk1977 | 751de56 | 2008-04-18 09:01:15 +0000 | [diff] [blame] | 4581 | ** |
danielk1977 | b790c6c | 2008-04-18 10:25:24 +0000 | [diff] [blame] | 4582 | ** Reposition cursor P1 so that it points to the largest entry that |
| 4583 | ** is less than or equal to the key value. If there are no records |
| 4584 | ** less than or equal to the key and P2 is not zero, then jump to P2. |
drh | 7cf6e4d | 2004-05-19 14:56:55 +0000 | [diff] [blame] | 4585 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4586 | ** This opcode leaves the cursor configured to move in reverse order, |
| 4587 | ** from the end toward the beginning. In other words, the cursor is |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 4588 | ** configured to use Prev, not Next. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4589 | ** |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4590 | ** If the cursor P1 was opened using the OPFLAG_SEEKEQ flag, then this |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4591 | ** opcode will either land on a record that exactly matches the key, or |
| 4592 | ** else it will cause a jump to P2. When the cursor is OPFLAG_SEEKEQ, |
| 4593 | ** this opcode must be followed by an IdxLE opcode with the same arguments. |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4594 | ** The IdxGE opcode will be skipped if this opcode succeeds, but the |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4595 | ** IdxGE opcode will be used on subsequent loop iterations. The |
| 4596 | ** OPFLAG_SEEKEQ flags is a hint to the btree layer to say that this |
| 4597 | ** is an equality search. |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4598 | ** |
drh | 935850e | 2014-05-24 17:15:15 +0000 | [diff] [blame] | 4599 | ** See also: Found, NotFound, SeekGt, SeekGe, SeekLt |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 4600 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4601 | case OP_SeekLT: /* jump, in3, group, ncycle */ |
| 4602 | case OP_SeekLE: /* jump, in3, group, ncycle */ |
| 4603 | case OP_SeekGE: /* jump, in3, group, ncycle */ |
| 4604 | case OP_SeekGT: { /* jump, in3, group, ncycle */ |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4605 | int res; /* Comparison result */ |
| 4606 | int oc; /* Opcode */ |
| 4607 | VdbeCursor *pC; /* The cursor to seek */ |
| 4608 | UnpackedRecord r; /* The key to seek for */ |
| 4609 | int nField; /* Number of columns or fields in the key */ |
| 4610 | i64 iKey; /* The rowid we are to seek to */ |
drh | d6b7946 | 2015-11-07 01:19:00 +0000 | [diff] [blame] | 4611 | int eqOnly; /* Only interested in == results */ |
drh | 80ff32f | 2001-11-04 18:32:46 +0000 | [diff] [blame] | 4612 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 4613 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 4614 | assert( pOp->p2!=0 ); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 4615 | pC = p->apCsr[pOp->p1]; |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 4616 | assert( pC!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4617 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 4618 | assert( OP_SeekLE == OP_SeekLT+1 ); |
| 4619 | assert( OP_SeekGE == OP_SeekLT+2 ); |
| 4620 | assert( OP_SeekGT == OP_SeekLT+3 ); |
drh | d4187c7 | 2010-08-30 22:15:45 +0000 | [diff] [blame] | 4621 | assert( pC->isOrdered ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4622 | assert( pC->uc.pCursor!=0 ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4623 | oc = pOp->opcode; |
drh | d6b7946 | 2015-11-07 01:19:00 +0000 | [diff] [blame] | 4624 | eqOnly = 0; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4625 | pC->nullRow = 0; |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 4626 | #ifdef SQLITE_DEBUG |
| 4627 | pC->seekOp = pOp->opcode; |
| 4628 | #endif |
drh | e0997b3 | 2015-03-20 14:57:50 +0000 | [diff] [blame] | 4629 | |
dan | a40cb96 | 2019-05-14 20:25:22 +0000 | [diff] [blame] | 4630 | pC->deferredMoveto = 0; |
| 4631 | pC->cacheStatus = CACHE_STALE; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4632 | if( pC->isTable ){ |
drh | 3e36480 | 2019-08-22 00:53:16 +0000 | [diff] [blame] | 4633 | u16 flags3, newType; |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4634 | /* The OPFLAG_SEEKEQ/BTREE_SEEK_EQ flag is only set on index cursors */ |
drh | 218c66e | 2016-12-27 12:35:36 +0000 | [diff] [blame] | 4635 | assert( sqlite3BtreeCursorHasHint(pC->uc.pCursor, BTREE_SEEK_EQ)==0 |
| 4636 | || CORRUPT_DB ); |
drh | d6b7946 | 2015-11-07 01:19:00 +0000 | [diff] [blame] | 4637 | |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4638 | /* The input value in P3 might be of any type: integer, real, string, |
| 4639 | ** blob, or NULL. But it needs to be an integer before we can do |
peter.d.reid | 60ec914 | 2014-09-06 16:39:46 +0000 | [diff] [blame] | 4640 | ** the seek, so convert it. */ |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4641 | pIn3 = &aMem[pOp->p3]; |
drh | 3e36480 | 2019-08-22 00:53:16 +0000 | [diff] [blame] | 4642 | flags3 = pIn3->flags; |
| 4643 | if( (flags3 & (MEM_Int|MEM_Real|MEM_IntReal|MEM_Str))==MEM_Str ){ |
drh | bd9507c | 2014-08-23 17:21:37 +0000 | [diff] [blame] | 4644 | applyNumericAffinity(pIn3, 0); |
| 4645 | } |
drh | 3e36480 | 2019-08-22 00:53:16 +0000 | [diff] [blame] | 4646 | iKey = sqlite3VdbeIntValue(pIn3); /* Get the integer key value */ |
| 4647 | newType = pIn3->flags; /* Record the type after applying numeric affinity */ |
| 4648 | pIn3->flags = flags3; /* But convert the type back to its original */ |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 4649 | |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4650 | /* If the P3 value could not be converted into an integer without |
| 4651 | ** loss of information, then special processing is required... */ |
drh | 3e36480 | 2019-08-22 00:53:16 +0000 | [diff] [blame] | 4652 | if( (newType & (MEM_Int|MEM_IntReal))==0 ){ |
drh | de32461 | 2021-07-19 20:52:31 +0000 | [diff] [blame] | 4653 | int c; |
drh | 3e36480 | 2019-08-22 00:53:16 +0000 | [diff] [blame] | 4654 | if( (newType & MEM_Real)==0 ){ |
| 4655 | if( (newType & MEM_Null) || oc>=OP_SeekGE ){ |
drh | 8616cff | 2019-07-13 16:15:23 +0000 | [diff] [blame] | 4656 | VdbeBranchTaken(1,2); |
| 4657 | goto jump_to_p2; |
dan | 9edd8c1 | 2019-05-08 11:42:49 +0000 | [diff] [blame] | 4658 | }else{ |
dan | 873b019 | 2019-05-09 11:19:27 +0000 | [diff] [blame] | 4659 | rc = sqlite3BtreeLast(pC->uc.pCursor, &res); |
| 4660 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
dan | 9edd8c1 | 2019-05-08 11:42:49 +0000 | [diff] [blame] | 4661 | goto seek_not_found; |
| 4662 | } |
drh | de32461 | 2021-07-19 20:52:31 +0000 | [diff] [blame] | 4663 | } |
| 4664 | c = sqlite3IntFloatCompare(iKey, pIn3->u.r); |
drh | 959403f | 2008-12-12 17:56:16 +0000 | [diff] [blame] | 4665 | |
dan | aa1776f | 2013-11-26 18:22:59 +0000 | [diff] [blame] | 4666 | /* If the approximation iKey is larger than the actual real search |
| 4667 | ** term, substitute >= for > and < for <=. e.g. if the search term |
| 4668 | ** is 4.9 and the integer approximation 5: |
| 4669 | ** |
| 4670 | ** (x > 4.9) -> (x >= 5) |
| 4671 | ** (x <= 4.9) -> (x < 5) |
| 4672 | */ |
drh | de32461 | 2021-07-19 20:52:31 +0000 | [diff] [blame] | 4673 | if( c>0 ){ |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 4674 | assert( OP_SeekGE==(OP_SeekGT-1) ); |
| 4675 | assert( OP_SeekLT==(OP_SeekLE-1) ); |
| 4676 | assert( (OP_SeekLE & 0x0001)==(OP_SeekGT & 0x0001) ); |
| 4677 | if( (oc & 0x0001)==(OP_SeekGT & 0x0001) ) oc--; |
dan | aa1776f | 2013-11-26 18:22:59 +0000 | [diff] [blame] | 4678 | } |
| 4679 | |
| 4680 | /* If the approximation iKey is smaller than the actual real search |
| 4681 | ** term, substitute <= for < and > for >=. */ |
drh | de32461 | 2021-07-19 20:52:31 +0000 | [diff] [blame] | 4682 | else if( c<0 ){ |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 4683 | assert( OP_SeekLE==(OP_SeekLT+1) ); |
| 4684 | assert( OP_SeekGT==(OP_SeekGE+1) ); |
| 4685 | assert( (OP_SeekLT & 0x0001)==(OP_SeekGE & 0x0001) ); |
| 4686 | if( (oc & 0x0001)==(OP_SeekLT & 0x0001) ) oc++; |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 4687 | } |
dan | 9edd8c1 | 2019-05-08 11:42:49 +0000 | [diff] [blame] | 4688 | } |
drh | 42a410d | 2021-06-19 18:32:20 +0000 | [diff] [blame] | 4689 | rc = sqlite3BtreeTableMoveto(pC->uc.pCursor, (u64)iKey, 0, &res); |
drh | b53a5a9 | 2014-10-12 22:37:22 +0000 | [diff] [blame] | 4690 | pC->movetoTarget = iKey; /* Used by OP_Delete */ |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4691 | if( rc!=SQLITE_OK ){ |
| 4692 | goto abort_due_to_error; |
drh | 1af3fdb | 2004-07-18 21:33:01 +0000 | [diff] [blame] | 4693 | } |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 4694 | }else{ |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4695 | /* For a cursor with the OPFLAG_SEEKEQ/BTREE_SEEK_EQ hint, only the |
| 4696 | ** OP_SeekGE and OP_SeekLE opcodes are allowed, and these must be |
| 4697 | ** immediately followed by an OP_IdxGT or OP_IdxLT opcode, respectively, |
| 4698 | ** with the same key. |
drh | d6b7946 | 2015-11-07 01:19:00 +0000 | [diff] [blame] | 4699 | */ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4700 | if( sqlite3BtreeCursorHasHint(pC->uc.pCursor, BTREE_SEEK_EQ) ){ |
drh | d6b7946 | 2015-11-07 01:19:00 +0000 | [diff] [blame] | 4701 | eqOnly = 1; |
| 4702 | assert( pOp->opcode==OP_SeekGE || pOp->opcode==OP_SeekLE ); |
| 4703 | assert( pOp[1].opcode==OP_IdxLT || pOp[1].opcode==OP_IdxGT ); |
drh | 576d0a9 | 2020-03-12 17:28:27 +0000 | [diff] [blame] | 4704 | assert( pOp->opcode==OP_SeekGE || pOp[1].opcode==OP_IdxLT ); |
| 4705 | assert( pOp->opcode==OP_SeekLE || pOp[1].opcode==OP_IdxGT ); |
drh | d6b7946 | 2015-11-07 01:19:00 +0000 | [diff] [blame] | 4706 | assert( pOp[1].p1==pOp[0].p1 ); |
| 4707 | assert( pOp[1].p2==pOp[0].p2 ); |
| 4708 | assert( pOp[1].p3==pOp[0].p3 ); |
| 4709 | assert( pOp[1].p4.i==pOp[0].p4.i ); |
| 4710 | } |
| 4711 | |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4712 | nField = pOp->p4.i; |
| 4713 | assert( pOp->p4type==P4_INT32 ); |
| 4714 | assert( nField>0 ); |
| 4715 | r.pKeyInfo = pC->pKeyInfo; |
| 4716 | r.nField = (u16)nField; |
| 4717 | |
| 4718 | /* The next line of code computes as follows, only faster: |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 4719 | ** if( oc==OP_SeekGT || oc==OP_SeekLE ){ |
dan | 1fed5da | 2014-02-25 21:01:25 +0000 | [diff] [blame] | 4720 | ** r.default_rc = -1; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4721 | ** }else{ |
dan | 1fed5da | 2014-02-25 21:01:25 +0000 | [diff] [blame] | 4722 | ** r.default_rc = +1; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4723 | ** } |
danielk1977 | f7b9d66 | 2008-06-23 18:49:43 +0000 | [diff] [blame] | 4724 | */ |
dan | 1fed5da | 2014-02-25 21:01:25 +0000 | [diff] [blame] | 4725 | r.default_rc = ((1 & (oc - OP_SeekLT)) ? -1 : +1); |
| 4726 | assert( oc!=OP_SeekGT || r.default_rc==-1 ); |
| 4727 | assert( oc!=OP_SeekLE || r.default_rc==-1 ); |
| 4728 | assert( oc!=OP_SeekGE || r.default_rc==+1 ); |
| 4729 | assert( oc!=OP_SeekLT || r.default_rc==+1 ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4730 | |
| 4731 | r.aMem = &aMem[pOp->p3]; |
| 4732 | #ifdef SQLITE_DEBUG |
drh | 8a2254f | 2022-10-07 15:55:35 +0000 | [diff] [blame] | 4733 | { |
| 4734 | int i; |
| 4735 | for(i=0; i<r.nField; i++){ |
| 4736 | assert( memIsValid(&r.aMem[i]) ); |
| 4737 | if( i>0 ) REGISTER_TRACE(pOp->p3+i, &r.aMem[i]); |
| 4738 | } |
| 4739 | } |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4740 | #endif |
drh | 70528d7 | 2015-11-05 20:25:09 +0000 | [diff] [blame] | 4741 | r.eqSeen = 0; |
drh | 42a410d | 2021-06-19 18:32:20 +0000 | [diff] [blame] | 4742 | rc = sqlite3BtreeIndexMoveto(pC->uc.pCursor, &r, &res); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4743 | if( rc!=SQLITE_OK ){ |
| 4744 | goto abort_due_to_error; |
| 4745 | } |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4746 | if( eqOnly && r.eqSeen==0 ){ |
| 4747 | assert( res!=0 ); |
| 4748 | goto seek_not_found; |
drh | 70528d7 | 2015-11-05 20:25:09 +0000 | [diff] [blame] | 4749 | } |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4750 | } |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4751 | #ifdef SQLITE_TEST |
| 4752 | sqlite3_search_count++; |
| 4753 | #endif |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 4754 | if( oc>=OP_SeekGE ){ assert( oc==OP_SeekGE || oc==OP_SeekGT ); |
| 4755 | if( res<0 || (res==0 && oc==OP_SeekGT) ){ |
drh | e39a732 | 2014-02-03 14:04:11 +0000 | [diff] [blame] | 4756 | res = 0; |
drh | 2ab792e | 2017-05-30 18:34:07 +0000 | [diff] [blame] | 4757 | rc = sqlite3BtreeNext(pC->uc.pCursor, 0); |
| 4758 | if( rc!=SQLITE_OK ){ |
| 4759 | if( rc==SQLITE_DONE ){ |
| 4760 | rc = SQLITE_OK; |
| 4761 | res = 1; |
| 4762 | }else{ |
| 4763 | goto abort_due_to_error; |
| 4764 | } |
| 4765 | } |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4766 | }else{ |
| 4767 | res = 0; |
| 4768 | } |
| 4769 | }else{ |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 4770 | assert( oc==OP_SeekLT || oc==OP_SeekLE ); |
| 4771 | if( res>0 || (res==0 && oc==OP_SeekLT) ){ |
drh | e39a732 | 2014-02-03 14:04:11 +0000 | [diff] [blame] | 4772 | res = 0; |
drh | 2ab792e | 2017-05-30 18:34:07 +0000 | [diff] [blame] | 4773 | rc = sqlite3BtreePrevious(pC->uc.pCursor, 0); |
| 4774 | if( rc!=SQLITE_OK ){ |
| 4775 | if( rc==SQLITE_DONE ){ |
| 4776 | rc = SQLITE_OK; |
| 4777 | res = 1; |
| 4778 | }else{ |
| 4779 | goto abort_due_to_error; |
| 4780 | } |
| 4781 | } |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4782 | }else{ |
| 4783 | /* res might be negative because the table is empty. Check to |
| 4784 | ** see if this is the case. |
| 4785 | */ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 4786 | res = sqlite3BtreeEof(pC->uc.pCursor); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4787 | } |
| 4788 | } |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4789 | seek_not_found: |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4790 | assert( pOp->p2>0 ); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 4791 | VdbeBranchTaken(res!=0,2); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 4792 | if( res ){ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 4793 | goto jump_to_p2; |
drh | b1d607d | 2015-11-05 22:30:54 +0000 | [diff] [blame] | 4794 | }else if( eqOnly ){ |
| 4795 | assert( pOp[1].opcode==OP_IdxLT || pOp[1].opcode==OP_IdxGT ); |
| 4796 | pOp++; /* Skip the OP_IdxLt or OP_IdxGT that follows */ |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4797 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 4798 | break; |
| 4799 | } |
dan | 71c57db | 2016-07-09 20:23:55 +0000 | [diff] [blame] | 4800 | |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4801 | |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4802 | /* Opcode: SeekScan P1 P2 * * P5 |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4803 | ** Synopsis: Scan-ahead up to P1 rows |
| 4804 | ** |
drh | dfbaae7 | 2020-09-29 17:29:11 +0000 | [diff] [blame] | 4805 | ** This opcode is a prefix opcode to OP_SeekGE. In other words, this |
drh | 04e70ce | 2020-10-02 11:55:07 +0000 | [diff] [blame] | 4806 | ** opcode must be immediately followed by OP_SeekGE. This constraint is |
drh | dfbaae7 | 2020-09-29 17:29:11 +0000 | [diff] [blame] | 4807 | ** checked by assert() statements. |
| 4808 | ** |
| 4809 | ** This opcode uses the P1 through P4 operands of the subsequent |
| 4810 | ** OP_SeekGE. In the text that follows, the operands of the subsequent |
| 4811 | ** OP_SeekGE opcode are denoted as SeekOP.P1 through SeekOP.P4. Only |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4812 | ** the P1, P2 and P5 operands of this opcode are also used, and are called |
| 4813 | ** This.P1, This.P2 and This.P5. |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4814 | ** |
| 4815 | ** This opcode helps to optimize IN operators on a multi-column index |
drh | dfbaae7 | 2020-09-29 17:29:11 +0000 | [diff] [blame] | 4816 | ** where the IN operator is on the later terms of the index by avoiding |
| 4817 | ** unnecessary seeks on the btree, substituting steps to the next row |
| 4818 | ** of the b-tree instead. A correct answer is obtained if this opcode |
| 4819 | ** is omitted or is a no-op. |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4820 | ** |
drh | dfbaae7 | 2020-09-29 17:29:11 +0000 | [diff] [blame] | 4821 | ** The SeekGE.P3 and SeekGE.P4 operands identify an unpacked key which |
| 4822 | ** is the desired entry that we want the cursor SeekGE.P1 to be pointing |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4823 | ** to. Call this SeekGE.P3/P4 row the "target". |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4824 | ** |
drh | a54e1b1 | 2020-09-29 23:52:25 +0000 | [diff] [blame] | 4825 | ** If the SeekGE.P1 cursor is not currently pointing to a valid row, |
| 4826 | ** then this opcode is a no-op and control passes through into the OP_SeekGE. |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4827 | ** |
drh | dfbaae7 | 2020-09-29 17:29:11 +0000 | [diff] [blame] | 4828 | ** If the SeekGE.P1 cursor is pointing to a valid row, then that row |
| 4829 | ** might be the target row, or it might be near and slightly before the |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4830 | ** target row, or it might be after the target row. If the cursor is |
| 4831 | ** currently before the target row, then this opcode attempts to position |
| 4832 | ** the cursor on or after the target row by invoking sqlite3BtreeStep() |
| 4833 | ** on the cursor between 1 and This.P1 times. |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4834 | ** |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4835 | ** The This.P5 parameter is a flag that indicates what to do if the |
| 4836 | ** cursor ends up pointing at a valid row that is past the target |
| 4837 | ** row. If This.P5 is false (0) then a jump is made to SeekGE.P2. If |
| 4838 | ** This.P5 is true (non-zero) then a jump is made to This.P2. The P5==0 |
| 4839 | ** case occurs when there are no inequality constraints to the right of |
| 4840 | ** the IN constraing. The jump to SeekGE.P2 ends the loop. The P5!=0 case |
| 4841 | ** occurs when there are inequality constraints to the right of the IN |
| 4842 | ** operator. In that case, the This.P2 will point either directly to or |
| 4843 | ** to setup code prior to the OP_IdxGT or OP_IdxGE opcode that checks for |
| 4844 | ** loop terminate. |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4845 | ** |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4846 | ** Possible outcomes from this opcode:<ol> |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4847 | ** |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4848 | ** <li> If the cursor is initally not pointed to any valid row, then |
| 4849 | ** fall through into the subsequent OP_SeekGE opcode. |
drh | dfbaae7 | 2020-09-29 17:29:11 +0000 | [diff] [blame] | 4850 | ** |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4851 | ** <li> If the cursor is left pointing to a row that is before the target |
| 4852 | ** row, even after making as many as This.P1 calls to |
| 4853 | ** sqlite3BtreeNext(), then also fall through into OP_SeekGE. |
| 4854 | ** |
| 4855 | ** <li> If the cursor is left pointing at the target row, either because it |
| 4856 | ** was at the target row to begin with or because one or more |
| 4857 | ** sqlite3BtreeNext() calls moved the cursor to the target row, |
| 4858 | ** then jump to This.P2.., |
| 4859 | ** |
| 4860 | ** <li> If the cursor started out before the target row and a call to |
| 4861 | ** to sqlite3BtreeNext() moved the cursor off the end of the index |
| 4862 | ** (indicating that the target row definitely does not exist in the |
| 4863 | ** btree) then jump to SeekGE.P2, ending the loop. |
| 4864 | ** |
| 4865 | ** <li> If the cursor ends up on a valid row that is past the target row |
| 4866 | ** (indicating that the target row does not exist in the btree) then |
| 4867 | ** jump to SeekOP.P2 if This.P5==0 or to This.P2 if This.P5>0. |
drh | dfbaae7 | 2020-09-29 17:29:11 +0000 | [diff] [blame] | 4868 | ** </ol> |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4869 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4870 | case OP_SeekScan: { /* ncycle */ |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4871 | VdbeCursor *pC; |
| 4872 | int res; |
drh | deaa610 | 2020-10-01 15:46:21 +0000 | [diff] [blame] | 4873 | int nStep; |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4874 | UnpackedRecord r; |
| 4875 | |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4876 | assert( pOp[1].opcode==OP_SeekGE ); |
drh | 04e70ce | 2020-10-02 11:55:07 +0000 | [diff] [blame] | 4877 | |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4878 | /* If pOp->p5 is clear, then pOp->p2 points to the first instruction past the |
| 4879 | ** OP_IdxGT that follows the OP_SeekGE. Otherwise, it points to the first |
| 4880 | ** opcode past the OP_SeekGE itself. */ |
drh | 04e70ce | 2020-10-02 11:55:07 +0000 | [diff] [blame] | 4881 | assert( pOp->p2>=(int)(pOp-aOp)+2 ); |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4882 | #ifdef SQLITE_DEBUG |
| 4883 | if( pOp->p5==0 ){ |
| 4884 | /* There are no inequality constraints following the IN constraint. */ |
| 4885 | assert( pOp[1].p1==aOp[pOp->p2-1].p1 ); |
| 4886 | assert( pOp[1].p2==aOp[pOp->p2-1].p2 ); |
| 4887 | assert( pOp[1].p3==aOp[pOp->p2-1].p3 ); |
| 4888 | assert( aOp[pOp->p2-1].opcode==OP_IdxGT |
| 4889 | || aOp[pOp->p2-1].opcode==OP_IdxGE ); |
| 4890 | testcase( aOp[pOp->p2-1].opcode==OP_IdxGE ); |
| 4891 | }else{ |
| 4892 | /* There are inequality constraints. */ |
| 4893 | assert( pOp->p2==(int)(pOp-aOp)+2 ); |
| 4894 | assert( aOp[pOp->p2-1].opcode==OP_SeekGE ); |
| 4895 | } |
| 4896 | #endif |
drh | 04e70ce | 2020-10-02 11:55:07 +0000 | [diff] [blame] | 4897 | |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4898 | assert( pOp->p1>0 ); |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4899 | pC = p->apCsr[pOp[1].p1]; |
| 4900 | assert( pC!=0 ); |
| 4901 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 4902 | assert( !pC->isTable ); |
drh | a54e1b1 | 2020-09-29 23:52:25 +0000 | [diff] [blame] | 4903 | if( !sqlite3BtreeCursorIsValidNN(pC->uc.pCursor) ){ |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4904 | #ifdef SQLITE_DEBUG |
| 4905 | if( db->flags&SQLITE_VdbeTrace ){ |
drh | a54e1b1 | 2020-09-29 23:52:25 +0000 | [diff] [blame] | 4906 | printf("... cursor not valid - fall through\n"); |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4907 | } |
| 4908 | #endif |
| 4909 | break; |
| 4910 | } |
drh | deaa610 | 2020-10-01 15:46:21 +0000 | [diff] [blame] | 4911 | nStep = pOp->p1; |
| 4912 | assert( nStep>=1 ); |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4913 | r.pKeyInfo = pC->pKeyInfo; |
| 4914 | r.nField = (u16)pOp[1].p4.i; |
| 4915 | r.default_rc = 0; |
| 4916 | r.aMem = &aMem[pOp[1].p3]; |
| 4917 | #ifdef SQLITE_DEBUG |
| 4918 | { |
| 4919 | int i; |
| 4920 | for(i=0; i<r.nField; i++){ |
| 4921 | assert( memIsValid(&r.aMem[i]) ); |
| 4922 | REGISTER_TRACE(pOp[1].p3+i, &aMem[pOp[1].p3+i]); |
| 4923 | } |
| 4924 | } |
| 4925 | #endif |
| 4926 | res = 0; /* Not needed. Only used to silence a warning. */ |
| 4927 | while(1){ |
| 4928 | rc = sqlite3VdbeIdxKeyCompare(db, pC, &r, &res); |
| 4929 | if( rc ) goto abort_due_to_error; |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4930 | if( res>0 && pOp->p5==0 ){ |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4931 | seekscan_search_fail: |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4932 | /* Jump to SeekGE.P2, ending the loop */ |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4933 | #ifdef SQLITE_DEBUG |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4934 | if( db->flags&SQLITE_VdbeTrace ){ |
drh | deaa610 | 2020-10-01 15:46:21 +0000 | [diff] [blame] | 4935 | printf("... %d steps and then skip\n", pOp->p1 - nStep); |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4936 | } |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4937 | #endif |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4938 | VdbeBranchTaken(1,3); |
drh | f287d00 | 2020-09-30 00:10:22 +0000 | [diff] [blame] | 4939 | pOp++; |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4940 | goto jump_to_p2; |
| 4941 | } |
dan | 73c586b | 2022-10-07 18:57:15 +0000 | [diff] [blame] | 4942 | if( res>=0 ){ |
| 4943 | /* Jump to This.P2, bypassing the OP_SeekGE opcode */ |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4944 | #ifdef SQLITE_DEBUG |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4945 | if( db->flags&SQLITE_VdbeTrace ){ |
drh | deaa610 | 2020-10-01 15:46:21 +0000 | [diff] [blame] | 4946 | printf("... %d steps and then success\n", pOp->p1 - nStep); |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4947 | } |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4948 | #endif |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4949 | VdbeBranchTaken(2,3); |
drh | 04e70ce | 2020-10-02 11:55:07 +0000 | [diff] [blame] | 4950 | goto jump_to_p2; |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4951 | break; |
| 4952 | } |
drh | deaa610 | 2020-10-01 15:46:21 +0000 | [diff] [blame] | 4953 | if( nStep<=0 ){ |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4954 | #ifdef SQLITE_DEBUG |
| 4955 | if( db->flags&SQLITE_VdbeTrace ){ |
| 4956 | printf("... fall through after %d steps\n", pOp->p1); |
| 4957 | } |
| 4958 | #endif |
| 4959 | VdbeBranchTaken(0,3); |
| 4960 | break; |
| 4961 | } |
drh | deaa610 | 2020-10-01 15:46:21 +0000 | [diff] [blame] | 4962 | nStep--; |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4963 | rc = sqlite3BtreeNext(pC->uc.pCursor, 0); |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4964 | if( rc ){ |
| 4965 | if( rc==SQLITE_DONE ){ |
| 4966 | rc = SQLITE_OK; |
| 4967 | goto seekscan_search_fail; |
| 4968 | }else{ |
| 4969 | goto abort_due_to_error; |
| 4970 | } |
| 4971 | } |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4972 | } |
drh | 0b2949c | 2020-09-29 20:22:19 +0000 | [diff] [blame] | 4973 | |
drh | f761d93 | 2020-09-29 01:48:46 +0000 | [diff] [blame] | 4974 | break; |
drh | 68cf0ac | 2020-09-28 19:51:54 +0000 | [diff] [blame] | 4975 | } |
| 4976 | |
| 4977 | |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 4978 | /* Opcode: SeekHit P1 P2 P3 * * |
| 4979 | ** Synopsis: set P2<=seekHit<=P3 |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 4980 | ** |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 4981 | ** Increase or decrease the seekHit value for cursor P1, if necessary, |
| 4982 | ** so that it is no less than P2 and no greater than P3. |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 4983 | ** |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 4984 | ** The seekHit integer represents the maximum of terms in an index for which |
| 4985 | ** there is known to be at least one match. If the seekHit value is smaller |
| 4986 | ** than the total number of equality terms in an index lookup, then the |
| 4987 | ** OP_IfNoHope opcode might run to see if the IN loop can be abandoned |
| 4988 | ** early, thus saving work. This is part of the IN-early-out optimization. |
| 4989 | ** |
| 4990 | ** P1 must be a valid b-tree cursor. |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 4991 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 4992 | case OP_SeekHit: { /* ncycle */ |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 4993 | VdbeCursor *pC; |
| 4994 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 4995 | pC = p->apCsr[pOp->p1]; |
| 4996 | assert( pC!=0 ); |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 4997 | assert( pOp->p3>=pOp->p2 ); |
| 4998 | if( pC->seekHit<pOp->p2 ){ |
drh | 7bfccfe | 2021-04-29 13:58:28 +0000 | [diff] [blame] | 4999 | #ifdef SQLITE_DEBUG |
| 5000 | if( db->flags&SQLITE_VdbeTrace ){ |
| 5001 | printf("seekHit changes from %d to %d\n", pC->seekHit, pOp->p2); |
| 5002 | } |
| 5003 | #endif |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 5004 | pC->seekHit = pOp->p2; |
| 5005 | }else if( pC->seekHit>pOp->p3 ){ |
drh | 7bfccfe | 2021-04-29 13:58:28 +0000 | [diff] [blame] | 5006 | #ifdef SQLITE_DEBUG |
| 5007 | if( db->flags&SQLITE_VdbeTrace ){ |
| 5008 | printf("seekHit changes from %d to %d\n", pC->seekHit, pOp->p3); |
| 5009 | } |
| 5010 | #endif |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 5011 | pC->seekHit = pOp->p3; |
| 5012 | } |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5013 | break; |
| 5014 | } |
| 5015 | |
dan | 74ebaad | 2020-01-04 16:55:57 +0000 | [diff] [blame] | 5016 | /* Opcode: IfNotOpen P1 P2 * * * |
| 5017 | ** Synopsis: if( !csr[P1] ) goto P2 |
| 5018 | ** |
drh | 8b9a3d1 | 2022-09-20 19:22:17 +0000 | [diff] [blame] | 5019 | ** If cursor P1 is not open or if P1 is set to a NULL row using the |
| 5020 | ** OP_NullRow opcode, then jump to instruction P2. Otherwise, fall through. |
dan | 74ebaad | 2020-01-04 16:55:57 +0000 | [diff] [blame] | 5021 | */ |
| 5022 | case OP_IfNotOpen: { /* jump */ |
drh | 8b9a3d1 | 2022-09-20 19:22:17 +0000 | [diff] [blame] | 5023 | VdbeCursor *pCur; |
| 5024 | |
dan | 74ebaad | 2020-01-04 16:55:57 +0000 | [diff] [blame] | 5025 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 8b9a3d1 | 2022-09-20 19:22:17 +0000 | [diff] [blame] | 5026 | pCur = p->apCsr[pOp->p1]; |
| 5027 | VdbeBranchTaken(pCur==0 || pCur->nullRow, 2); |
| 5028 | if( pCur==0 || pCur->nullRow ){ |
dan | 74ebaad | 2020-01-04 16:55:57 +0000 | [diff] [blame] | 5029 | goto jump_to_p2_and_check_for_interrupt; |
| 5030 | } |
| 5031 | break; |
| 5032 | } |
| 5033 | |
drh | 8cff69d | 2009-11-12 19:59:44 +0000 | [diff] [blame] | 5034 | /* Opcode: Found P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 5035 | ** Synopsis: key=r[P3@P4] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5036 | ** |
drh | 8cff69d | 2009-11-12 19:59:44 +0000 | [diff] [blame] | 5037 | ** If P4==0 then register P3 holds a blob constructed by MakeRecord. If |
| 5038 | ** P4>0 then register P3 is the first of P4 registers that form an unpacked |
| 5039 | ** record. |
| 5040 | ** |
| 5041 | ** Cursor P1 is on an index btree. If the record identified by P3 and P4 |
| 5042 | ** is a prefix of any entry in P1 then a jump is made to P2 and |
drh | e3365e6 | 2009-11-12 17:52:24 +0000 | [diff] [blame] | 5043 | ** P1 is left pointing at the matching entry. |
drh | 6f225d0 | 2013-10-26 13:36:51 +0000 | [diff] [blame] | 5044 | ** |
drh | cefc87f | 2014-08-01 01:40:33 +0000 | [diff] [blame] | 5045 | ** This operation leaves the cursor in a state where it can be |
| 5046 | ** advanced in the forward direction. The Next instruction will work, |
| 5047 | ** but not the Prev instruction. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5048 | ** |
drh | 6f225d0 | 2013-10-26 13:36:51 +0000 | [diff] [blame] | 5049 | ** See also: NotFound, NoConflict, NotExists. SeekGe |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5050 | */ |
drh | 8cff69d | 2009-11-12 19:59:44 +0000 | [diff] [blame] | 5051 | /* Opcode: NotFound P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 5052 | ** Synopsis: key=r[P3@P4] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5053 | ** |
drh | 8cff69d | 2009-11-12 19:59:44 +0000 | [diff] [blame] | 5054 | ** If P4==0 then register P3 holds a blob constructed by MakeRecord. If |
| 5055 | ** P4>0 then register P3 is the first of P4 registers that form an unpacked |
| 5056 | ** record. |
| 5057 | ** |
| 5058 | ** Cursor P1 is on an index btree. If the record identified by P3 and P4 |
| 5059 | ** is not the prefix of any entry in P1 then a jump is made to P2. If P1 |
| 5060 | ** does contain an entry whose prefix matches the P3/P4 record then control |
| 5061 | ** falls through to the next instruction and P1 is left pointing at the |
| 5062 | ** matching entry. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5063 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5064 | ** This operation leaves the cursor in a state where it cannot be |
| 5065 | ** advanced in either direction. In other words, the Next and Prev |
| 5066 | ** opcodes do not work after this operation. |
| 5067 | ** |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5068 | ** See also: Found, NotExists, NoConflict, IfNoHope |
| 5069 | */ |
| 5070 | /* Opcode: IfNoHope P1 P2 P3 P4 * |
| 5071 | ** Synopsis: key=r[P3@P4] |
| 5072 | ** |
| 5073 | ** Register P3 is the first of P4 registers that form an unpacked |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 5074 | ** record. Cursor P1 is an index btree. P2 is a jump destination. |
| 5075 | ** In other words, the operands to this opcode are the same as the |
| 5076 | ** operands to OP_NotFound and OP_IdxGT. |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5077 | ** |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 5078 | ** This opcode is an optimization attempt only. If this opcode always |
| 5079 | ** falls through, the correct answer is still obtained, but extra works |
| 5080 | ** is performed. |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5081 | ** |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 5082 | ** A value of N in the seekHit flag of cursor P1 means that there exists |
| 5083 | ** a key P3:N that will match some record in the index. We want to know |
| 5084 | ** if it is possible for a record P3:P4 to match some record in the |
| 5085 | ** index. If it is not possible, we can skips some work. So if seekHit |
| 5086 | ** is less than P4, attempt to find out if a match is possible by running |
| 5087 | ** OP_NotFound. |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5088 | ** |
| 5089 | ** This opcode is used in IN clause processing for a multi-column key. |
| 5090 | ** If an IN clause is attached to an element of the key other than the |
| 5091 | ** left-most element, and if there are no matches on the most recent |
| 5092 | ** seek over the whole key, then it might be that one of the key element |
| 5093 | ** to the left is prohibiting a match, and hence there is "no hope" of |
| 5094 | ** any match regardless of how many IN clause elements are checked. |
| 5095 | ** In such a case, we abandon the IN clause search early, using this |
| 5096 | ** opcode. The opcode name comes from the fact that the |
| 5097 | ** jump is taken if there is "no hope" of achieving a match. |
| 5098 | ** |
| 5099 | ** See also: NotFound, SeekHit |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5100 | */ |
drh | 6f225d0 | 2013-10-26 13:36:51 +0000 | [diff] [blame] | 5101 | /* Opcode: NoConflict P1 P2 P3 P4 * |
drh | 4af5bee | 2013-10-30 02:37:50 +0000 | [diff] [blame] | 5102 | ** Synopsis: key=r[P3@P4] |
drh | 6f225d0 | 2013-10-26 13:36:51 +0000 | [diff] [blame] | 5103 | ** |
| 5104 | ** If P4==0 then register P3 holds a blob constructed by MakeRecord. If |
| 5105 | ** P4>0 then register P3 is the first of P4 registers that form an unpacked |
| 5106 | ** record. |
| 5107 | ** |
| 5108 | ** Cursor P1 is on an index btree. If the record identified by P3 and P4 |
| 5109 | ** contains any NULL value, jump immediately to P2. If all terms of the |
| 5110 | ** record are not-NULL then a check is done to determine if any row in the |
| 5111 | ** P1 index btree has a matching key prefix. If there are no matches, jump |
| 5112 | ** immediately to P2. If there is a match, fall through and leave the P1 |
| 5113 | ** cursor pointing to the matching row. |
| 5114 | ** |
| 5115 | ** This opcode is similar to OP_NotFound with the exceptions that the |
| 5116 | ** branch is always taken if any part of the search key input is NULL. |
| 5117 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5118 | ** This operation leaves the cursor in a state where it cannot be |
| 5119 | ** advanced in either direction. In other words, the Next and Prev |
| 5120 | ** opcodes do not work after this operation. |
| 5121 | ** |
drh | 6f225d0 | 2013-10-26 13:36:51 +0000 | [diff] [blame] | 5122 | ** See also: NotFound, Found, NotExists |
| 5123 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 5124 | case OP_IfNoHope: { /* jump, in3, ncycle */ |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5125 | VdbeCursor *pC; |
| 5126 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 5127 | pC = p->apCsr[pOp->p1]; |
| 5128 | assert( pC!=0 ); |
drh | 7bfccfe | 2021-04-29 13:58:28 +0000 | [diff] [blame] | 5129 | #ifdef SQLITE_DEBUG |
| 5130 | if( db->flags&SQLITE_VdbeTrace ){ |
| 5131 | printf("seekHit is %d\n", pC->seekHit); |
| 5132 | } |
| 5133 | #endif |
drh | fa17e13 | 2020-09-01 01:52:03 +0000 | [diff] [blame] | 5134 | if( pC->seekHit>=pOp->p4.i ) break; |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5135 | /* Fall through into OP_NotFound */ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 5136 | /* no break */ deliberate_fall_through |
drh | 8c2b6d7 | 2018-06-05 20:45:20 +0000 | [diff] [blame] | 5137 | } |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 5138 | case OP_NoConflict: /* jump, in3, ncycle */ |
| 5139 | case OP_NotFound: /* jump, in3, ncycle */ |
| 5140 | case OP_Found: { /* jump, in3, ncycle */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5141 | int alreadyExists; |
drh | 6f225d0 | 2013-10-26 13:36:51 +0000 | [diff] [blame] | 5142 | int ii; |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 5143 | VdbeCursor *pC; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5144 | UnpackedRecord *pIdxKey; |
drh | 8cff69d | 2009-11-12 19:59:44 +0000 | [diff] [blame] | 5145 | UnpackedRecord r; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5146 | |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 5147 | #ifdef SQLITE_TEST |
drh | 6f225d0 | 2013-10-26 13:36:51 +0000 | [diff] [blame] | 5148 | if( pOp->opcode!=OP_NoConflict ) sqlite3_found_count++; |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 5149 | #endif |
| 5150 | |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5151 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 8cff69d | 2009-11-12 19:59:44 +0000 | [diff] [blame] | 5152 | assert( pOp->p4type==P4_INT32 ); |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5153 | pC = p->apCsr[pOp->p1]; |
| 5154 | assert( pC!=0 ); |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5155 | #ifdef SQLITE_DEBUG |
drh | cefc87f | 2014-08-01 01:40:33 +0000 | [diff] [blame] | 5156 | pC->seekOp = pOp->opcode; |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5157 | #endif |
drh | 95b1036 | 2022-04-13 19:00:57 +0000 | [diff] [blame] | 5158 | r.aMem = &aMem[pOp->p3]; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5159 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 5160 | assert( pC->uc.pCursor!=0 ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5161 | assert( pC->isTable==0 ); |
drh | 95b1036 | 2022-04-13 19:00:57 +0000 | [diff] [blame] | 5162 | r.nField = (u16)pOp->p4.i; |
| 5163 | if( r.nField>0 ){ |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5164 | /* Key values in an array of registers */ |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5165 | r.pKeyInfo = pC->pKeyInfo; |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5166 | r.default_rc = 0; |
drh | 8aaf7bc | 2016-09-20 01:19:18 +0000 | [diff] [blame] | 5167 | #ifdef SQLITE_DEBUG |
drh | 826af37 | 2014-02-08 19:12:21 +0000 | [diff] [blame] | 5168 | for(ii=0; ii<r.nField; ii++){ |
| 5169 | assert( memIsValid(&r.aMem[ii]) ); |
drh | 8aaf7bc | 2016-09-20 01:19:18 +0000 | [diff] [blame] | 5170 | assert( (r.aMem[ii].flags & MEM_Zero)==0 || r.aMem[ii].n==0 ); |
drh | 826af37 | 2014-02-08 19:12:21 +0000 | [diff] [blame] | 5171 | if( ii ) REGISTER_TRACE(pOp->p3+ii, &r.aMem[ii]); |
drh | 826af37 | 2014-02-08 19:12:21 +0000 | [diff] [blame] | 5172 | } |
drh | 8aaf7bc | 2016-09-20 01:19:18 +0000 | [diff] [blame] | 5173 | #endif |
drh | ec534e6 | 2022-04-04 20:20:22 +0000 | [diff] [blame] | 5174 | rc = sqlite3BtreeIndexMoveto(pC->uc.pCursor, &r, &pC->seekResult); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5175 | }else{ |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5176 | /* Composite key generated by OP_MakeRecord */ |
drh | 95b1036 | 2022-04-13 19:00:57 +0000 | [diff] [blame] | 5177 | assert( r.aMem->flags & MEM_Blob ); |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5178 | assert( pOp->opcode!=OP_NoConflict ); |
drh | 95b1036 | 2022-04-13 19:00:57 +0000 | [diff] [blame] | 5179 | rc = ExpandBlob(r.aMem); |
drh | e46515b | 2017-05-19 22:51:00 +0000 | [diff] [blame] | 5180 | assert( rc==SQLITE_OK || rc==SQLITE_NOMEM ); |
| 5181 | if( rc ) goto no_mem; |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5182 | pIdxKey = sqlite3VdbeAllocUnpackedRecord(pC->pKeyInfo); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5183 | if( pIdxKey==0 ) goto no_mem; |
drh | 95b1036 | 2022-04-13 19:00:57 +0000 | [diff] [blame] | 5184 | sqlite3VdbeRecordUnpack(pC->pKeyInfo, r.aMem->n, r.aMem->z, pIdxKey); |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5185 | pIdxKey->default_rc = 0; |
drh | ec534e6 | 2022-04-04 20:20:22 +0000 | [diff] [blame] | 5186 | rc = sqlite3BtreeIndexMoveto(pC->uc.pCursor, pIdxKey, &pC->seekResult); |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5187 | sqlite3DbFreeNN(db, pIdxKey); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5188 | } |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5189 | if( rc!=SQLITE_OK ){ |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5190 | goto abort_due_to_error; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5191 | } |
drh | ec534e6 | 2022-04-04 20:20:22 +0000 | [diff] [blame] | 5192 | alreadyExists = (pC->seekResult==0); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5193 | pC->nullRow = 1-alreadyExists; |
| 5194 | pC->deferredMoveto = 0; |
| 5195 | pC->cacheStatus = CACHE_STALE; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5196 | if( pOp->opcode==OP_Found ){ |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 5197 | VdbeBranchTaken(alreadyExists!=0,2); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 5198 | if( alreadyExists ) goto jump_to_p2; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5199 | }else{ |
drh | b834e0d | 2022-04-04 19:43:57 +0000 | [diff] [blame] | 5200 | if( !alreadyExists ){ |
| 5201 | VdbeBranchTaken(1,2); |
| 5202 | goto jump_to_p2; |
| 5203 | } |
| 5204 | if( pOp->opcode==OP_NoConflict ){ |
| 5205 | /* For the OP_NoConflict opcode, take the jump if any of the |
| 5206 | ** input fields are NULL, since any key with a NULL will not |
| 5207 | ** conflict */ |
| 5208 | for(ii=0; ii<r.nField; ii++){ |
| 5209 | if( r.aMem[ii].flags & MEM_Null ){ |
| 5210 | VdbeBranchTaken(1,2); |
| 5211 | goto jump_to_p2; |
| 5212 | } |
| 5213 | } |
| 5214 | } |
| 5215 | VdbeBranchTaken(0,2); |
| 5216 | if( pOp->opcode==OP_IfNoHope ){ |
| 5217 | pC->seekHit = pOp->p4.i; |
| 5218 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5219 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5220 | break; |
| 5221 | } |
| 5222 | |
drh | eeb9565 | 2016-05-26 20:56:38 +0000 | [diff] [blame] | 5223 | /* Opcode: SeekRowid P1 P2 P3 * * |
| 5224 | ** Synopsis: intkey=r[P3] |
| 5225 | ** |
| 5226 | ** P1 is the index of a cursor open on an SQL table btree (with integer |
| 5227 | ** keys). If register P3 does not contain an integer or if P1 does not |
| 5228 | ** contain a record with rowid P3 then jump immediately to P2. |
| 5229 | ** Or, if P2 is 0, raise an SQLITE_CORRUPT error. If P1 does contain |
| 5230 | ** a record with rowid P3 then |
| 5231 | ** leave the cursor pointing at that record and fall through to the next |
| 5232 | ** instruction. |
| 5233 | ** |
| 5234 | ** The OP_NotExists opcode performs the same operation, but with OP_NotExists |
| 5235 | ** the P3 register must be guaranteed to contain an integer value. With this |
| 5236 | ** opcode, register P3 might not contain an integer. |
| 5237 | ** |
| 5238 | ** The OP_NotFound opcode performs the same operation on index btrees |
| 5239 | ** (with arbitrary multi-value keys). |
| 5240 | ** |
| 5241 | ** This opcode leaves the cursor in a state where it cannot be advanced |
| 5242 | ** in either direction. In other words, the Next and Prev opcodes will |
| 5243 | ** not work following this opcode. |
| 5244 | ** |
| 5245 | ** See also: Found, NotFound, NoConflict, SeekRowid |
| 5246 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5247 | /* Opcode: NotExists P1 P2 P3 * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 5248 | ** Synopsis: intkey=r[P3] |
drh | 6b12545 | 2002-01-28 15:53:03 +0000 | [diff] [blame] | 5249 | ** |
drh | 261c02d | 2013-10-25 14:46:15 +0000 | [diff] [blame] | 5250 | ** P1 is the index of a cursor open on an SQL table btree (with integer |
| 5251 | ** keys). P3 is an integer rowid. If P1 does not contain a record with |
dan | c6157e1 | 2015-09-14 09:23:47 +0000 | [diff] [blame] | 5252 | ** rowid P3 then jump immediately to P2. Or, if P2 is 0, raise an |
| 5253 | ** SQLITE_CORRUPT error. If P1 does contain a record with rowid P3 then |
| 5254 | ** leave the cursor pointing at that record and fall through to the next |
| 5255 | ** instruction. |
drh | 6b12545 | 2002-01-28 15:53:03 +0000 | [diff] [blame] | 5256 | ** |
drh | eeb9565 | 2016-05-26 20:56:38 +0000 | [diff] [blame] | 5257 | ** The OP_SeekRowid opcode performs the same operation but also allows the |
| 5258 | ** P3 register to contain a non-integer value, in which case the jump is |
| 5259 | ** always taken. This opcode requires that P3 always contain an integer. |
| 5260 | ** |
drh | 261c02d | 2013-10-25 14:46:15 +0000 | [diff] [blame] | 5261 | ** The OP_NotFound opcode performs the same operation on index btrees |
| 5262 | ** (with arbitrary multi-value keys). |
drh | 6b12545 | 2002-01-28 15:53:03 +0000 | [diff] [blame] | 5263 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5264 | ** This opcode leaves the cursor in a state where it cannot be advanced |
| 5265 | ** in either direction. In other words, the Next and Prev opcodes will |
| 5266 | ** not work following this opcode. |
| 5267 | ** |
drh | eeb9565 | 2016-05-26 20:56:38 +0000 | [diff] [blame] | 5268 | ** See also: Found, NotFound, NoConflict, SeekRowid |
drh | 6b12545 | 2002-01-28 15:53:03 +0000 | [diff] [blame] | 5269 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 5270 | case OP_SeekRowid: { /* jump, in3, ncycle */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 5271 | VdbeCursor *pC; |
drh | 0ca3e24 | 2002-01-29 23:07:02 +0000 | [diff] [blame] | 5272 | BtCursor *pCrsr; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5273 | int res; |
| 5274 | u64 iKey; |
| 5275 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 5276 | pIn3 = &aMem[pOp->p3]; |
drh | 3242c69 | 2019-05-04 01:29:13 +0000 | [diff] [blame] | 5277 | testcase( pIn3->flags & MEM_Int ); |
| 5278 | testcase( pIn3->flags & MEM_IntReal ); |
drh | b29ef5e | 2019-10-07 01:05:57 +0000 | [diff] [blame] | 5279 | testcase( pIn3->flags & MEM_Real ); |
| 5280 | testcase( (pIn3->flags & (MEM_Str|MEM_Int))==MEM_Str ); |
drh | 169f077 | 2019-05-02 21:36:26 +0000 | [diff] [blame] | 5281 | if( (pIn3->flags & (MEM_Int|MEM_IntReal))==0 ){ |
drh | b29ef5e | 2019-10-07 01:05:57 +0000 | [diff] [blame] | 5282 | /* If pIn3->u.i does not contain an integer, compute iKey as the |
| 5283 | ** integer value of pIn3. Jump to P2 if pIn3 cannot be converted |
| 5284 | ** into an integer without loss of information. Take care to avoid |
| 5285 | ** changing the datatype of pIn3, however, as it is used by other |
| 5286 | ** parts of the prepared statement. */ |
| 5287 | Mem x = pIn3[0]; |
| 5288 | applyAffinity(&x, SQLITE_AFF_NUMERIC, encoding); |
| 5289 | if( (x.flags & MEM_Int)==0 ) goto jump_to_p2; |
| 5290 | iKey = x.u.i; |
| 5291 | goto notExistsWithKey; |
drh | eeb9565 | 2016-05-26 20:56:38 +0000 | [diff] [blame] | 5292 | } |
| 5293 | /* Fall through into OP_NotExists */ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 5294 | /* no break */ deliberate_fall_through |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 5295 | case OP_NotExists: /* jump, in3, ncycle */ |
drh | eeb9565 | 2016-05-26 20:56:38 +0000 | [diff] [blame] | 5296 | pIn3 = &aMem[pOp->p3]; |
drh | e4fe6d4 | 2018-08-03 15:58:07 +0000 | [diff] [blame] | 5297 | assert( (pIn3->flags & MEM_Int)!=0 || pOp->opcode==OP_SeekRowid ); |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5298 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | b29ef5e | 2019-10-07 01:05:57 +0000 | [diff] [blame] | 5299 | iKey = pIn3->u.i; |
| 5300 | notExistsWithKey: |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5301 | pC = p->apCsr[pOp->p1]; |
| 5302 | assert( pC!=0 ); |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5303 | #ifdef SQLITE_DEBUG |
drh | 94f4f87 | 2018-12-20 22:08:32 +0000 | [diff] [blame] | 5304 | if( pOp->opcode==OP_SeekRowid ) pC->seekOp = OP_SeekRowid; |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 5305 | #endif |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5306 | assert( pC->isTable ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5307 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 5308 | pCrsr = pC->uc.pCursor; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5309 | assert( pCrsr!=0 ); |
| 5310 | res = 0; |
drh | 42a410d | 2021-06-19 18:32:20 +0000 | [diff] [blame] | 5311 | rc = sqlite3BtreeTableMoveto(pCrsr, iKey, 0, &res); |
drh | b79d552 | 2015-09-14 19:26:37 +0000 | [diff] [blame] | 5312 | assert( rc==SQLITE_OK || res==0 ); |
drh | b53a5a9 | 2014-10-12 22:37:22 +0000 | [diff] [blame] | 5313 | pC->movetoTarget = iKey; /* Used by OP_Delete */ |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5314 | pC->nullRow = 0; |
| 5315 | pC->cacheStatus = CACHE_STALE; |
| 5316 | pC->deferredMoveto = 0; |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 5317 | VdbeBranchTaken(res!=0,2); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 5318 | pC->seekResult = res; |
dan | c6157e1 | 2015-09-14 09:23:47 +0000 | [diff] [blame] | 5319 | if( res!=0 ){ |
drh | b79d552 | 2015-09-14 19:26:37 +0000 | [diff] [blame] | 5320 | assert( rc==SQLITE_OK ); |
| 5321 | if( pOp->p2==0 ){ |
| 5322 | rc = SQLITE_CORRUPT_BKPT; |
| 5323 | }else{ |
| 5324 | goto jump_to_p2; |
| 5325 | } |
dan | c6157e1 | 2015-09-14 09:23:47 +0000 | [diff] [blame] | 5326 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5327 | if( rc ) goto abort_due_to_error; |
drh | 6b12545 | 2002-01-28 15:53:03 +0000 | [diff] [blame] | 5328 | break; |
| 5329 | } |
| 5330 | |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 5331 | /* Opcode: Sequence P1 P2 * * * |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 5332 | ** Synopsis: r[P2]=cursor[P1].ctr++ |
drh | 4db38a7 | 2005-09-01 12:16:28 +0000 | [diff] [blame] | 5333 | ** |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 5334 | ** Find the next available sequence number for cursor P1. |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5335 | ** Write the sequence number into register P2. |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 5336 | ** The sequence number on the cursor is incremented after this |
| 5337 | ** instruction. |
drh | 4db38a7 | 2005-09-01 12:16:28 +0000 | [diff] [blame] | 5338 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 5339 | case OP_Sequence: { /* out2 */ |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5340 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 5341 | assert( p->apCsr[pOp->p1]!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5342 | assert( p->apCsr[pOp->p1]->eCurType!=CURTYPE_VTAB ); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 5343 | pOut = out2Prerelease(p, pOp); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5344 | pOut->u.i = p->apCsr[pOp->p1]->seqCount++; |
drh | 4db38a7 | 2005-09-01 12:16:28 +0000 | [diff] [blame] | 5345 | break; |
| 5346 | } |
| 5347 | |
| 5348 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 5349 | /* Opcode: NewRowid P1 P2 P3 * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 5350 | ** Synopsis: r[P2]=rowid |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5351 | ** |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 5352 | ** Get a new integer record number (a.k.a "rowid") used as the key to a table. |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 5353 | ** The record number is not previously used as a key in the database |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5354 | ** table that cursor P1 points to. The new record number is written |
| 5355 | ** written to register P2. |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 5356 | ** |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 5357 | ** If P3>0 then P3 is a register in the root frame of this VDBE that holds |
| 5358 | ** the largest previously generated record number. No new record numbers are |
| 5359 | ** allowed to be less than this value. When this value reaches its maximum, |
drh | ef8662b | 2011-06-20 21:47:58 +0000 | [diff] [blame] | 5360 | ** an SQLITE_FULL error is generated. The P3 register is updated with the ' |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 5361 | ** generated record number. This P3 mechanism is used to help implement the |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 5362 | ** AUTOINCREMENT feature. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5363 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 5364 | case OP_NewRowid: { /* out2 */ |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5365 | i64 v; /* The new rowid */ |
| 5366 | VdbeCursor *pC; /* Cursor of table to get the new rowid */ |
| 5367 | int res; /* Result of an sqlite3BtreeLast() */ |
| 5368 | int cnt; /* Counter to limit the number of searches */ |
mistachkin | d6665c5 | 2021-01-18 19:28:56 +0000 | [diff] [blame] | 5369 | #ifndef SQLITE_OMIT_AUTOINCREMENT |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5370 | Mem *pMem; /* Register holding largest rowid for AUTOINCREMENT */ |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 5371 | VdbeFrame *pFrame; /* Root frame of VDBE */ |
mistachkin | d6665c5 | 2021-01-18 19:28:56 +0000 | [diff] [blame] | 5372 | #endif |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5373 | |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5374 | v = 0; |
| 5375 | res = 0; |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 5376 | pOut = out2Prerelease(p, pOp); |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5377 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 5378 | pC = p->apCsr[pOp->p1]; |
| 5379 | assert( pC!=0 ); |
drh | 4c57e32 | 2018-05-23 17:53:07 +0000 | [diff] [blame] | 5380 | assert( pC->isTable ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5381 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 5382 | assert( pC->uc.pCursor!=0 ); |
drh | 98ef0f6 | 2015-06-30 01:25:52 +0000 | [diff] [blame] | 5383 | { |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5384 | /* The next rowid or record number (different terms for the same |
| 5385 | ** thing) is obtained in a two-step algorithm. |
| 5386 | ** |
| 5387 | ** First we attempt to find the largest existing rowid and add one |
| 5388 | ** to that. But if the largest existing rowid is already the maximum |
| 5389 | ** positive integer, we have to fall through to the second |
| 5390 | ** probabilistic algorithm |
| 5391 | ** |
| 5392 | ** The second algorithm is to select a rowid at random and see if |
| 5393 | ** it already exists in the table. If it does not exist, we have |
| 5394 | ** succeeded. If the random rowid does exist, we select a new one |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5395 | ** and try again, up to 100 times. |
drh | db5ed6d | 2001-09-18 22:17:44 +0000 | [diff] [blame] | 5396 | */ |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5397 | assert( pC->isTable ); |
drh | fe2093d | 2005-01-20 22:48:47 +0000 | [diff] [blame] | 5398 | |
drh | 75f86a4 | 2005-02-17 00:03:06 +0000 | [diff] [blame] | 5399 | #ifdef SQLITE_32BIT_ROWID |
| 5400 | # define MAX_ROWID 0x7fffffff |
| 5401 | #else |
drh | fe2093d | 2005-01-20 22:48:47 +0000 | [diff] [blame] | 5402 | /* Some compilers complain about constants of the form 0x7fffffffffffffff. |
| 5403 | ** Others complain about 0x7ffffffffffffffffLL. The following macro seems |
| 5404 | ** to provide the constant while making all compilers happy. |
| 5405 | */ |
danielk1977 | 64202cf | 2008-11-17 15:31:47 +0000 | [diff] [blame] | 5406 | # define MAX_ROWID (i64)( (((u64)0x7fffffff)<<32) | (u64)0xffffffff ) |
drh | 75f86a4 | 2005-02-17 00:03:06 +0000 | [diff] [blame] | 5407 | #endif |
drh | fe2093d | 2005-01-20 22:48:47 +0000 | [diff] [blame] | 5408 | |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5409 | if( !pC->useRandomRowid ){ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5410 | rc = sqlite3BtreeLast(pC->uc.pCursor, &res); |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5411 | if( rc!=SQLITE_OK ){ |
| 5412 | goto abort_due_to_error; |
| 5413 | } |
| 5414 | if( res ){ |
| 5415 | v = 1; /* IMP: R-61914-48074 */ |
| 5416 | }else{ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5417 | assert( sqlite3BtreeCursorIsValid(pC->uc.pCursor) ); |
drh | a7c90c4 | 2016-06-04 20:37:10 +0000 | [diff] [blame] | 5418 | v = sqlite3BtreeIntegerKey(pC->uc.pCursor); |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5419 | if( v>=MAX_ROWID ){ |
| 5420 | pC->useRandomRowid = 1; |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5421 | }else{ |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5422 | v++; /* IMP: R-29538-34987 */ |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5423 | } |
drh | 3fc190c | 2001-09-14 03:24:23 +0000 | [diff] [blame] | 5424 | } |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5425 | } |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 5426 | |
| 5427 | #ifndef SQLITE_OMIT_AUTOINCREMENT |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5428 | if( pOp->p3 ){ |
| 5429 | /* Assert that P3 is a valid memory cell. */ |
| 5430 | assert( pOp->p3>0 ); |
| 5431 | if( p->pFrame ){ |
| 5432 | for(pFrame=p->pFrame; pFrame->pParent; pFrame=pFrame->pParent); |
shane | abc6b89 | 2009-09-10 19:09:03 +0000 | [diff] [blame] | 5433 | /* Assert that P3 is a valid memory cell. */ |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5434 | assert( pOp->p3<=pFrame->nMem ); |
| 5435 | pMem = &pFrame->aMem[pOp->p3]; |
| 5436 | }else{ |
| 5437 | /* Assert that P3 is a valid memory cell. */ |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 5438 | assert( pOp->p3<=(p->nMem+1 - p->nCursor) ); |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5439 | pMem = &aMem[pOp->p3]; |
| 5440 | memAboutToChange(p, pMem); |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 5441 | } |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5442 | assert( memIsValid(pMem) ); |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 5443 | |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5444 | REGISTER_TRACE(pOp->p3, pMem); |
| 5445 | sqlite3VdbeMemIntegerify(pMem); |
| 5446 | assert( (pMem->flags & MEM_Int)!=0 ); /* mem(P3) holds an integer */ |
| 5447 | if( pMem->u.i==MAX_ROWID || pC->useRandomRowid ){ |
drh | e77caa1 | 2016-11-02 13:18:46 +0000 | [diff] [blame] | 5448 | rc = SQLITE_FULL; /* IMP: R-17817-00630 */ |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5449 | goto abort_due_to_error; |
| 5450 | } |
| 5451 | if( v<pMem->u.i+1 ){ |
| 5452 | v = pMem->u.i + 1; |
| 5453 | } |
| 5454 | pMem->u.i = v; |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5455 | } |
drh | e0670b6 | 2014-02-12 21:31:12 +0000 | [diff] [blame] | 5456 | #endif |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5457 | if( pC->useRandomRowid ){ |
drh | 748a52c | 2010-09-01 11:50:08 +0000 | [diff] [blame] | 5458 | /* IMPLEMENTATION-OF: R-07677-41881 If the largest ROWID is equal to the |
drh | c79c761 | 2010-01-01 18:57:48 +0000 | [diff] [blame] | 5459 | ** largest possible integer (9223372036854775807) then the database |
drh | 748a52c | 2010-09-01 11:50:08 +0000 | [diff] [blame] | 5460 | ** engine starts picking positive candidate ROWIDs at random until |
| 5461 | ** it finds one that is not previously used. */ |
drh | aa73609 | 2009-06-22 00:55:30 +0000 | [diff] [blame] | 5462 | assert( pOp->p3==0 ); /* We cannot be in random rowid mode if this is |
| 5463 | ** an AUTOINCREMENT table. */ |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5464 | cnt = 0; |
drh | 2c4dc63 | 2014-09-25 12:31:28 +0000 | [diff] [blame] | 5465 | do{ |
| 5466 | sqlite3_randomness(sizeof(v), &v); |
drh | d863346 | 2014-09-25 17:42:41 +0000 | [diff] [blame] | 5467 | v &= (MAX_ROWID>>1); v++; /* Ensure that v is greater than zero */ |
drh | 42a410d | 2021-06-19 18:32:20 +0000 | [diff] [blame] | 5468 | }while( ((rc = sqlite3BtreeTableMoveto(pC->uc.pCursor, (u64)v, |
drh | 748a52c | 2010-09-01 11:50:08 +0000 | [diff] [blame] | 5469 | 0, &res))==SQLITE_OK) |
shaneh | c4d340a | 2010-09-01 02:37:56 +0000 | [diff] [blame] | 5470 | && (res==0) |
drh | 2c4dc63 | 2014-09-25 12:31:28 +0000 | [diff] [blame] | 5471 | && (++cnt<100)); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5472 | if( rc ) goto abort_due_to_error; |
| 5473 | if( res==0 ){ |
drh | c79c761 | 2010-01-01 18:57:48 +0000 | [diff] [blame] | 5474 | rc = SQLITE_FULL; /* IMP: R-38219-53002 */ |
drh | 5cf8e8c | 2002-02-19 22:42:05 +0000 | [diff] [blame] | 5475 | goto abort_due_to_error; |
| 5476 | } |
drh | 748a52c | 2010-09-01 11:50:08 +0000 | [diff] [blame] | 5477 | assert( v>0 ); /* EV: R-40812-03570 */ |
drh | 1eaa269 | 2001-09-18 02:02:23 +0000 | [diff] [blame] | 5478 | } |
drh | a11846b | 2004-01-07 18:52:56 +0000 | [diff] [blame] | 5479 | pC->deferredMoveto = 0; |
drh | 76873ab | 2006-01-07 18:48:26 +0000 | [diff] [blame] | 5480 | pC->cacheStatus = CACHE_STALE; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5481 | } |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 5482 | pOut->u.i = v; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5483 | break; |
| 5484 | } |
| 5485 | |
danielk1977 | 1f4aa33 | 2008-01-03 09:51:55 +0000 | [diff] [blame] | 5486 | /* Opcode: Insert P1 P2 P3 P4 P5 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 5487 | ** Synopsis: intkey=r[P3] data=r[P2] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5488 | ** |
jplyon | 5a56422 | 2003-06-02 06:15:58 +0000 | [diff] [blame] | 5489 | ** Write an entry into the table of cursor P1. A new entry is |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 5490 | ** created if it doesn't already exist or the data for an existing |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5491 | ** entry is overwritten. The data is the value MEM_Blob stored in register |
danielk1977 | 1f4aa33 | 2008-01-03 09:51:55 +0000 | [diff] [blame] | 5492 | ** number P2. The key is stored in register P3. The key must |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5493 | ** be a MEM_Int. |
drh | 4a32431 | 2001-12-21 14:30:42 +0000 | [diff] [blame] | 5494 | ** |
danielk1977 | 1f4aa33 | 2008-01-03 09:51:55 +0000 | [diff] [blame] | 5495 | ** If the OPFLAG_NCHANGE flag of P5 is set, then the row change count is |
| 5496 | ** incremented (otherwise not). If the OPFLAG_LASTROWID flag of P5 is set, |
danielk1977 | b28af71 | 2004-06-21 06:50:26 +0000 | [diff] [blame] | 5497 | ** then rowid is stored for subsequent return by the |
drh | 85b623f | 2007-12-13 21:54:09 +0000 | [diff] [blame] | 5498 | ** sqlite3_last_insert_rowid() function (otherwise it is unmodified). |
drh | 6b12545 | 2002-01-28 15:53:03 +0000 | [diff] [blame] | 5499 | ** |
drh | eaf6ae2 | 2016-11-09 20:14:34 +0000 | [diff] [blame] | 5500 | ** If the OPFLAG_USESEEKRESULT flag of P5 is set, the implementation might |
| 5501 | ** run faster by avoiding an unnecessary seek on cursor P1. However, |
| 5502 | ** the OPFLAG_USESEEKRESULT flag must only be set if there have been no prior |
| 5503 | ** seeks on the cursor or if the most recent seek used a key equal to P3. |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5504 | ** |
| 5505 | ** If the OPFLAG_ISUPDATE flag is set, then this opcode is part of an |
| 5506 | ** UPDATE operation. Otherwise (if the flag is clear) then this opcode |
| 5507 | ** is part of an INSERT operation. The difference is only important to |
| 5508 | ** the update hook. |
| 5509 | ** |
dan | 319eeb7 | 2011-03-19 08:38:50 +0000 | [diff] [blame] | 5510 | ** Parameter P4 may point to a Table structure, or may be NULL. If it is |
| 5511 | ** not NULL, then the update-hook (sqlite3.xUpdateCallback) is invoked |
| 5512 | ** following a successful insert. |
danielk1977 | 1f6eec5 | 2006-06-16 06:17:47 +0000 | [diff] [blame] | 5513 | ** |
drh | 93aed5a | 2008-01-16 17:46:38 +0000 | [diff] [blame] | 5514 | ** (WARNING/TODO: If P1 is a pseudo-cursor and P2 is dynamically |
| 5515 | ** allocated, then ownership of P2 is transferred to the pseudo-cursor |
| 5516 | ** and register P2 becomes ephemeral. If the cursor is changed, the |
| 5517 | ** value of register P2 will then change. Make sure this does not |
| 5518 | ** cause any problems.) |
| 5519 | ** |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 5520 | ** This instruction only works on tables. The equivalent instruction |
| 5521 | ** for indices is OP_IdxInsert. |
drh | 6b12545 | 2002-01-28 15:53:03 +0000 | [diff] [blame] | 5522 | */ |
drh | 50ef671 | 2019-02-22 23:29:56 +0000 | [diff] [blame] | 5523 | case OP_Insert: { |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5524 | Mem *pData; /* MEM cell holding data for the record to be inserted */ |
| 5525 | Mem *pKey; /* MEM cell holding key for the record */ |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5526 | VdbeCursor *pC; /* Cursor to table into which insert is written */ |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5527 | int seekResult; /* Result of prior seek or 0 if no USESEEKRESULT flag */ |
| 5528 | const char *zDb; /* database name - used by the update hook */ |
dan | 319eeb7 | 2011-03-19 08:38:50 +0000 | [diff] [blame] | 5529 | Table *pTab; /* Table structure - used by update and pre-update hooks */ |
drh | 8eeb446 | 2016-05-21 20:03:42 +0000 | [diff] [blame] | 5530 | BtreePayload x; /* Payload to be inserted */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5531 | |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 5532 | pData = &aMem[pOp->p2]; |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5533 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 5534 | assert( memIsValid(pData) ); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5535 | pC = p->apCsr[pOp->p1]; |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 5536 | assert( pC!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5537 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | be3da24 | 2019-12-29 00:52:41 +0000 | [diff] [blame] | 5538 | assert( pC->deferredMoveto==0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5539 | assert( pC->uc.pCursor!=0 ); |
dan | cb9a364 | 2017-01-30 19:44:53 +0000 | [diff] [blame] | 5540 | assert( (pOp->p5 & OPFLAG_ISNOOP) || pC->isTable ); |
drh | cbf1b8e | 2013-11-11 22:55:26 +0000 | [diff] [blame] | 5541 | assert( pOp->p4type==P4_TABLE || pOp->p4type>=P4_STATIC ); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 5542 | REGISTER_TRACE(pOp->p2, pData); |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 5543 | sqlite3VdbeIncrWriteCounter(p, pC); |
danielk1977 | 5f8d8a8 | 2004-05-11 00:28:42 +0000 | [diff] [blame] | 5544 | |
drh | 50ef671 | 2019-02-22 23:29:56 +0000 | [diff] [blame] | 5545 | pKey = &aMem[pOp->p3]; |
| 5546 | assert( pKey->flags & MEM_Int ); |
| 5547 | assert( memIsValid(pKey) ); |
| 5548 | REGISTER_TRACE(pOp->p3, pKey); |
| 5549 | x.nKey = pKey->u.i; |
drh | e05c929 | 2009-10-29 13:48:10 +0000 | [diff] [blame] | 5550 | |
drh | 9b1c62d | 2011-03-30 21:04:43 +0000 | [diff] [blame] | 5551 | if( pOp->p4type==P4_TABLE && HAS_UPDATE_HOOK(db) ){ |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5552 | assert( pC->iDb>=0 ); |
drh | 69c3382 | 2016-08-18 14:33:11 +0000 | [diff] [blame] | 5553 | zDb = db->aDb[pC->iDb].zDbSName; |
dan | 319eeb7 | 2011-03-19 08:38:50 +0000 | [diff] [blame] | 5554 | pTab = pOp->p4.pTab; |
dan | cb9a364 | 2017-01-30 19:44:53 +0000 | [diff] [blame] | 5555 | assert( (pOp->p5 & OPFLAG_ISNOOP) || HasRowid(pTab) ); |
drh | 74c3302 | 2016-03-30 12:56:55 +0000 | [diff] [blame] | 5556 | }else{ |
drh | 4ec6f3a | 2018-01-12 19:33:18 +0000 | [diff] [blame] | 5557 | pTab = 0; |
drh | e1e1a43 | 2021-10-05 11:11:43 +0000 | [diff] [blame] | 5558 | zDb = 0; |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5559 | } |
| 5560 | |
drh | 9b1c62d | 2011-03-30 21:04:43 +0000 | [diff] [blame] | 5561 | #ifdef SQLITE_ENABLE_PREUPDATE_HOOK |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5562 | /* Invoke the pre-update hook, if any */ |
drh | 4ec6f3a | 2018-01-12 19:33:18 +0000 | [diff] [blame] | 5563 | if( pTab ){ |
drh | 84ebe2b | 2018-01-12 18:46:52 +0000 | [diff] [blame] | 5564 | if( db->xPreUpdateCallback && !(pOp->p5 & OPFLAG_ISUPDATE) ){ |
dan | a23a873 | 2021-04-21 20:52:17 +0000 | [diff] [blame] | 5565 | sqlite3VdbePreUpdateHook(p,pC,SQLITE_INSERT,zDb,pTab,x.nKey,pOp->p2,-1); |
drh | 84ebe2b | 2018-01-12 18:46:52 +0000 | [diff] [blame] | 5566 | } |
drh | 4ec6f3a | 2018-01-12 19:33:18 +0000 | [diff] [blame] | 5567 | if( db->xUpdateCallback==0 || pTab->aCol==0 ){ |
| 5568 | /* Prevent post-update hook from running in cases when it should not */ |
| 5569 | pTab = 0; |
drh | 84ebe2b | 2018-01-12 18:46:52 +0000 | [diff] [blame] | 5570 | } |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5571 | } |
dan | cb9a364 | 2017-01-30 19:44:53 +0000 | [diff] [blame] | 5572 | if( pOp->p5 & OPFLAG_ISNOOP ) break; |
drh | 9b1c62d | 2011-03-30 21:04:43 +0000 | [diff] [blame] | 5573 | #endif |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5574 | |
drh | 57366d8 | 2022-12-22 17:36:02 +0000 | [diff] [blame] | 5575 | assert( (pOp->p5 & OPFLAG_LASTROWID)==0 || (pOp->p5 & OPFLAG_NCHANGE)!=0 ); |
| 5576 | if( pOp->p5 & OPFLAG_NCHANGE ){ |
| 5577 | p->nChange++; |
| 5578 | if( pOp->p5 & OPFLAG_LASTROWID ) db->lastRowid = x.nKey; |
| 5579 | } |
drh | 32881be | 2020-11-17 21:26:13 +0000 | [diff] [blame] | 5580 | assert( (pData->flags & (MEM_Blob|MEM_Str))!=0 || pData->n==0 ); |
dan | 21cd29a | 2017-10-23 16:03:54 +0000 | [diff] [blame] | 5581 | x.pData = pData->z; |
| 5582 | x.nData = pData->n; |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5583 | seekResult = ((pOp->p5 & OPFLAG_USESEEKRESULT) ? pC->seekResult : 0); |
| 5584 | if( pData->flags & MEM_Zero ){ |
drh | 8eeb446 | 2016-05-21 20:03:42 +0000 | [diff] [blame] | 5585 | x.nZero = pData->u.nZero; |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 5586 | }else{ |
drh | 8eeb446 | 2016-05-21 20:03:42 +0000 | [diff] [blame] | 5587 | x.nZero = 0; |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 5588 | } |
drh | 8eeb446 | 2016-05-21 20:03:42 +0000 | [diff] [blame] | 5589 | x.pKey = 0; |
drh | ecba107 | 2022-11-19 20:10:55 +0000 | [diff] [blame] | 5590 | assert( BTREE_PREFORMAT==OPFLAG_PREFORMAT ); |
drh | 8eeb446 | 2016-05-21 20:03:42 +0000 | [diff] [blame] | 5591 | rc = sqlite3BtreeInsert(pC->uc.pCursor, &x, |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 5592 | (pOp->p5 & (OPFLAG_APPEND|OPFLAG_SAVEPOSITION|OPFLAG_PREFORMAT)), |
| 5593 | seekResult |
drh | 3e9ca09 | 2009-09-08 01:14:48 +0000 | [diff] [blame] | 5594 | ); |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 5595 | pC->deferredMoveto = 0; |
| 5596 | pC->cacheStatus = CACHE_STALE; |
danielk1977 | 94eb6a1 | 2005-12-15 15:22:08 +0000 | [diff] [blame] | 5597 | |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 5598 | /* Invoke the update-hook if required. */ |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5599 | if( rc ) goto abort_due_to_error; |
drh | 4ec6f3a | 2018-01-12 19:33:18 +0000 | [diff] [blame] | 5600 | if( pTab ){ |
| 5601 | assert( db->xUpdateCallback!=0 ); |
| 5602 | assert( pTab->aCol!=0 ); |
| 5603 | db->xUpdateCallback(db->pUpdateArg, |
| 5604 | (pOp->p5 & OPFLAG_ISUPDATE) ? SQLITE_UPDATE : SQLITE_INSERT, |
| 5605 | zDb, pTab->zName, x.nKey); |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 5606 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5607 | break; |
| 5608 | } |
| 5609 | |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 5610 | /* Opcode: RowCell P1 P2 P3 * * |
dan | d2ffc97 | 2020-12-10 19:20:15 +0000 | [diff] [blame] | 5611 | ** |
| 5612 | ** P1 and P2 are both open cursors. Both must be opened on the same type |
| 5613 | ** of table - intkey or index. This opcode is used as part of copying |
| 5614 | ** the current row from P2 into P1. If the cursors are opened on intkey |
| 5615 | ** tables, register P3 contains the rowid to use with the new record in |
| 5616 | ** P1. If they are opened on index tables, P3 is not used. |
| 5617 | ** |
| 5618 | ** This opcode must be followed by either an Insert or InsertIdx opcode |
| 5619 | ** with the OPFLAG_PREFORMAT flag set to complete the insert operation. |
dan | 036e067 | 2020-12-08 20:19:07 +0000 | [diff] [blame] | 5620 | */ |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 5621 | case OP_RowCell: { |
dan | 036e067 | 2020-12-08 20:19:07 +0000 | [diff] [blame] | 5622 | VdbeCursor *pDest; /* Cursor to write to */ |
| 5623 | VdbeCursor *pSrc; /* Cursor to read from */ |
| 5624 | i64 iKey; /* Rowid value to insert with */ |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 5625 | assert( pOp[1].opcode==OP_Insert || pOp[1].opcode==OP_IdxInsert ); |
drh | a06eafc | 2020-12-29 15:06:26 +0000 | [diff] [blame] | 5626 | assert( pOp[1].opcode==OP_Insert || pOp->p3==0 ); |
| 5627 | assert( pOp[1].opcode==OP_IdxInsert || pOp->p3>0 ); |
dan | d2ffc97 | 2020-12-10 19:20:15 +0000 | [diff] [blame] | 5628 | assert( pOp[1].p5 & OPFLAG_PREFORMAT ); |
dan | 036e067 | 2020-12-08 20:19:07 +0000 | [diff] [blame] | 5629 | pDest = p->apCsr[pOp->p1]; |
| 5630 | pSrc = p->apCsr[pOp->p2]; |
dan | cd1b2d0 | 2020-12-09 20:33:51 +0000 | [diff] [blame] | 5631 | iKey = pOp->p3 ? aMem[pOp->p3].u.i : 0; |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 5632 | rc = sqlite3BtreeTransferRow(pDest->uc.pCursor, pSrc->uc.pCursor, iKey); |
dan | 036e067 | 2020-12-08 20:19:07 +0000 | [diff] [blame] | 5633 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
| 5634 | break; |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 5635 | }; |
dan | 036e067 | 2020-12-08 20:19:07 +0000 | [diff] [blame] | 5636 | |
dan | 438b881 | 2015-09-15 15:55:15 +0000 | [diff] [blame] | 5637 | /* Opcode: Delete P1 P2 P3 P4 P5 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5638 | ** |
drh | 5edc312 | 2001-09-13 21:53:09 +0000 | [diff] [blame] | 5639 | ** Delete the record at which the P1 cursor is currently pointing. |
| 5640 | ** |
drh | e807bdb | 2016-01-21 17:06:33 +0000 | [diff] [blame] | 5641 | ** If the OPFLAG_SAVEPOSITION bit of the P5 parameter is set, then |
| 5642 | ** the cursor will be left pointing at either the next or the previous |
| 5643 | ** record in the table. If it is left pointing at the next record, then |
| 5644 | ** the next Next instruction will be a no-op. As a result, in this case |
| 5645 | ** it is ok to delete a record from within a Next loop. If |
| 5646 | ** OPFLAG_SAVEPOSITION bit of P5 is clear, then the cursor will be |
| 5647 | ** left in an undefined state. |
drh | c8d30ac | 2002-04-12 10:08:59 +0000 | [diff] [blame] | 5648 | ** |
drh | def19e3 | 2016-01-27 16:26:25 +0000 | [diff] [blame] | 5649 | ** If the OPFLAG_AUXDELETE bit is set on P5, that indicates that this |
| 5650 | ** delete one of several associated with deleting a table row and all its |
| 5651 | ** associated index entries. Exactly one of those deletes is the "primary" |
| 5652 | ** delete. The others are all on OPFLAG_FORDELETE cursors or else are |
| 5653 | ** marked with the AUXDELETE flag. |
drh | e807bdb | 2016-01-21 17:06:33 +0000 | [diff] [blame] | 5654 | ** |
| 5655 | ** If the OPFLAG_NCHANGE flag of P2 (NB: P2 not P5) is set, then the row |
| 5656 | ** change count is incremented (otherwise not). |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 5657 | ** |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 5658 | ** P1 must not be pseudo-table. It has to be a real table with |
| 5659 | ** multiple rows. |
| 5660 | ** |
drh | 5e769a5 | 2016-09-28 16:05:53 +0000 | [diff] [blame] | 5661 | ** If P4 is not NULL then it points to a Table object. In this case either |
dan | 319eeb7 | 2011-03-19 08:38:50 +0000 | [diff] [blame] | 5662 | ** the update or pre-update hook, or both, may be invoked. The P1 cursor must |
| 5663 | ** have been positioned using OP_NotFound prior to invoking this opcode in |
| 5664 | ** this case. Specifically, if one is configured, the pre-update hook is |
| 5665 | ** invoked if P4 is not NULL. The update-hook is invoked if one is configured, |
| 5666 | ** P4 is not NULL, and the OPFLAG_NCHANGE flag is set in P2. |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5667 | ** |
| 5668 | ** If the OPFLAG_ISUPDATE flag is set in P2, then P3 contains the address |
| 5669 | ** of the memory cell that contains the value that the rowid of the row will |
| 5670 | ** be set to by the update. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5671 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5672 | case OP_Delete: { |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 5673 | VdbeCursor *pC; |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5674 | const char *zDb; |
dan | 319eeb7 | 2011-03-19 08:38:50 +0000 | [diff] [blame] | 5675 | Table *pTab; |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5676 | int opflags; |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 5677 | |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5678 | opflags = pOp->p2; |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5679 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 5680 | pC = p->apCsr[pOp->p1]; |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 5681 | assert( pC!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5682 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 5683 | assert( pC->uc.pCursor!=0 ); |
drh | 9a65f2c | 2009-06-22 19:05:40 +0000 | [diff] [blame] | 5684 | assert( pC->deferredMoveto==0 ); |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 5685 | sqlite3VdbeIncrWriteCounter(p, pC); |
drh | 9a65f2c | 2009-06-22 19:05:40 +0000 | [diff] [blame] | 5686 | |
drh | b53a5a9 | 2014-10-12 22:37:22 +0000 | [diff] [blame] | 5687 | #ifdef SQLITE_DEBUG |
drh | 6b559f3 | 2020-01-02 19:50:50 +0000 | [diff] [blame] | 5688 | if( pOp->p4type==P4_TABLE |
| 5689 | && HasRowid(pOp->p4.pTab) |
| 5690 | && pOp->p5==0 |
| 5691 | && sqlite3BtreeCursorIsValidNN(pC->uc.pCursor) |
| 5692 | ){ |
dan | 438b881 | 2015-09-15 15:55:15 +0000 | [diff] [blame] | 5693 | /* If p5 is zero, the seek operation that positioned the cursor prior to |
| 5694 | ** OP_Delete will have also set the pC->movetoTarget field to the rowid of |
| 5695 | ** the row that is being deleted */ |
drh | a7c90c4 | 2016-06-04 20:37:10 +0000 | [diff] [blame] | 5696 | i64 iKey = sqlite3BtreeIntegerKey(pC->uc.pCursor); |
dan | 0971ef4 | 2019-05-16 20:13:32 +0000 | [diff] [blame] | 5697 | assert( CORRUPT_DB || pC->movetoTarget==iKey ); |
drh | b53a5a9 | 2014-10-12 22:37:22 +0000 | [diff] [blame] | 5698 | } |
| 5699 | #endif |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 5700 | |
dan | 438b881 | 2015-09-15 15:55:15 +0000 | [diff] [blame] | 5701 | /* If the update-hook or pre-update-hook will be invoked, set zDb to |
| 5702 | ** the name of the db to pass as to it. Also set local pTab to a copy |
| 5703 | ** of p4.pTab. Finally, if p5 is true, indicating that this cursor was |
| 5704 | ** last moved with OP_Next or OP_Prev, not Seek or NotFound, set |
| 5705 | ** VdbeCursor.movetoTarget to the current rowid. */ |
drh | c556f3c | 2016-03-30 15:30:07 +0000 | [diff] [blame] | 5706 | if( pOp->p4type==P4_TABLE && HAS_UPDATE_HOOK(db) ){ |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5707 | assert( pC->iDb>=0 ); |
drh | c556f3c | 2016-03-30 15:30:07 +0000 | [diff] [blame] | 5708 | assert( pOp->p4.pTab!=0 ); |
drh | 69c3382 | 2016-08-18 14:33:11 +0000 | [diff] [blame] | 5709 | zDb = db->aDb[pC->iDb].zDbSName; |
dan | 319eeb7 | 2011-03-19 08:38:50 +0000 | [diff] [blame] | 5710 | pTab = pOp->p4.pTab; |
drh | c556f3c | 2016-03-30 15:30:07 +0000 | [diff] [blame] | 5711 | if( (pOp->p5 & OPFLAG_SAVEPOSITION)!=0 && pC->isTable ){ |
drh | a7c90c4 | 2016-06-04 20:37:10 +0000 | [diff] [blame] | 5712 | pC->movetoTarget = sqlite3BtreeIntegerKey(pC->uc.pCursor); |
dan | 438b881 | 2015-09-15 15:55:15 +0000 | [diff] [blame] | 5713 | } |
drh | 74c3302 | 2016-03-30 12:56:55 +0000 | [diff] [blame] | 5714 | }else{ |
drh | e1e1a43 | 2021-10-05 11:11:43 +0000 | [diff] [blame] | 5715 | zDb = 0; |
| 5716 | pTab = 0; |
drh | 92fe38e | 2014-10-14 13:41:32 +0000 | [diff] [blame] | 5717 | } |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5718 | |
drh | 9b1c62d | 2011-03-30 21:04:43 +0000 | [diff] [blame] | 5719 | #ifdef SQLITE_ENABLE_PREUPDATE_HOOK |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5720 | /* Invoke the pre-update-hook if required. */ |
drh | e1e1a43 | 2021-10-05 11:11:43 +0000 | [diff] [blame] | 5721 | assert( db->xPreUpdateCallback==0 || pTab==pOp->p4.pTab ); |
| 5722 | if( db->xPreUpdateCallback && pTab ){ |
dan | cb9a364 | 2017-01-30 19:44:53 +0000 | [diff] [blame] | 5723 | assert( !(opflags & OPFLAG_ISUPDATE) |
| 5724 | || HasRowid(pTab)==0 |
| 5725 | || (aMem[pOp->p3].flags & MEM_Int) |
| 5726 | ); |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5727 | sqlite3VdbePreUpdateHook(p, pC, |
| 5728 | (opflags & OPFLAG_ISUPDATE) ? SQLITE_UPDATE : SQLITE_DELETE, |
drh | 92fe38e | 2014-10-14 13:41:32 +0000 | [diff] [blame] | 5729 | zDb, pTab, pC->movetoTarget, |
dan | a23a873 | 2021-04-21 20:52:17 +0000 | [diff] [blame] | 5730 | pOp->p3, -1 |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5731 | ); |
| 5732 | } |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5733 | if( opflags & OPFLAG_ISNOOP ) break; |
drh | c556f3c | 2016-03-30 15:30:07 +0000 | [diff] [blame] | 5734 | #endif |
drh | b53a5a9 | 2014-10-12 22:37:22 +0000 | [diff] [blame] | 5735 | |
drh | def19e3 | 2016-01-27 16:26:25 +0000 | [diff] [blame] | 5736 | /* Only flags that can be set are SAVEPOISTION and AUXDELETE */ |
| 5737 | assert( (pOp->p5 & ~(OPFLAG_SAVEPOSITION|OPFLAG_AUXDELETE))==0 ); |
drh | e807bdb | 2016-01-21 17:06:33 +0000 | [diff] [blame] | 5738 | assert( OPFLAG_SAVEPOSITION==BTREE_SAVEPOSITION ); |
drh | def19e3 | 2016-01-27 16:26:25 +0000 | [diff] [blame] | 5739 | assert( OPFLAG_AUXDELETE==BTREE_AUXDELETE ); |
drh | b89aeb6 | 2016-01-27 15:49:32 +0000 | [diff] [blame] | 5740 | |
| 5741 | #ifdef SQLITE_DEBUG |
dan | e61bbf4 | 2016-01-28 17:06:17 +0000 | [diff] [blame] | 5742 | if( p->pFrame==0 ){ |
| 5743 | if( pC->isEphemeral==0 |
| 5744 | && (pOp->p5 & OPFLAG_AUXDELETE)==0 |
| 5745 | && (pC->wrFlag & OPFLAG_FORDELETE)==0 |
| 5746 | ){ |
| 5747 | nExtraDelete++; |
| 5748 | } |
| 5749 | if( pOp->p2 & OPFLAG_NCHANGE ){ |
| 5750 | nExtraDelete--; |
| 5751 | } |
drh | b89aeb6 | 2016-01-27 15:49:32 +0000 | [diff] [blame] | 5752 | } |
| 5753 | #endif |
| 5754 | |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5755 | rc = sqlite3BtreeDelete(pC->uc.pCursor, pOp->p5); |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 5756 | pC->cacheStatus = CACHE_STALE; |
dan | 3b908d4 | 2016-11-08 19:22:32 +0000 | [diff] [blame] | 5757 | pC->seekResult = 0; |
drh | d3e1af4 | 2016-02-25 18:54:30 +0000 | [diff] [blame] | 5758 | if( rc ) goto abort_due_to_error; |
danielk1977 | 94eb6a1 | 2005-12-15 15:22:08 +0000 | [diff] [blame] | 5759 | |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 5760 | /* Invoke the update-hook if required. */ |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5761 | if( opflags & OPFLAG_NCHANGE ){ |
| 5762 | p->nChange++; |
drh | 7d4c94b | 2021-10-04 22:34:38 +0000 | [diff] [blame] | 5763 | if( db->xUpdateCallback && ALWAYS(pTab!=0) && HasRowid(pTab) ){ |
drh | 92fe38e | 2014-10-14 13:41:32 +0000 | [diff] [blame] | 5764 | db->xUpdateCallback(db->pUpdateArg, SQLITE_DELETE, zDb, pTab->zName, |
dan | 438b881 | 2015-09-15 15:55:15 +0000 | [diff] [blame] | 5765 | pC->movetoTarget); |
| 5766 | assert( pC->iDb>=0 ); |
dan | 46c47d4 | 2011-03-01 18:42:07 +0000 | [diff] [blame] | 5767 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5768 | } |
dan | 438b881 | 2015-09-15 15:55:15 +0000 | [diff] [blame] | 5769 | |
rdc | b0c374f | 2004-02-20 22:53:38 +0000 | [diff] [blame] | 5770 | break; |
| 5771 | } |
drh | b7f1d9a | 2009-09-08 02:27:58 +0000 | [diff] [blame] | 5772 | /* Opcode: ResetCount * * * * * |
rdc | b0c374f | 2004-02-20 22:53:38 +0000 | [diff] [blame] | 5773 | ** |
drh | b7f1d9a | 2009-09-08 02:27:58 +0000 | [diff] [blame] | 5774 | ** The value of the change counter is copied to the database handle |
| 5775 | ** change counter (returned by subsequent calls to sqlite3_changes()). |
| 5776 | ** Then the VMs internal change counter resets to 0. |
| 5777 | ** This is used by trigger programs. |
rdc | b0c374f | 2004-02-20 22:53:38 +0000 | [diff] [blame] | 5778 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5779 | case OP_ResetCount: { |
drh | b7f1d9a | 2009-09-08 02:27:58 +0000 | [diff] [blame] | 5780 | sqlite3VdbeSetChanges(db, p->nChange); |
danielk1977 | b28af71 | 2004-06-21 06:50:26 +0000 | [diff] [blame] | 5781 | p->nChange = 0; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5782 | break; |
| 5783 | } |
| 5784 | |
drh | 1153c7b | 2013-11-01 22:02:56 +0000 | [diff] [blame] | 5785 | /* Opcode: SorterCompare P1 P2 P3 P4 |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 5786 | ** Synopsis: if key(P1)!=trim(r[P3],P4) goto P2 |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5787 | ** |
drh | 1153c7b | 2013-11-01 22:02:56 +0000 | [diff] [blame] | 5788 | ** P1 is a sorter cursor. This instruction compares a prefix of the |
drh | bc5cf38 | 2014-08-06 01:08:07 +0000 | [diff] [blame] | 5789 | ** record blob in register P3 against a prefix of the entry that |
drh | ac50232 | 2014-07-30 13:56:48 +0000 | [diff] [blame] | 5790 | ** the sorter cursor currently points to. Only the first P4 fields |
| 5791 | ** of r[P3] and the sorter record are compared. |
drh | 1153c7b | 2013-11-01 22:02:56 +0000 | [diff] [blame] | 5792 | ** |
| 5793 | ** If either P3 or the sorter contains a NULL in one of their significant |
| 5794 | ** fields (not counting the P4 fields at the end which are ignored) then |
| 5795 | ** the comparison is assumed to be equal. |
| 5796 | ** |
| 5797 | ** Fall through to next instruction if the two records compare equal to |
| 5798 | ** each other. Jump to P2 if they are different. |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5799 | */ |
| 5800 | case OP_SorterCompare: { |
| 5801 | VdbeCursor *pC; |
| 5802 | int res; |
drh | ac50232 | 2014-07-30 13:56:48 +0000 | [diff] [blame] | 5803 | int nKeyCol; |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5804 | |
| 5805 | pC = p->apCsr[pOp->p1]; |
| 5806 | assert( isSorter(pC) ); |
drh | 1153c7b | 2013-11-01 22:02:56 +0000 | [diff] [blame] | 5807 | assert( pOp->p4type==P4_INT32 ); |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5808 | pIn3 = &aMem[pOp->p3]; |
drh | ac50232 | 2014-07-30 13:56:48 +0000 | [diff] [blame] | 5809 | nKeyCol = pOp->p4.i; |
drh | 958d261 | 2014-04-18 13:40:07 +0000 | [diff] [blame] | 5810 | res = 0; |
drh | ac50232 | 2014-07-30 13:56:48 +0000 | [diff] [blame] | 5811 | rc = sqlite3VdbeSorterCompare(pC, pIn3, nKeyCol, &res); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 5812 | VdbeBranchTaken(res!=0,2); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5813 | if( rc ) goto abort_due_to_error; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 5814 | if( res ) goto jump_to_p2; |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5815 | break; |
| 5816 | }; |
| 5817 | |
drh | 6cf4a7d | 2014-10-13 13:00:58 +0000 | [diff] [blame] | 5818 | /* Opcode: SorterData P1 P2 P3 * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 5819 | ** Synopsis: r[P2]=data |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5820 | ** |
| 5821 | ** Write into register P2 the current sorter data for sorter cursor P1. |
drh | 6cf4a7d | 2014-10-13 13:00:58 +0000 | [diff] [blame] | 5822 | ** Then clear the column header cache on cursor P3. |
| 5823 | ** |
| 5824 | ** This opcode is normally use to move a record out of the sorter and into |
| 5825 | ** a register that is the source for a pseudo-table cursor created using |
| 5826 | ** OpenPseudo. That pseudo-table cursor is the one that is identified by |
| 5827 | ** parameter P3. Clearing the P3 column cache as part of this opcode saves |
| 5828 | ** us from having to issue a separate NullRow instruction to clear that cache. |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5829 | */ |
| 5830 | case OP_SorterData: { |
| 5831 | VdbeCursor *pC; |
drh | 3a94987 | 2012-09-18 13:20:13 +0000 | [diff] [blame] | 5832 | |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5833 | pOut = &aMem[pOp->p2]; |
| 5834 | pC = p->apCsr[pOp->p1]; |
drh | 14da87f | 2013-11-20 21:51:33 +0000 | [diff] [blame] | 5835 | assert( isSorter(pC) ); |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5836 | rc = sqlite3VdbeSorterRowkey(pC, pOut); |
dan | 3852413 | 2014-05-01 20:26:48 +0000 | [diff] [blame] | 5837 | assert( rc!=SQLITE_OK || (pOut->flags & MEM_Blob) ); |
drh | 6cf4a7d | 2014-10-13 13:00:58 +0000 | [diff] [blame] | 5838 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5839 | if( rc ) goto abort_due_to_error; |
drh | 6cf4a7d | 2014-10-13 13:00:58 +0000 | [diff] [blame] | 5840 | p->apCsr[pOp->p3]->cacheStatus = CACHE_STALE; |
dan | 5134d13 | 2011-09-02 10:31:11 +0000 | [diff] [blame] | 5841 | break; |
| 5842 | } |
| 5843 | |
drh | e7b554d | 2017-01-09 15:44:25 +0000 | [diff] [blame] | 5844 | /* Opcode: RowData P1 P2 P3 * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 5845 | ** Synopsis: r[P2]=data |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 5846 | ** |
drh | 9057fc7 | 2016-11-25 19:32:32 +0000 | [diff] [blame] | 5847 | ** Write into register P2 the complete row content for the row at |
| 5848 | ** which cursor P1 is currently pointing. |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 5849 | ** There is no interpretation of the data. |
| 5850 | ** It is just copied onto the P2 register exactly as |
danielk1977 | 96cb76f | 2008-01-04 13:24:28 +0000 | [diff] [blame] | 5851 | ** it is found in the database file. |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 5852 | ** |
drh | 9057fc7 | 2016-11-25 19:32:32 +0000 | [diff] [blame] | 5853 | ** If cursor P1 is an index, then the content is the key of the row. |
| 5854 | ** If cursor P2 is a table, then the content extracted is the data. |
drh | 143f3c4 | 2004-01-07 20:37:52 +0000 | [diff] [blame] | 5855 | ** |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 5856 | ** If the P1 cursor must be pointing to a valid row (not a NULL row) |
| 5857 | ** of a real table, not a pseudo-table. |
drh | e7b554d | 2017-01-09 15:44:25 +0000 | [diff] [blame] | 5858 | ** |
drh | 8cdafc3 | 2018-05-31 19:00:20 +0000 | [diff] [blame] | 5859 | ** If P3!=0 then this opcode is allowed to make an ephemeral pointer |
drh | e7b554d | 2017-01-09 15:44:25 +0000 | [diff] [blame] | 5860 | ** into the database page. That means that the content of the output |
| 5861 | ** register will be invalidated as soon as the cursor moves - including |
drh | 416a801 | 2018-05-31 19:14:52 +0000 | [diff] [blame] | 5862 | ** moves caused by other cursors that "save" the current cursors |
drh | e7b554d | 2017-01-09 15:44:25 +0000 | [diff] [blame] | 5863 | ** position in order that they can write to the same table. If P3==0 |
| 5864 | ** then a copy of the data is made into memory. P3!=0 is faster, but |
| 5865 | ** P3==0 is safer. |
| 5866 | ** |
| 5867 | ** If P3!=0 then the content of the P2 register is unsuitable for use |
| 5868 | ** in OP_Result and any OP_Result will invalidate the P2 register content. |
mistachkin | ab61cf7 | 2017-01-09 18:22:54 +0000 | [diff] [blame] | 5869 | ** The P2 register content is invalidated by opcodes like OP_Function or |
drh | e7b554d | 2017-01-09 15:44:25 +0000 | [diff] [blame] | 5870 | ** by any use of another cursor pointing to the same table. |
drh | 143f3c4 | 2004-01-07 20:37:52 +0000 | [diff] [blame] | 5871 | */ |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 5872 | case OP_RowData: { |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 5873 | VdbeCursor *pC; |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 5874 | BtCursor *pCrsr; |
danielk1977 | e0d4b06 | 2004-06-28 01:11:46 +0000 | [diff] [blame] | 5875 | u32 n; |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 5876 | |
drh | e7b554d | 2017-01-09 15:44:25 +0000 | [diff] [blame] | 5877 | pOut = out2Prerelease(p, pOp); |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 5878 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5879 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 5880 | pC = p->apCsr[pOp->p1]; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5881 | assert( pC!=0 ); |
| 5882 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | 14da87f | 2013-11-20 21:51:33 +0000 | [diff] [blame] | 5883 | assert( isSorter(pC)==0 ); |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 5884 | assert( pC->nullRow==0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5885 | assert( pC->uc.pCursor!=0 ); |
| 5886 | pCrsr = pC->uc.pCursor; |
drh | 9a65f2c | 2009-06-22 19:05:40 +0000 | [diff] [blame] | 5887 | |
drh | 9057fc7 | 2016-11-25 19:32:32 +0000 | [diff] [blame] | 5888 | /* The OP_RowData opcodes always follow OP_NotExists or |
drh | eeb9565 | 2016-05-26 20:56:38 +0000 | [diff] [blame] | 5889 | ** OP_SeekRowid or OP_Rewind/Op_Next with no intervening instructions |
| 5890 | ** that might invalidate the cursor. |
| 5891 | ** If this where not the case, on of the following assert()s |
drh | c22284f | 2014-10-13 16:02:20 +0000 | [diff] [blame] | 5892 | ** would fail. Should this ever change (because of changes in the code |
| 5893 | ** generator) then the fix would be to insert a call to |
| 5894 | ** sqlite3VdbeCursorMoveto(). |
drh | 9a65f2c | 2009-06-22 19:05:40 +0000 | [diff] [blame] | 5895 | */ |
| 5896 | assert( pC->deferredMoveto==0 ); |
drh | c22284f | 2014-10-13 16:02:20 +0000 | [diff] [blame] | 5897 | assert( sqlite3BtreeCursorIsValid(pCrsr) ); |
drh | 9a65f2c | 2009-06-22 19:05:40 +0000 | [diff] [blame] | 5898 | |
drh | a7c90c4 | 2016-06-04 20:37:10 +0000 | [diff] [blame] | 5899 | n = sqlite3BtreePayloadSize(pCrsr); |
drh | d66c4f8 | 2016-06-04 20:58:35 +0000 | [diff] [blame] | 5900 | if( n>(u32)db->aLimit[SQLITE_LIMIT_LENGTH] ){ |
drh | a7c90c4 | 2016-06-04 20:37:10 +0000 | [diff] [blame] | 5901 | goto too_big; |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 5902 | } |
drh | 722246e | 2014-10-07 23:02:24 +0000 | [diff] [blame] | 5903 | testcase( n==0 ); |
drh | 2a74006 | 2020-02-05 18:28:17 +0000 | [diff] [blame] | 5904 | rc = sqlite3VdbeMemFromBtreeZeroOffset(pCrsr, n, pOut); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5905 | if( rc ) goto abort_due_to_error; |
drh | e7b554d | 2017-01-09 15:44:25 +0000 | [diff] [blame] | 5906 | if( !pOp->p3 ) Deephemeralize(pOut); |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 5907 | UPDATE_MAX_BLOBSIZE(pOut); |
drh | ee0ec8e | 2013-10-31 17:38:01 +0000 | [diff] [blame] | 5908 | REGISTER_TRACE(pOp->p2, pOut); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5909 | break; |
| 5910 | } |
| 5911 | |
drh | 2133d82 | 2008-01-03 18:44:59 +0000 | [diff] [blame] | 5912 | /* Opcode: Rowid P1 P2 * * * |
drh | 088b615 | 2022-04-18 13:57:57 +0000 | [diff] [blame] | 5913 | ** Synopsis: r[P2]=PX rowid of P1 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5914 | ** |
drh | 2133d82 | 2008-01-03 18:44:59 +0000 | [diff] [blame] | 5915 | ** Store in register P2 an integer which is the key of the table entry that |
drh | bfdc754 | 2008-05-29 03:12:54 +0000 | [diff] [blame] | 5916 | ** P1 is currently point to. |
drh | 044925b | 2009-04-22 17:15:02 +0000 | [diff] [blame] | 5917 | ** |
| 5918 | ** P1 can be either an ordinary table or a virtual table. There used to |
| 5919 | ** be a separate OP_VRowid opcode for use with virtual tables, but this |
| 5920 | ** one opcode now works for both table types. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5921 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 5922 | case OP_Rowid: { /* out2, ncycle */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 5923 | VdbeCursor *pC; |
drh | f328bc8 | 2004-05-10 23:29:49 +0000 | [diff] [blame] | 5924 | i64 v; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 5925 | sqlite3_vtab *pVtab; |
| 5926 | const sqlite3_module *pModule; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5927 | |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 5928 | pOut = out2Prerelease(p, pOp); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5929 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 5930 | pC = p->apCsr[pOp->p1]; |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 5931 | assert( pC!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5932 | assert( pC->eCurType!=CURTYPE_PSEUDO || pC->nullRow ); |
drh | 044925b | 2009-04-22 17:15:02 +0000 | [diff] [blame] | 5933 | if( pC->nullRow ){ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 5934 | pOut->flags = MEM_Null; |
drh | 044925b | 2009-04-22 17:15:02 +0000 | [diff] [blame] | 5935 | break; |
| 5936 | }else if( pC->deferredMoveto ){ |
drh | 6149526 | 2009-04-22 15:32:59 +0000 | [diff] [blame] | 5937 | v = pC->movetoTarget; |
drh | 044925b | 2009-04-22 17:15:02 +0000 | [diff] [blame] | 5938 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5939 | }else if( pC->eCurType==CURTYPE_VTAB ){ |
| 5940 | assert( pC->uc.pVCur!=0 ); |
| 5941 | pVtab = pC->uc.pVCur->pVtab; |
drh | 044925b | 2009-04-22 17:15:02 +0000 | [diff] [blame] | 5942 | pModule = pVtab->pModule; |
| 5943 | assert( pModule->xRowid ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5944 | rc = pModule->xRowid(pC->uc.pVCur, &v); |
dan | 016f781 | 2013-08-21 17:35:48 +0000 | [diff] [blame] | 5945 | sqlite3VtabImportErrmsg(p, pVtab); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 5946 | if( rc ) goto abort_due_to_error; |
drh | 044925b | 2009-04-22 17:15:02 +0000 | [diff] [blame] | 5947 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 5948 | }else{ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5949 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 5950 | assert( pC->uc.pCursor!=0 ); |
drh | c22284f | 2014-10-13 16:02:20 +0000 | [diff] [blame] | 5951 | rc = sqlite3VdbeCursorRestore(pC); |
drh | 6149526 | 2009-04-22 15:32:59 +0000 | [diff] [blame] | 5952 | if( rc ) goto abort_due_to_error; |
dan | 2b8669a | 2014-11-17 19:42:48 +0000 | [diff] [blame] | 5953 | if( pC->nullRow ){ |
| 5954 | pOut->flags = MEM_Null; |
| 5955 | break; |
| 5956 | } |
drh | a7c90c4 | 2016-06-04 20:37:10 +0000 | [diff] [blame] | 5957 | v = sqlite3BtreeIntegerKey(pC->uc.pCursor); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5958 | } |
drh | 4c58312 | 2008-01-04 22:01:03 +0000 | [diff] [blame] | 5959 | pOut->u.i = v; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 5960 | break; |
| 5961 | } |
| 5962 | |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5963 | /* Opcode: NullRow P1 * * * * |
drh | 17f7193 | 2002-02-21 12:01:27 +0000 | [diff] [blame] | 5964 | ** |
| 5965 | ** Move the cursor P1 to a null row. Any OP_Column operations |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5966 | ** that occur while the cursor is on the null row will always |
| 5967 | ** write a NULL. |
drh | a10be3d | 2022-02-25 18:51:09 +0000 | [diff] [blame] | 5968 | ** |
drh | 3ac6243 | 2022-04-13 17:41:03 +0000 | [diff] [blame] | 5969 | ** If cursor P1 is not previously opened, open it now to a special |
| 5970 | ** pseudo-cursor that always returns NULL for every column. |
drh | 17f7193 | 2002-02-21 12:01:27 +0000 | [diff] [blame] | 5971 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 5972 | case OP_NullRow: { |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 5973 | VdbeCursor *pC; |
drh | 17f7193 | 2002-02-21 12:01:27 +0000 | [diff] [blame] | 5974 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 5975 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 5976 | pC = p->apCsr[pOp->p1]; |
drh | 3ac6243 | 2022-04-13 17:41:03 +0000 | [diff] [blame] | 5977 | if( pC==0 ){ |
| 5978 | /* If the cursor is not already open, create a special kind of |
| 5979 | ** pseudo-cursor that always gives null rows. */ |
| 5980 | pC = allocateCursor(p, pOp->p1, 1, CURTYPE_PSEUDO); |
| 5981 | if( pC==0 ) goto no_mem; |
| 5982 | pC->seekResult = 0; |
| 5983 | pC->isTable = 1; |
drh | 27a242c | 2022-06-14 22:21:23 +0000 | [diff] [blame] | 5984 | pC->noReuse = 1; |
drh | 3ac6243 | 2022-04-13 17:41:03 +0000 | [diff] [blame] | 5985 | pC->uc.pCursor = sqlite3BtreeFakeValidCursor(); |
| 5986 | } |
drh | d7556d2 | 2004-05-14 21:59:40 +0000 | [diff] [blame] | 5987 | pC->nullRow = 1; |
drh | 399af1d | 2013-11-20 17:25:55 +0000 | [diff] [blame] | 5988 | pC->cacheStatus = CACHE_STALE; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 5989 | if( pC->eCurType==CURTYPE_BTREE ){ |
| 5990 | assert( pC->uc.pCursor!=0 ); |
| 5991 | sqlite3BtreeClearCursor(pC->uc.pCursor); |
danielk1977 | be51a65 | 2008-10-08 17:58:48 +0000 | [diff] [blame] | 5992 | } |
drh | cf025a8 | 2018-06-07 18:01:21 +0000 | [diff] [blame] | 5993 | #ifdef SQLITE_DEBUG |
| 5994 | if( pC->seekOp==0 ) pC->seekOp = OP_NullRow; |
| 5995 | #endif |
drh | 17f7193 | 2002-02-21 12:01:27 +0000 | [diff] [blame] | 5996 | break; |
| 5997 | } |
| 5998 | |
drh | 86b40df | 2017-08-01 19:53:43 +0000 | [diff] [blame] | 5999 | /* Opcode: SeekEnd P1 * * * * |
| 6000 | ** |
| 6001 | ** Position cursor P1 at the end of the btree for the purpose of |
| 6002 | ** appending a new entry onto the btree. |
| 6003 | ** |
| 6004 | ** It is assumed that the cursor is used only for appending and so |
| 6005 | ** if the cursor is valid, then the cursor must already be pointing |
| 6006 | ** at the end of the btree and so no changes are made to |
| 6007 | ** the cursor. |
| 6008 | */ |
| 6009 | /* Opcode: Last P1 P2 * * * |
drh | 9562b55 | 2002-02-19 15:00:07 +0000 | [diff] [blame] | 6010 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6011 | ** The next use of the Rowid or Column or Prev instruction for P1 |
drh | 9562b55 | 2002-02-19 15:00:07 +0000 | [diff] [blame] | 6012 | ** will refer to the last entry in the database table or index. |
| 6013 | ** If the table or index is empty and P2>0, then jump immediately to P2. |
| 6014 | ** If P2 is 0 or if the table or index is not empty, fall through |
| 6015 | ** to the following instruction. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6016 | ** |
| 6017 | ** This opcode leaves the cursor configured to move in reverse order, |
| 6018 | ** from the end toward the beginning. In other words, the cursor is |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 6019 | ** configured to use Prev, not Next. |
drh | 9562b55 | 2002-02-19 15:00:07 +0000 | [diff] [blame] | 6020 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 6021 | case OP_SeekEnd: /* ncycle */ |
| 6022 | case OP_Last: { /* jump, ncycle */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 6023 | VdbeCursor *pC; |
drh | 9562b55 | 2002-02-19 15:00:07 +0000 | [diff] [blame] | 6024 | BtCursor *pCrsr; |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 6025 | int res; |
drh | 9562b55 | 2002-02-19 15:00:07 +0000 | [diff] [blame] | 6026 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6027 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6028 | pC = p->apCsr[pOp->p1]; |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 6029 | assert( pC!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6030 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 6031 | pCrsr = pC->uc.pCursor; |
drh | 7abc540 | 2011-10-22 21:00:46 +0000 | [diff] [blame] | 6032 | res = 0; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6033 | assert( pCrsr!=0 ); |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6034 | #ifdef SQLITE_DEBUG |
drh | 86b40df | 2017-08-01 19:53:43 +0000 | [diff] [blame] | 6035 | pC->seekOp = pOp->opcode; |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6036 | #endif |
drh | 86b40df | 2017-08-01 19:53:43 +0000 | [diff] [blame] | 6037 | if( pOp->opcode==OP_SeekEnd ){ |
drh | d6ef5af | 2016-11-15 04:00:24 +0000 | [diff] [blame] | 6038 | assert( pOp->p2==0 ); |
drh | 86b40df | 2017-08-01 19:53:43 +0000 | [diff] [blame] | 6039 | pC->seekResult = -1; |
| 6040 | if( sqlite3BtreeCursorIsValidNN(pCrsr) ){ |
| 6041 | break; |
| 6042 | } |
| 6043 | } |
| 6044 | rc = sqlite3BtreeLast(pCrsr, &res); |
| 6045 | pC->nullRow = (u8)res; |
| 6046 | pC->deferredMoveto = 0; |
| 6047 | pC->cacheStatus = CACHE_STALE; |
| 6048 | if( rc ) goto abort_due_to_error; |
| 6049 | if( pOp->p2>0 ){ |
| 6050 | VdbeBranchTaken(res!=0,2); |
| 6051 | if( res ) goto jump_to_p2; |
drh | 9562b55 | 2002-02-19 15:00:07 +0000 | [diff] [blame] | 6052 | } |
| 6053 | break; |
| 6054 | } |
| 6055 | |
drh | 5e98e83 | 2017-02-17 19:24:06 +0000 | [diff] [blame] | 6056 | /* Opcode: IfSmaller P1 P2 P3 * * |
| 6057 | ** |
| 6058 | ** Estimate the number of rows in the table P1. Jump to P2 if that |
| 6059 | ** estimate is less than approximately 2**(0.1*P3). |
| 6060 | */ |
| 6061 | case OP_IfSmaller: { /* jump */ |
| 6062 | VdbeCursor *pC; |
| 6063 | BtCursor *pCrsr; |
| 6064 | int res; |
| 6065 | i64 sz; |
| 6066 | |
| 6067 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6068 | pC = p->apCsr[pOp->p1]; |
| 6069 | assert( pC!=0 ); |
| 6070 | pCrsr = pC->uc.pCursor; |
| 6071 | assert( pCrsr ); |
| 6072 | rc = sqlite3BtreeFirst(pCrsr, &res); |
| 6073 | if( rc ) goto abort_due_to_error; |
| 6074 | if( res==0 ){ |
| 6075 | sz = sqlite3BtreeRowCountEst(pCrsr); |
| 6076 | if( ALWAYS(sz>=0) && sqlite3LogEst((u64)sz)<pOp->p3 ) res = 1; |
| 6077 | } |
| 6078 | VdbeBranchTaken(res!=0,2); |
| 6079 | if( res ) goto jump_to_p2; |
| 6080 | break; |
| 6081 | } |
| 6082 | |
drh | 0342b1f | 2005-09-01 03:07:44 +0000 | [diff] [blame] | 6083 | |
drh | 6bd4dc6 | 2016-12-23 16:05:22 +0000 | [diff] [blame] | 6084 | /* Opcode: SorterSort P1 P2 * * * |
| 6085 | ** |
| 6086 | ** After all records have been inserted into the Sorter object |
| 6087 | ** identified by P1, invoke this opcode to actually do the sorting. |
| 6088 | ** Jump to P2 if there are no records to be sorted. |
| 6089 | ** |
| 6090 | ** This opcode is an alias for OP_Sort and OP_Rewind that is used |
| 6091 | ** for Sorter objects. |
| 6092 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6093 | /* Opcode: Sort P1 P2 * * * |
drh | 0342b1f | 2005-09-01 03:07:44 +0000 | [diff] [blame] | 6094 | ** |
| 6095 | ** This opcode does exactly the same thing as OP_Rewind except that |
| 6096 | ** it increments an undocumented global variable used for testing. |
| 6097 | ** |
| 6098 | ** Sorting is accomplished by writing records into a sorting index, |
| 6099 | ** then rewinding that index and playing it back from beginning to |
| 6100 | ** end. We use the OP_Sort opcode instead of OP_Rewind to do the |
| 6101 | ** rewinding so that the global variable will be incremented and |
| 6102 | ** regression tests can determine whether or not the optimizer is |
| 6103 | ** correctly optimizing out sorts. |
| 6104 | */ |
drh | c6aff30 | 2011-09-01 15:32:47 +0000 | [diff] [blame] | 6105 | case OP_SorterSort: /* jump */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6106 | case OP_Sort: { /* jump */ |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 6107 | #ifdef SQLITE_TEST |
drh | 0342b1f | 2005-09-01 03:07:44 +0000 | [diff] [blame] | 6108 | sqlite3_sort_count++; |
drh | 4db38a7 | 2005-09-01 12:16:28 +0000 | [diff] [blame] | 6109 | sqlite3_search_count--; |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 6110 | #endif |
drh | 9b47ee3 | 2013-08-20 03:13:51 +0000 | [diff] [blame] | 6111 | p->aCounter[SQLITE_STMTSTATUS_SORT]++; |
drh | 0342b1f | 2005-09-01 03:07:44 +0000 | [diff] [blame] | 6112 | /* Fall through into OP_Rewind */ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 6113 | /* no break */ deliberate_fall_through |
drh | 0342b1f | 2005-09-01 03:07:44 +0000 | [diff] [blame] | 6114 | } |
drh | 038ebf6 | 2019-03-29 15:21:22 +0000 | [diff] [blame] | 6115 | /* Opcode: Rewind P1 P2 * * * |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6116 | ** |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 6117 | ** The next use of the Rowid or Column or Next instruction for P1 |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6118 | ** will refer to the first entry in the database table or index. |
dan | 04489b6 | 2014-10-31 20:11:32 +0000 | [diff] [blame] | 6119 | ** If the table or index is empty, jump immediately to P2. |
| 6120 | ** If the table or index is not empty, fall through to the following |
| 6121 | ** instruction. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6122 | ** |
| 6123 | ** This opcode leaves the cursor configured to move in forward order, |
drh | 4ed2fb9 | 2014-08-14 13:06:25 +0000 | [diff] [blame] | 6124 | ** from the beginning toward the end. In other words, the cursor is |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 6125 | ** configured to use Next, not Prev. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6126 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 6127 | case OP_Rewind: { /* jump, ncycle */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 6128 | VdbeCursor *pC; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6129 | BtCursor *pCrsr; |
drh | f4dada7 | 2004-05-11 09:57:35 +0000 | [diff] [blame] | 6130 | int res; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6131 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6132 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 038ebf6 | 2019-03-29 15:21:22 +0000 | [diff] [blame] | 6133 | assert( pOp->p5==0 ); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6134 | pC = p->apCsr[pOp->p1]; |
drh | 4774b13 | 2004-06-12 20:12:51 +0000 | [diff] [blame] | 6135 | assert( pC!=0 ); |
drh | 14da87f | 2013-11-20 21:51:33 +0000 | [diff] [blame] | 6136 | assert( isSorter(pC)==(pOp->opcode==OP_SorterSort) ); |
dan | 2411dea | 2010-07-03 05:56:09 +0000 | [diff] [blame] | 6137 | res = 1; |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6138 | #ifdef SQLITE_DEBUG |
| 6139 | pC->seekOp = OP_Rewind; |
| 6140 | #endif |
dan | 689ab89 | 2011-08-12 15:02:00 +0000 | [diff] [blame] | 6141 | if( isSorter(pC) ){ |
drh | 958d261 | 2014-04-18 13:40:07 +0000 | [diff] [blame] | 6142 | rc = sqlite3VdbeSorterRewind(pC, &res); |
dan | a205a48 | 2011-08-27 18:48:57 +0000 | [diff] [blame] | 6143 | }else{ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6144 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 6145 | pCrsr = pC->uc.pCursor; |
dan | a205a48 | 2011-08-27 18:48:57 +0000 | [diff] [blame] | 6146 | assert( pCrsr ); |
danielk1977 | 4adee20 | 2004-05-08 08:23:19 +0000 | [diff] [blame] | 6147 | rc = sqlite3BtreeFirst(pCrsr, &res); |
drh | a11846b | 2004-01-07 18:52:56 +0000 | [diff] [blame] | 6148 | pC->deferredMoveto = 0; |
drh | 76873ab | 2006-01-07 18:48:26 +0000 | [diff] [blame] | 6149 | pC->cacheStatus = CACHE_STALE; |
drh | f4dada7 | 2004-05-11 09:57:35 +0000 | [diff] [blame] | 6150 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6151 | if( rc ) goto abort_due_to_error; |
drh | 9c1905f | 2008-12-10 22:32:56 +0000 | [diff] [blame] | 6152 | pC->nullRow = (u8)res; |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 6153 | assert( pOp->p2>0 && pOp->p2<p->nOp ); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 6154 | VdbeBranchTaken(res!=0,2); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 6155 | if( res ) goto jump_to_p2; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6156 | break; |
| 6157 | } |
| 6158 | |
drh | a7c9dd5 | 2022-02-24 14:44:23 +0000 | [diff] [blame] | 6159 | /* Opcode: Next P1 P2 P3 * P5 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6160 | ** |
| 6161 | ** Advance cursor P1 so that it points to the next key/data pair in its |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6162 | ** table or index. If there are no more key/value pairs then fall through |
| 6163 | ** to the following instruction. But if the cursor advance was successful, |
| 6164 | ** jump immediately to P2. |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 6165 | ** |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 6166 | ** The Next opcode is only valid following an SeekGT, SeekGE, or |
| 6167 | ** OP_Rewind opcode used to position the cursor. Next is not allowed |
| 6168 | ** to follow SeekLT, SeekLE, or OP_Last. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6169 | ** |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6170 | ** The P1 cursor must be for a real table, not a pseudo-table. P1 must have |
| 6171 | ** been opened prior to this opcode or the program will segfault. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 6172 | ** |
drh | e39a732 | 2014-02-03 14:04:11 +0000 | [diff] [blame] | 6173 | ** The P3 value is a hint to the btree implementation. If P3==1, that |
| 6174 | ** means P1 is an SQL index and that this instruction could have been |
| 6175 | ** omitted if that index had been unique. P3 is usually 0. P3 is |
| 6176 | ** always either 0 or 1. |
| 6177 | ** |
drh | afc266a | 2010-03-31 17:47:44 +0000 | [diff] [blame] | 6178 | ** If P5 is positive and the jump is taken, then event counter |
| 6179 | ** number P5-1 in the prepared statement is incremented. |
| 6180 | ** |
drh | f1949b6 | 2018-06-07 17:32:59 +0000 | [diff] [blame] | 6181 | ** See also: Prev |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6182 | */ |
drh | a7c9dd5 | 2022-02-24 14:44:23 +0000 | [diff] [blame] | 6183 | /* Opcode: Prev P1 P2 P3 * P5 |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 6184 | ** |
| 6185 | ** Back up cursor P1 so that it points to the previous key/data pair in its |
| 6186 | ** table or index. If there is no previous key/value pairs then fall through |
| 6187 | ** to the following instruction. But if the cursor backup was successful, |
| 6188 | ** jump immediately to P2. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 6189 | ** |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6190 | ** |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 6191 | ** The Prev opcode is only valid following an SeekLT, SeekLE, or |
| 6192 | ** OP_Last opcode used to position the cursor. Prev is not allowed |
| 6193 | ** to follow SeekGT, SeekGE, or OP_Rewind. |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6194 | ** |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6195 | ** The P1 cursor must be for a real table, not a pseudo-table. If P1 is |
| 6196 | ** not open then the behavior is undefined. |
drh | afc266a | 2010-03-31 17:47:44 +0000 | [diff] [blame] | 6197 | ** |
drh | e39a732 | 2014-02-03 14:04:11 +0000 | [diff] [blame] | 6198 | ** The P3 value is a hint to the btree implementation. If P3==1, that |
| 6199 | ** means P1 is an SQL index and that this instruction could have been |
| 6200 | ** omitted if that index had been unique. P3 is usually 0. P3 is |
| 6201 | ** always either 0 or 1. |
| 6202 | ** |
drh | afc266a | 2010-03-31 17:47:44 +0000 | [diff] [blame] | 6203 | ** If P5 is positive and the jump is taken, then event counter |
| 6204 | ** number P5-1 in the prepared statement is incremented. |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 6205 | */ |
drh | 6bd4dc6 | 2016-12-23 16:05:22 +0000 | [diff] [blame] | 6206 | /* Opcode: SorterNext P1 P2 * * P5 |
| 6207 | ** |
| 6208 | ** This opcode works just like OP_Next except that P1 must be a |
| 6209 | ** sorter object for which the OP_SorterSort opcode has been |
| 6210 | ** invoked. This opcode advances the cursor to the next sorted |
| 6211 | ** record, or jumps to P2 if there are no more sorted records. |
| 6212 | */ |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6213 | case OP_SorterNext: { /* jump */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 6214 | VdbeCursor *pC; |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6215 | |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6216 | pC = p->apCsr[pOp->p1]; |
| 6217 | assert( isSorter(pC) ); |
drh | 2ab792e | 2017-05-30 18:34:07 +0000 | [diff] [blame] | 6218 | rc = sqlite3VdbeSorterNext(db, pC); |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6219 | goto next_tail; |
drh | a7c9dd5 | 2022-02-24 14:44:23 +0000 | [diff] [blame] | 6220 | |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 6221 | case OP_Prev: /* jump, ncycle */ |
drh | a7c9dd5 | 2022-02-24 14:44:23 +0000 | [diff] [blame] | 6222 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 35908b1 | 2022-08-23 17:51:39 +0000 | [diff] [blame] | 6223 | assert( pOp->p5==0 |
| 6224 | || pOp->p5==SQLITE_STMTSTATUS_FULLSCAN_STEP |
| 6225 | || pOp->p5==SQLITE_STMTSTATUS_AUTOINDEX); |
drh | a7c9dd5 | 2022-02-24 14:44:23 +0000 | [diff] [blame] | 6226 | pC = p->apCsr[pOp->p1]; |
| 6227 | assert( pC!=0 ); |
| 6228 | assert( pC->deferredMoveto==0 ); |
| 6229 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 6230 | assert( pC->seekOp==OP_SeekLT || pC->seekOp==OP_SeekLE |
| 6231 | || pC->seekOp==OP_Last || pC->seekOp==OP_IfNoHope |
| 6232 | || pC->seekOp==OP_NullRow); |
| 6233 | rc = sqlite3BtreePrevious(pC->uc.pCursor, pOp->p3); |
| 6234 | goto next_tail; |
| 6235 | |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 6236 | case OP_Next: /* jump, ncycle */ |
drh | 70ce3f0 | 2003-04-15 19:22:22 +0000 | [diff] [blame] | 6237 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
drh | 35908b1 | 2022-08-23 17:51:39 +0000 | [diff] [blame] | 6238 | assert( pOp->p5==0 |
| 6239 | || pOp->p5==SQLITE_STMTSTATUS_FULLSCAN_STEP |
| 6240 | || pOp->p5==SQLITE_STMTSTATUS_AUTOINDEX); |
drh | d7556d2 | 2004-05-14 21:59:40 +0000 | [diff] [blame] | 6241 | pC = p->apCsr[pOp->p1]; |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6242 | assert( pC!=0 ); |
| 6243 | assert( pC->deferredMoveto==0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6244 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | a7c9dd5 | 2022-02-24 14:44:23 +0000 | [diff] [blame] | 6245 | assert( pC->seekOp==OP_SeekGT || pC->seekOp==OP_SeekGE |
drh | 790b37a | 2019-08-27 17:01:07 +0000 | [diff] [blame] | 6246 | || pC->seekOp==OP_Rewind || pC->seekOp==OP_Found |
| 6247 | || pC->seekOp==OP_NullRow|| pC->seekOp==OP_SeekRowid |
| 6248 | || pC->seekOp==OP_IfNoHope); |
drh | a7c9dd5 | 2022-02-24 14:44:23 +0000 | [diff] [blame] | 6249 | rc = sqlite3BtreeNext(pC->uc.pCursor, pOp->p3); |
drh | 8af3f77 | 2014-07-25 18:01:06 +0000 | [diff] [blame] | 6250 | |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6251 | next_tail: |
drh | a346058 | 2008-07-11 21:02:53 +0000 | [diff] [blame] | 6252 | pC->cacheStatus = CACHE_STALE; |
drh | 2ab792e | 2017-05-30 18:34:07 +0000 | [diff] [blame] | 6253 | VdbeBranchTaken(rc==SQLITE_OK,2); |
| 6254 | if( rc==SQLITE_OK ){ |
drh | f93cd94 | 2013-11-21 03:12:25 +0000 | [diff] [blame] | 6255 | pC->nullRow = 0; |
drh | 9b47ee3 | 2013-08-20 03:13:51 +0000 | [diff] [blame] | 6256 | p->aCounter[pOp->p5]++; |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 6257 | #ifdef SQLITE_TEST |
drh | a346058 | 2008-07-11 21:02:53 +0000 | [diff] [blame] | 6258 | sqlite3_search_count++; |
drh | 0f7eb61 | 2006-08-08 13:51:43 +0000 | [diff] [blame] | 6259 | #endif |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 6260 | goto jump_to_p2_and_check_for_interrupt; |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6261 | } |
drh | 2ab792e | 2017-05-30 18:34:07 +0000 | [diff] [blame] | 6262 | if( rc!=SQLITE_DONE ) goto abort_due_to_error; |
| 6263 | rc = SQLITE_OK; |
| 6264 | pC->nullRow = 1; |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 6265 | goto check_for_interrupt; |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6266 | } |
| 6267 | |
drh | 9b4eaeb | 2016-11-09 00:10:33 +0000 | [diff] [blame] | 6268 | /* Opcode: IdxInsert P1 P2 P3 P4 P5 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 6269 | ** Synopsis: key=r[P2] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6270 | ** |
drh | ef8662b | 2011-06-20 21:47:58 +0000 | [diff] [blame] | 6271 | ** Register P2 holds an SQL index key made using the |
drh | 9437bd2 | 2009-02-01 00:29:56 +0000 | [diff] [blame] | 6272 | ** MakeRecord instructions. This opcode writes that key |
drh | ee32e0a | 2006-01-10 19:45:49 +0000 | [diff] [blame] | 6273 | ** into the index P1. Data for the entry is nil. |
drh | 717e640 | 2001-09-27 03:22:32 +0000 | [diff] [blame] | 6274 | ** |
drh | fb8c56f | 2016-11-09 01:19:25 +0000 | [diff] [blame] | 6275 | ** If P4 is not zero, then it is the number of values in the unpacked |
drh | 9b4eaeb | 2016-11-09 00:10:33 +0000 | [diff] [blame] | 6276 | ** key of reg(P2). In that case, P3 is the index of the first register |
| 6277 | ** for the unpacked key. The availability of the unpacked key can sometimes |
| 6278 | ** be an optimization. |
| 6279 | ** |
| 6280 | ** If P5 has the OPFLAG_APPEND bit set, that is a hint to the b-tree layer |
| 6281 | ** that this insert is likely to be an append. |
drh | e4d9081 | 2007-03-29 05:51:49 +0000 | [diff] [blame] | 6282 | ** |
mistachkin | 21a919f | 2014-02-07 03:28:02 +0000 | [diff] [blame] | 6283 | ** If P5 has the OPFLAG_NCHANGE bit set, then the change counter is |
| 6284 | ** incremented by this instruction. If the OPFLAG_NCHANGE bit is clear, |
| 6285 | ** then the change counter is unchanged. |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 6286 | ** |
drh | eaf6ae2 | 2016-11-09 20:14:34 +0000 | [diff] [blame] | 6287 | ** If the OPFLAG_USESEEKRESULT flag of P5 is set, the implementation might |
| 6288 | ** run faster by avoiding an unnecessary seek on cursor P1. However, |
| 6289 | ** the OPFLAG_USESEEKRESULT flag must only be set if there have been no prior |
| 6290 | ** seeks on the cursor or if the most recent seek used a key equivalent |
| 6291 | ** to P2. |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 6292 | ** |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 6293 | ** This instruction only works for indices. The equivalent instruction |
| 6294 | ** for tables is OP_Insert. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6295 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6296 | case OP_IdxInsert: { /* in2 */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 6297 | VdbeCursor *pC; |
drh | 8eeb446 | 2016-05-21 20:03:42 +0000 | [diff] [blame] | 6298 | BtreePayload x; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6299 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6300 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6301 | pC = p->apCsr[pOp->p1]; |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6302 | sqlite3VdbeIncrWriteCounter(p, pC); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6303 | assert( pC!=0 ); |
drh | c879c4e | 2020-02-06 13:57:08 +0000 | [diff] [blame] | 6304 | assert( !isSorter(pC) ); |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 6305 | pIn2 = &aMem[pOp->p2]; |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 6306 | assert( (pIn2->flags & MEM_Blob) || (pOp->p5 & OPFLAG_PREFORMAT) ); |
drh | 6546af1 | 2013-11-04 15:23:25 +0000 | [diff] [blame] | 6307 | if( pOp->p5 & OPFLAG_NCHANGE ) p->nChange++; |
drh | c879c4e | 2020-02-06 13:57:08 +0000 | [diff] [blame] | 6308 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6309 | assert( pC->isTable==0 ); |
| 6310 | rc = ExpandBlob(pIn2); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6311 | if( rc ) goto abort_due_to_error; |
drh | c879c4e | 2020-02-06 13:57:08 +0000 | [diff] [blame] | 6312 | x.nKey = pIn2->n; |
| 6313 | x.pKey = pIn2->z; |
| 6314 | x.aMem = aMem + pOp->p3; |
| 6315 | x.nMem = (u16)pOp->p4.i; |
| 6316 | rc = sqlite3BtreeInsert(pC->uc.pCursor, &x, |
dan | 7aae735 | 2020-12-10 18:06:24 +0000 | [diff] [blame] | 6317 | (pOp->p5 & (OPFLAG_APPEND|OPFLAG_SAVEPOSITION|OPFLAG_PREFORMAT)), |
drh | c879c4e | 2020-02-06 13:57:08 +0000 | [diff] [blame] | 6318 | ((pOp->p5 & OPFLAG_USESEEKRESULT) ? pC->seekResult : 0) |
| 6319 | ); |
| 6320 | assert( pC->deferredMoveto==0 ); |
| 6321 | pC->cacheStatus = CACHE_STALE; |
| 6322 | if( rc) goto abort_due_to_error; |
| 6323 | break; |
| 6324 | } |
| 6325 | |
| 6326 | /* Opcode: SorterInsert P1 P2 * * * |
| 6327 | ** Synopsis: key=r[P2] |
| 6328 | ** |
| 6329 | ** Register P2 holds an SQL index key made using the |
| 6330 | ** MakeRecord instructions. This opcode writes that key |
| 6331 | ** into the sorter P1. Data for the entry is nil. |
| 6332 | */ |
| 6333 | case OP_SorterInsert: { /* in2 */ |
| 6334 | VdbeCursor *pC; |
| 6335 | |
| 6336 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6337 | pC = p->apCsr[pOp->p1]; |
| 6338 | sqlite3VdbeIncrWriteCounter(p, pC); |
| 6339 | assert( pC!=0 ); |
| 6340 | assert( isSorter(pC) ); |
| 6341 | pIn2 = &aMem[pOp->p2]; |
| 6342 | assert( pIn2->flags & MEM_Blob ); |
| 6343 | assert( pC->isTable==0 ); |
| 6344 | rc = ExpandBlob(pIn2); |
| 6345 | if( rc ) goto abort_due_to_error; |
| 6346 | rc = sqlite3VdbeSorterWrite(pC, pIn2); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6347 | if( rc) goto abort_due_to_error; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6348 | break; |
| 6349 | } |
| 6350 | |
drh | 85bd353 | 2020-05-05 18:42:49 +0000 | [diff] [blame] | 6351 | /* Opcode: IdxDelete P1 P2 P3 * P5 |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 6352 | ** Synopsis: key=r[P2@P3] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6353 | ** |
drh | e14006d | 2008-03-25 17:23:32 +0000 | [diff] [blame] | 6354 | ** The content of P3 registers starting at register P2 form |
| 6355 | ** an unpacked index key. This opcode removes that entry from the |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 6356 | ** index opened by cursor P1. |
drh | 85bd353 | 2020-05-05 18:42:49 +0000 | [diff] [blame] | 6357 | ** |
| 6358 | ** If P5 is not zero, then raise an SQLITE_CORRUPT_INDEX error |
| 6359 | ** if no matching index entry is found. This happens when running |
| 6360 | ** an UPDATE or DELETE statement and the index entry to be updated |
| 6361 | ** or deleted is not found. For some uses of IdxDelete |
| 6362 | ** (example: the EXCEPT operator) it does not matter that no matching |
drh | a76b151 | 2021-08-11 18:43:54 +0000 | [diff] [blame] | 6363 | ** entry is found. For those cases, P5 is zero. Also, do not raise |
| 6364 | ** this (self-correcting and non-critical) error if in writable_schema mode. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6365 | */ |
drh | e14006d | 2008-03-25 17:23:32 +0000 | [diff] [blame] | 6366 | case OP_IdxDelete: { |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 6367 | VdbeCursor *pC; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6368 | BtCursor *pCrsr; |
drh | 9a65f2c | 2009-06-22 19:05:40 +0000 | [diff] [blame] | 6369 | int res; |
| 6370 | UnpackedRecord r; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6371 | |
drh | e14006d | 2008-03-25 17:23:32 +0000 | [diff] [blame] | 6372 | assert( pOp->p3>0 ); |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 6373 | assert( pOp->p2>0 && pOp->p2+pOp->p3<=(p->nMem+1 - p->nCursor)+1 ); |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6374 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6375 | pC = p->apCsr[pOp->p1]; |
| 6376 | assert( pC!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6377 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6378 | sqlite3VdbeIncrWriteCounter(p, pC); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6379 | pCrsr = pC->uc.pCursor; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6380 | assert( pCrsr!=0 ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6381 | r.pKeyInfo = pC->pKeyInfo; |
| 6382 | r.nField = (u16)pOp->p3; |
dan | 1fed5da | 2014-02-25 21:01:25 +0000 | [diff] [blame] | 6383 | r.default_rc = 0; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6384 | r.aMem = &aMem[pOp->p2]; |
drh | 42a410d | 2021-06-19 18:32:20 +0000 | [diff] [blame] | 6385 | rc = sqlite3BtreeIndexMoveto(pCrsr, &r, &res); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6386 | if( rc ) goto abort_due_to_error; |
| 6387 | if( res==0 ){ |
dan | e61bbf4 | 2016-01-28 17:06:17 +0000 | [diff] [blame] | 6388 | rc = sqlite3BtreeDelete(pCrsr, BTREE_AUXDELETE); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6389 | if( rc ) goto abort_due_to_error; |
drh | a76b151 | 2021-08-11 18:43:54 +0000 | [diff] [blame] | 6390 | }else if( pOp->p5 && !sqlite3WritableSchema(db) ){ |
drh | e5ceaac | 2021-01-25 21:24:14 +0000 | [diff] [blame] | 6391 | rc = sqlite3ReportError(SQLITE_CORRUPT_INDEX, __LINE__, "index corruption"); |
drh | 85bd353 | 2020-05-05 18:42:49 +0000 | [diff] [blame] | 6392 | goto abort_due_to_error; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6393 | } |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6394 | assert( pC->deferredMoveto==0 ); |
| 6395 | pC->cacheStatus = CACHE_STALE; |
dan | 3b908d4 | 2016-11-08 19:22:32 +0000 | [diff] [blame] | 6396 | pC->seekResult = 0; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6397 | break; |
| 6398 | } |
| 6399 | |
drh | 170ad68 | 2017-06-02 15:44:22 +0000 | [diff] [blame] | 6400 | /* Opcode: DeferredSeek P1 * P3 P4 * |
| 6401 | ** Synopsis: Move P3 to P1.rowid if needed |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6402 | ** |
| 6403 | ** P1 is an open index cursor and P3 is a cursor on the corresponding |
| 6404 | ** table. This opcode does a deferred seek of the P3 table cursor |
| 6405 | ** to the row that corresponds to the current row of P1. |
| 6406 | ** |
| 6407 | ** This is a deferred seek. Nothing actually happens until |
| 6408 | ** the cursor is used to read a record. That way, if no reads |
| 6409 | ** occur, no unnecessary I/O happens. |
| 6410 | ** |
| 6411 | ** P4 may be an array of integers (type P4_INTARRAY) containing |
drh | 19d720d | 2016-02-03 19:52:06 +0000 | [diff] [blame] | 6412 | ** one entry for each column in the P3 table. If array entry a(i) |
| 6413 | ** is non-zero, then reading column a(i)-1 from cursor P3 is |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6414 | ** equivalent to performing the deferred seek and then reading column i |
| 6415 | ** from P1. This information is stored in P3 and used to redirect |
| 6416 | ** reads against P3 over to P1, thus possibly avoiding the need to |
| 6417 | ** seek and read cursor P3. |
| 6418 | */ |
drh | 2133d82 | 2008-01-03 18:44:59 +0000 | [diff] [blame] | 6419 | /* Opcode: IdxRowid P1 P2 * * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 6420 | ** Synopsis: r[P2]=rowid |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6421 | ** |
drh | 2133d82 | 2008-01-03 18:44:59 +0000 | [diff] [blame] | 6422 | ** Write into register P2 an integer which is the last entry in the record at |
drh | f0863fe | 2005-06-12 21:35:51 +0000 | [diff] [blame] | 6423 | ** the end of the index key pointed to by cursor P1. This integer should be |
| 6424 | ** the rowid of the table entry to which this index entry points. |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6425 | ** |
drh | 9437bd2 | 2009-02-01 00:29:56 +0000 | [diff] [blame] | 6426 | ** See also: Rowid, MakeRecord. |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6427 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 6428 | case OP_DeferredSeek: /* ncycle */ |
| 6429 | case OP_IdxRowid: { /* out2, ncycle */ |
drh | 170ad68 | 2017-06-02 15:44:22 +0000 | [diff] [blame] | 6430 | VdbeCursor *pC; /* The P1 index cursor */ |
| 6431 | VdbeCursor *pTabCur; /* The P2 table cursor (OP_DeferredSeek only) */ |
| 6432 | i64 rowid; /* Rowid that P1 current points to */ |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6433 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6434 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6435 | pC = p->apCsr[pOp->p1]; |
| 6436 | assert( pC!=0 ); |
drh | eab6c12 | 2022-04-14 12:59:25 +0000 | [diff] [blame] | 6437 | assert( pC->eCurType==CURTYPE_BTREE || IsNullCursor(pC) ); |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6438 | assert( pC->uc.pCursor!=0 ); |
drh | c504f67 | 2022-04-14 14:19:23 +0000 | [diff] [blame] | 6439 | assert( pC->isTable==0 || IsNullCursor(pC) ); |
drh | c22284f | 2014-10-13 16:02:20 +0000 | [diff] [blame] | 6440 | assert( pC->deferredMoveto==0 ); |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6441 | assert( !pC->nullRow || pOp->opcode==OP_IdxRowid ); |
| 6442 | |
| 6443 | /* The IdxRowid and Seek opcodes are combined because of the commonality |
| 6444 | ** of sqlite3VdbeCursorRestore() and sqlite3VdbeIdxRowid(). */ |
| 6445 | rc = sqlite3VdbeCursorRestore(pC); |
drh | c22284f | 2014-10-13 16:02:20 +0000 | [diff] [blame] | 6446 | |
dan | aa07b36 | 2022-08-25 13:32:55 +0000 | [diff] [blame] | 6447 | /* sqlite3VdbeCursorRestore() may fail if the cursor has been disturbed |
| 6448 | ** since it was last positioned and an error (e.g. OOM or an IO error) |
| 6449 | ** occurs while trying to reposition it. */ |
| 6450 | if( rc!=SQLITE_OK ) goto abort_due_to_error; |
drh | c22284f | 2014-10-13 16:02:20 +0000 | [diff] [blame] | 6451 | |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6452 | if( !pC->nullRow ){ |
drh | 2dc0648 | 2013-12-11 00:59:10 +0000 | [diff] [blame] | 6453 | rowid = 0; /* Not needed. Only used to silence a warning. */ |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6454 | rc = sqlite3VdbeIdxRowid(db, pC->uc.pCursor, &rowid); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6455 | if( rc!=SQLITE_OK ){ |
| 6456 | goto abort_due_to_error; |
danielk1977 | 3d1bfea | 2004-05-14 11:00:53 +0000 | [diff] [blame] | 6457 | } |
drh | 170ad68 | 2017-06-02 15:44:22 +0000 | [diff] [blame] | 6458 | if( pOp->opcode==OP_DeferredSeek ){ |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6459 | assert( pOp->p3>=0 && pOp->p3<p->nCursor ); |
| 6460 | pTabCur = p->apCsr[pOp->p3]; |
| 6461 | assert( pTabCur!=0 ); |
| 6462 | assert( pTabCur->eCurType==CURTYPE_BTREE ); |
| 6463 | assert( pTabCur->uc.pCursor!=0 ); |
| 6464 | assert( pTabCur->isTable ); |
| 6465 | pTabCur->nullRow = 0; |
| 6466 | pTabCur->movetoTarget = rowid; |
| 6467 | pTabCur->deferredMoveto = 1; |
drh | fc56950 | 2022-02-25 20:11:59 +0000 | [diff] [blame] | 6468 | pTabCur->cacheStatus = CACHE_STALE; |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6469 | assert( pOp->p4type==P4_INTARRAY || pOp->p4.ai==0 ); |
drh | e44ac38 | 2021-03-18 13:19:41 +0000 | [diff] [blame] | 6470 | assert( !pTabCur->isEphemeral ); |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 6471 | pTabCur->ub.aAltMap = pOp->p4.ai; |
| 6472 | assert( !pC->isEphemeral ); |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6473 | pTabCur->pAltCursor = pC; |
| 6474 | }else{ |
| 6475 | pOut = out2Prerelease(p, pOp); |
| 6476 | pOut->u.i = rowid; |
drh | 784c1b9 | 2016-01-30 16:59:56 +0000 | [diff] [blame] | 6477 | } |
| 6478 | }else{ |
| 6479 | assert( pOp->opcode==OP_IdxRowid ); |
| 6480 | sqlite3VdbeMemSetNull(&aMem[pOp->p2]); |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6481 | } |
| 6482 | break; |
| 6483 | } |
| 6484 | |
drh | be3da24 | 2019-12-29 00:52:41 +0000 | [diff] [blame] | 6485 | /* Opcode: FinishSeek P1 * * * * |
| 6486 | ** |
| 6487 | ** If cursor P1 was previously moved via OP_DeferredSeek, complete that |
| 6488 | ** seek operation now, without further delay. If the cursor seek has |
| 6489 | ** already occurred, this instruction is a no-op. |
| 6490 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 6491 | case OP_FinishSeek: { /* ncycle */ |
| 6492 | VdbeCursor *pC; /* The P1 index cursor */ |
drh | be3da24 | 2019-12-29 00:52:41 +0000 | [diff] [blame] | 6493 | |
| 6494 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6495 | pC = p->apCsr[pOp->p1]; |
| 6496 | if( pC->deferredMoveto ){ |
| 6497 | rc = sqlite3VdbeFinishMoveto(pC); |
| 6498 | if( rc ) goto abort_due_to_error; |
| 6499 | } |
| 6500 | break; |
| 6501 | } |
| 6502 | |
drh | c51ceeb | 2020-08-31 12:29:03 +0000 | [diff] [blame] | 6503 | /* Opcode: IdxGE P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 6504 | ** Synopsis: key=r[P3@P4] |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6505 | ** |
danielk1977 | 61dd583 | 2008-04-18 11:31:12 +0000 | [diff] [blame] | 6506 | ** The P4 register values beginning with P3 form an unpacked index |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6507 | ** key that omits the PRIMARY KEY. Compare this key value against the index |
| 6508 | ** that P1 is currently pointing to, ignoring the PRIMARY KEY or ROWID |
| 6509 | ** fields at the end. |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 6510 | ** |
danielk1977 | 61dd583 | 2008-04-18 11:31:12 +0000 | [diff] [blame] | 6511 | ** If the P1 index entry is greater than or equal to the key value |
| 6512 | ** then jump to P2. Otherwise fall through to the next instruction. |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6513 | */ |
drh | c51ceeb | 2020-08-31 12:29:03 +0000 | [diff] [blame] | 6514 | /* Opcode: IdxGT P1 P2 P3 P4 * |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6515 | ** Synopsis: key=r[P3@P4] |
drh | 772ae62 | 2004-05-19 13:13:08 +0000 | [diff] [blame] | 6516 | ** |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6517 | ** The P4 register values beginning with P3 form an unpacked index |
| 6518 | ** key that omits the PRIMARY KEY. Compare this key value against the index |
| 6519 | ** that P1 is currently pointing to, ignoring the PRIMARY KEY or ROWID |
| 6520 | ** fields at the end. |
| 6521 | ** |
| 6522 | ** If the P1 index entry is greater than the key value |
| 6523 | ** then jump to P2. Otherwise fall through to the next instruction. |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6524 | */ |
drh | c51ceeb | 2020-08-31 12:29:03 +0000 | [diff] [blame] | 6525 | /* Opcode: IdxLT P1 P2 P3 P4 * |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 6526 | ** Synopsis: key=r[P3@P4] |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 6527 | ** |
danielk1977 | 61dd583 | 2008-04-18 11:31:12 +0000 | [diff] [blame] | 6528 | ** The P4 register values beginning with P3 form an unpacked index |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6529 | ** key that omits the PRIMARY KEY or ROWID. Compare this key value against |
| 6530 | ** the index that P1 is currently pointing to, ignoring the PRIMARY KEY or |
| 6531 | ** ROWID on the P1 index. |
drh | f3218fe | 2004-05-28 08:21:02 +0000 | [diff] [blame] | 6532 | ** |
danielk1977 | 61dd583 | 2008-04-18 11:31:12 +0000 | [diff] [blame] | 6533 | ** If the P1 index entry is less than the key value then jump to P2. |
| 6534 | ** Otherwise fall through to the next instruction. |
drh | c045ec5 | 2002-12-04 20:01:06 +0000 | [diff] [blame] | 6535 | */ |
drh | c51ceeb | 2020-08-31 12:29:03 +0000 | [diff] [blame] | 6536 | /* Opcode: IdxLE P1 P2 P3 P4 * |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6537 | ** Synopsis: key=r[P3@P4] |
| 6538 | ** |
| 6539 | ** The P4 register values beginning with P3 form an unpacked index |
| 6540 | ** key that omits the PRIMARY KEY or ROWID. Compare this key value against |
| 6541 | ** the index that P1 is currently pointing to, ignoring the PRIMARY KEY or |
| 6542 | ** ROWID on the P1 index. |
| 6543 | ** |
| 6544 | ** If the P1 index entry is less than or equal to the key value then jump |
| 6545 | ** to P2. Otherwise fall through to the next instruction. |
| 6546 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 6547 | case OP_IdxLE: /* jump, ncycle */ |
| 6548 | case OP_IdxGT: /* jump, ncycle */ |
| 6549 | case OP_IdxLT: /* jump, ncycle */ |
| 6550 | case OP_IdxGE: { /* jump, ncycle */ |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 6551 | VdbeCursor *pC; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6552 | int res; |
| 6553 | UnpackedRecord r; |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6554 | |
drh | 653b82a | 2009-06-22 11:10:47 +0000 | [diff] [blame] | 6555 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6556 | pC = p->apCsr[pOp->p1]; |
| 6557 | assert( pC!=0 ); |
drh | d4187c7 | 2010-08-30 22:15:45 +0000 | [diff] [blame] | 6558 | assert( pC->isOrdered ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6559 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 6560 | assert( pC->uc.pCursor!=0); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6561 | assert( pC->deferredMoveto==0 ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6562 | assert( pOp->p4type==P4_INT32 ); |
| 6563 | r.pKeyInfo = pC->pKeyInfo; |
| 6564 | r.nField = (u16)pOp->p4.i; |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6565 | if( pOp->opcode<OP_IdxLT ){ |
| 6566 | assert( pOp->opcode==OP_IdxLE || pOp->opcode==OP_IdxGT ); |
dan | 1fed5da | 2014-02-25 21:01:25 +0000 | [diff] [blame] | 6567 | r.default_rc = -1; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6568 | }else{ |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6569 | assert( pOp->opcode==OP_IdxGE || pOp->opcode==OP_IdxLT ); |
dan | 1fed5da | 2014-02-25 21:01:25 +0000 | [diff] [blame] | 6570 | r.default_rc = 0; |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6571 | } |
| 6572 | r.aMem = &aMem[pOp->p3]; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 6573 | #ifdef SQLITE_DEBUG |
drh | 5eae974 | 2018-08-03 13:56:26 +0000 | [diff] [blame] | 6574 | { |
| 6575 | int i; |
| 6576 | for(i=0; i<r.nField; i++){ |
| 6577 | assert( memIsValid(&r.aMem[i]) ); |
| 6578 | REGISTER_TRACE(pOp->p3+i, &aMem[pOp->p3+i]); |
| 6579 | } |
| 6580 | } |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 6581 | #endif |
drh | c40076a | 2020-09-29 16:05:09 +0000 | [diff] [blame] | 6582 | |
| 6583 | /* Inlined version of sqlite3VdbeIdxKeyCompare() */ |
| 6584 | { |
| 6585 | i64 nCellKey = 0; |
| 6586 | BtCursor *pCur; |
| 6587 | Mem m; |
| 6588 | |
| 6589 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 6590 | pCur = pC->uc.pCursor; |
| 6591 | assert( sqlite3BtreeCursorIsValid(pCur) ); |
| 6592 | nCellKey = sqlite3BtreePayloadSize(pCur); |
| 6593 | /* nCellKey will always be between 0 and 0xffffffff because of the way |
| 6594 | ** that btreeParseCellPtr() and sqlite3GetVarint32() are implemented */ |
| 6595 | if( nCellKey<=0 || nCellKey>0x7fffffff ){ |
| 6596 | rc = SQLITE_CORRUPT_BKPT; |
| 6597 | goto abort_due_to_error; |
| 6598 | } |
| 6599 | sqlite3VdbeMemInit(&m, db, 0); |
| 6600 | rc = sqlite3VdbeMemFromBtreeZeroOffset(pCur, (u32)nCellKey, &m); |
| 6601 | if( rc ) goto abort_due_to_error; |
| 6602 | res = sqlite3VdbeRecordCompareWithSkip(m.n, m.z, &r, 0); |
drh | fc85450 | 2022-03-02 17:50:59 +0000 | [diff] [blame] | 6603 | sqlite3VdbeMemReleaseMalloc(&m); |
drh | c40076a | 2020-09-29 16:05:09 +0000 | [diff] [blame] | 6604 | } |
| 6605 | /* End of inlined sqlite3VdbeIdxKeyCompare() */ |
| 6606 | |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6607 | assert( (OP_IdxLE&1)==(OP_IdxLT&1) && (OP_IdxGE&1)==(OP_IdxGT&1) ); |
| 6608 | if( (pOp->opcode&1)==(OP_IdxLT&1) ){ |
| 6609 | assert( pOp->opcode==OP_IdxLE || pOp->opcode==OP_IdxLT ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6610 | res = -res; |
| 6611 | }else{ |
drh | 4a1d365 | 2014-02-14 15:13:36 +0000 | [diff] [blame] | 6612 | assert( pOp->opcode==OP_IdxGE || pOp->opcode==OP_IdxGT ); |
drh | 3da046d | 2013-11-11 03:24:11 +0000 | [diff] [blame] | 6613 | res++; |
| 6614 | } |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 6615 | VdbeBranchTaken(res>0,2); |
drh | c40076a | 2020-09-29 16:05:09 +0000 | [diff] [blame] | 6616 | assert( rc==SQLITE_OK ); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 6617 | if( res>0 ) goto jump_to_p2; |
drh | 8721ce4 | 2001-11-07 14:22:00 +0000 | [diff] [blame] | 6618 | break; |
| 6619 | } |
| 6620 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6621 | /* Opcode: Destroy P1 P2 P3 * * |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6622 | ** |
| 6623 | ** Delete an entire database table or index whose root page in the database |
| 6624 | ** file is given by P1. |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 6625 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6626 | ** The table being destroyed is in the main database file if P3==0. If |
| 6627 | ** P3==1 then the table to be clear is in the auxiliary database file |
drh | f57b339 | 2001-10-08 13:22:32 +0000 | [diff] [blame] | 6628 | ** that is used to store tables create using CREATE TEMPORARY TABLE. |
| 6629 | ** |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 6630 | ** If AUTOVACUUM is enabled then it is possible that another root page |
| 6631 | ** might be moved into the newly deleted root page in order to keep all |
| 6632 | ** root pages contiguous at the beginning of the database. The former |
| 6633 | ** value of the root page that moved - its value before the move occurred - |
dan | a34adaf | 2017-04-08 14:11:47 +0000 | [diff] [blame] | 6634 | ** is stored in register P2. If no page movement was required (because the |
| 6635 | ** table being dropped was already the last one in the database) then a |
| 6636 | ** zero is stored in register P2. If AUTOVACUUM is disabled then a zero |
| 6637 | ** is stored in register P2. |
| 6638 | ** |
| 6639 | ** This opcode throws an error if there are any active reader VMs when |
| 6640 | ** it is invoked. This is done to avoid the difficulty associated with |
| 6641 | ** updating existing cursors when a root page is moved in an AUTOVACUUM |
| 6642 | ** database. This error is thrown even if the database is not an AUTOVACUUM |
| 6643 | ** db in order to avoid introducing an incompatibility between autovacuum |
| 6644 | ** and non-autovacuum modes. |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 6645 | ** |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 6646 | ** See also: Clear |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6647 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 6648 | case OP_Destroy: { /* out2 */ |
danielk1977 | a0bf265 | 2004-11-04 14:30:04 +0000 | [diff] [blame] | 6649 | int iMoved; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6650 | int iDb; |
drh | 3a94987 | 2012-09-18 13:20:13 +0000 | [diff] [blame] | 6651 | |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6652 | sqlite3VdbeIncrWriteCounter(p, 0); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 6653 | assert( p->readOnly==0 ); |
drh | 055f298 | 2016-01-15 15:06:41 +0000 | [diff] [blame] | 6654 | assert( pOp->p1>1 ); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 6655 | pOut = out2Prerelease(p, pOp); |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 6656 | pOut->flags = MEM_Null; |
drh | 086723a | 2015-03-24 12:51:52 +0000 | [diff] [blame] | 6657 | if( db->nVdbeRead > db->nVDestroy+1 ){ |
danielk1977 | e6efa74 | 2004-11-10 11:55:10 +0000 | [diff] [blame] | 6658 | rc = SQLITE_LOCKED; |
drh | 77658e2 | 2007-12-04 16:54:52 +0000 | [diff] [blame] | 6659 | p->errorAction = OE_Abort; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6660 | goto abort_due_to_error; |
danielk1977 | e6efa74 | 2004-11-10 11:55:10 +0000 | [diff] [blame] | 6661 | }else{ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6662 | iDb = pOp->p3; |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 6663 | assert( DbMaskTest(p->btreeMask, iDb) ); |
drh | 2dc0648 | 2013-12-11 00:59:10 +0000 | [diff] [blame] | 6664 | iMoved = 0; /* Not needed. Only to silence a warning. */ |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6665 | rc = sqlite3BtreeDropTable(db->aDb[iDb].pBt, pOp->p1, &iMoved); |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 6666 | pOut->flags = MEM_Int; |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6667 | pOut->u.i = iMoved; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6668 | if( rc ) goto abort_due_to_error; |
drh | 3765df4 | 2006-06-28 18:18:09 +0000 | [diff] [blame] | 6669 | #ifndef SQLITE_OMIT_AUTOVACUUM |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6670 | if( iMoved!=0 ){ |
drh | cdf011d | 2011-04-04 21:25:28 +0000 | [diff] [blame] | 6671 | sqlite3RootPageMoved(db, iDb, iMoved, pOp->p1); |
| 6672 | /* All OP_Destroy operations occur on the same btree */ |
| 6673 | assert( resetSchemaOnFault==0 || resetSchemaOnFault==iDb+1 ); |
| 6674 | resetSchemaOnFault = iDb+1; |
danielk1977 | e6efa74 | 2004-11-10 11:55:10 +0000 | [diff] [blame] | 6675 | } |
drh | 3765df4 | 2006-06-28 18:18:09 +0000 | [diff] [blame] | 6676 | #endif |
danielk1977 | a0bf265 | 2004-11-04 14:30:04 +0000 | [diff] [blame] | 6677 | } |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6678 | break; |
| 6679 | } |
| 6680 | |
danielk1977 | c7af484 | 2008-10-27 13:59:33 +0000 | [diff] [blame] | 6681 | /* Opcode: Clear P1 P2 P3 |
drh | 5edc312 | 2001-09-13 21:53:09 +0000 | [diff] [blame] | 6682 | ** |
| 6683 | ** Delete all contents of the database table or index whose root page |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 6684 | ** in the database file is given by P1. But, unlike Destroy, do not |
drh | 5edc312 | 2001-09-13 21:53:09 +0000 | [diff] [blame] | 6685 | ** remove the table or index from the database file. |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 6686 | ** |
drh | f57b339 | 2001-10-08 13:22:32 +0000 | [diff] [blame] | 6687 | ** The table being clear is in the main database file if P2==0. If |
| 6688 | ** P2==1 then the table to be clear is in the auxiliary database file |
| 6689 | ** that is used to store tables create using CREATE TEMPORARY TABLE. |
| 6690 | ** |
drh | a6df0e6 | 2021-06-03 18:51:51 +0000 | [diff] [blame] | 6691 | ** If the P3 value is non-zero, then the row change count is incremented |
| 6692 | ** by the number of rows in the table being cleared. If P3 is greater |
| 6693 | ** than zero, then the value stored in register P3 is also incremented |
| 6694 | ** by the number of rows in the table being cleared. |
danielk1977 | c7af484 | 2008-10-27 13:59:33 +0000 | [diff] [blame] | 6695 | ** |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 6696 | ** See also: Destroy |
drh | 5edc312 | 2001-09-13 21:53:09 +0000 | [diff] [blame] | 6697 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6698 | case OP_Clear: { |
dan | 2c71887 | 2021-06-22 18:32:05 +0000 | [diff] [blame] | 6699 | i64 nChange; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6700 | |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6701 | sqlite3VdbeIncrWriteCounter(p, 0); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6702 | nChange = 0; |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 6703 | assert( p->readOnly==0 ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 6704 | assert( DbMaskTest(p->btreeMask, pOp->p2) ); |
drh | a6df0e6 | 2021-06-03 18:51:51 +0000 | [diff] [blame] | 6705 | rc = sqlite3BtreeClearTable(db->aDb[pOp->p2].pBt, (u32)pOp->p1, &nChange); |
danielk1977 | c7af484 | 2008-10-27 13:59:33 +0000 | [diff] [blame] | 6706 | if( pOp->p3 ){ |
| 6707 | p->nChange += nChange; |
| 6708 | if( pOp->p3>0 ){ |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 6709 | assert( memIsValid(&aMem[pOp->p3]) ); |
| 6710 | memAboutToChange(p, &aMem[pOp->p3]); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 6711 | aMem[pOp->p3].u.i += nChange; |
danielk1977 | c7af484 | 2008-10-27 13:59:33 +0000 | [diff] [blame] | 6712 | } |
| 6713 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6714 | if( rc ) goto abort_due_to_error; |
drh | 5edc312 | 2001-09-13 21:53:09 +0000 | [diff] [blame] | 6715 | break; |
| 6716 | } |
| 6717 | |
drh | 65ea12c | 2014-03-19 17:41:36 +0000 | [diff] [blame] | 6718 | /* Opcode: ResetSorter P1 * * * * |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 6719 | ** |
drh | 65ea12c | 2014-03-19 17:41:36 +0000 | [diff] [blame] | 6720 | ** Delete all contents from the ephemeral table or sorter |
| 6721 | ** that is open on cursor P1. |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 6722 | ** |
drh | 65ea12c | 2014-03-19 17:41:36 +0000 | [diff] [blame] | 6723 | ** This opcode only works for cursors used for sorting and |
| 6724 | ** opened with OP_OpenEphemeral or OP_SorterOpen. |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 6725 | */ |
drh | 65ea12c | 2014-03-19 17:41:36 +0000 | [diff] [blame] | 6726 | case OP_ResetSorter: { |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 6727 | VdbeCursor *pC; |
| 6728 | |
| 6729 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 6730 | pC = p->apCsr[pOp->p1]; |
| 6731 | assert( pC!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6732 | if( isSorter(pC) ){ |
| 6733 | sqlite3VdbeSorterReset(db, pC->uc.pSorter); |
drh | 65ea12c | 2014-03-19 17:41:36 +0000 | [diff] [blame] | 6734 | }else{ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6735 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | 65ea12c | 2014-03-19 17:41:36 +0000 | [diff] [blame] | 6736 | assert( pC->isEphemeral ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 6737 | rc = sqlite3BtreeClearTableOfCursor(pC->uc.pCursor); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6738 | if( rc ) goto abort_due_to_error; |
drh | 65ea12c | 2014-03-19 17:41:36 +0000 | [diff] [blame] | 6739 | } |
drh | 079a307 | 2014-03-19 14:10:55 +0000 | [diff] [blame] | 6740 | break; |
| 6741 | } |
| 6742 | |
drh | 0f3f766 | 2017-08-18 14:34:28 +0000 | [diff] [blame] | 6743 | /* Opcode: CreateBtree P1 P2 P3 * * |
| 6744 | ** Synopsis: r[P2]=root iDb=P1 flags=P3 |
drh | 5b2fd56 | 2001-09-13 15:21:31 +0000 | [diff] [blame] | 6745 | ** |
drh | 0f3f766 | 2017-08-18 14:34:28 +0000 | [diff] [blame] | 6746 | ** Allocate a new b-tree in the main database file if P1==0 or in the |
| 6747 | ** TEMP database file if P1==1 or in an attached database if |
| 6748 | ** P1>1. The P3 argument must be 1 (BTREE_INTKEY) for a rowid table |
drh | 416a801 | 2018-05-31 19:14:52 +0000 | [diff] [blame] | 6749 | ** it must be 2 (BTREE_BLOBKEY) for an index or WITHOUT ROWID table. |
drh | 0f3f766 | 2017-08-18 14:34:28 +0000 | [diff] [blame] | 6750 | ** The root page number of the new b-tree is stored in register P2. |
drh | 5b2fd56 | 2001-09-13 15:21:31 +0000 | [diff] [blame] | 6751 | */ |
drh | 0f3f766 | 2017-08-18 14:34:28 +0000 | [diff] [blame] | 6752 | case OP_CreateBtree: { /* out2 */ |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 6753 | Pgno pgno; |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6754 | Db *pDb; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6755 | |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6756 | sqlite3VdbeIncrWriteCounter(p, 0); |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 6757 | pOut = out2Prerelease(p, pOp); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6758 | pgno = 0; |
drh | 0f3f766 | 2017-08-18 14:34:28 +0000 | [diff] [blame] | 6759 | assert( pOp->p3==BTREE_INTKEY || pOp->p3==BTREE_BLOBKEY ); |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6760 | assert( pOp->p1>=0 && pOp->p1<db->nDb ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 6761 | assert( DbMaskTest(p->btreeMask, pOp->p1) ); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 6762 | assert( p->readOnly==0 ); |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6763 | pDb = &db->aDb[pOp->p1]; |
| 6764 | assert( pDb->pBt!=0 ); |
drh | 0f3f766 | 2017-08-18 14:34:28 +0000 | [diff] [blame] | 6765 | rc = sqlite3BtreeCreateTable(pDb->pBt, &pgno, pOp->p3); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6766 | if( rc ) goto abort_due_to_error; |
drh | 88a003e | 2008-12-11 16:17:03 +0000 | [diff] [blame] | 6767 | pOut->u.i = pgno; |
drh | 5b2fd56 | 2001-09-13 15:21:31 +0000 | [diff] [blame] | 6768 | break; |
| 6769 | } |
| 6770 | |
drh | 4a54bb5 | 2017-02-18 15:58:52 +0000 | [diff] [blame] | 6771 | /* Opcode: SqlExec * * * P4 * |
| 6772 | ** |
| 6773 | ** Run the SQL statement or statements specified in the P4 string. |
| 6774 | */ |
| 6775 | case OP_SqlExec: { |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6776 | sqlite3VdbeIncrWriteCounter(p, 0); |
drh | bce0414 | 2017-02-23 00:58:36 +0000 | [diff] [blame] | 6777 | db->nSqlExec++; |
drh | 4a54bb5 | 2017-02-18 15:58:52 +0000 | [diff] [blame] | 6778 | rc = sqlite3_exec(db, pOp->p4.z, 0, 0, 0); |
drh | bce0414 | 2017-02-23 00:58:36 +0000 | [diff] [blame] | 6779 | db->nSqlExec--; |
drh | 4a54bb5 | 2017-02-18 15:58:52 +0000 | [diff] [blame] | 6780 | if( rc ) goto abort_due_to_error; |
| 6781 | break; |
| 6782 | } |
| 6783 | |
drh | 2264584 | 2011-03-24 01:34:03 +0000 | [diff] [blame] | 6784 | /* Opcode: ParseSchema P1 * * P4 * |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6785 | ** |
drh | 346a70c | 2020-06-15 20:27:35 +0000 | [diff] [blame] | 6786 | ** Read and parse all entries from the schema table of database P1 |
drh | 1595abc | 2018-08-14 19:27:51 +0000 | [diff] [blame] | 6787 | ** that match the WHERE clause P4. If P4 is a NULL pointer, then the |
| 6788 | ** entire schema for P1 is reparsed. |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6789 | ** |
| 6790 | ** This opcode invokes the parser to create a new virtual machine, |
shane | 21e7feb | 2008-05-30 15:59:49 +0000 | [diff] [blame] | 6791 | ** then runs the new virtual machine. It is thus a re-entrant opcode. |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6792 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6793 | case OP_ParseSchema: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6794 | int iDb; |
drh | 067b92b | 2020-06-19 15:24:12 +0000 | [diff] [blame] | 6795 | const char *zSchema; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6796 | char *zSql; |
| 6797 | InitData initData; |
| 6798 | |
drh | bdaec52 | 2011-04-04 00:14:43 +0000 | [diff] [blame] | 6799 | /* Any prepared statement that invokes this opcode will hold mutexes |
| 6800 | ** on every btree. This is a prerequisite for invoking |
| 6801 | ** sqlite3InitCallback(). |
| 6802 | */ |
| 6803 | #ifdef SQLITE_DEBUG |
| 6804 | for(iDb=0; iDb<db->nDb; iDb++){ |
| 6805 | assert( iDb==1 || sqlite3BtreeHoldsMutex(db->aDb[iDb].pBt) ); |
| 6806 | } |
| 6807 | #endif |
drh | bdaec52 | 2011-04-04 00:14:43 +0000 | [diff] [blame] | 6808 | |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6809 | iDb = pOp->p1; |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6810 | assert( iDb>=0 && iDb<db->nDb ); |
drh | fe97234 | 2021-06-07 11:50:23 +0000 | [diff] [blame] | 6811 | assert( DbHasProperty(db, iDb, DB_SchemaLoaded) |
| 6812 | || db->mallocFailed |
| 6813 | || (CORRUPT_DB && (db->flags & SQLITE_NoSchemaError)!=0) ); |
dan | e325ffe | 2018-08-11 13:40:20 +0000 | [diff] [blame] | 6814 | |
| 6815 | #ifndef SQLITE_OMIT_ALTERTABLE |
| 6816 | if( pOp->p4.z==0 ){ |
| 6817 | sqlite3SchemaClear(db->aDb[iDb].pSchema); |
dan | b0c7920 | 2018-08-11 18:34:25 +0000 | [diff] [blame] | 6818 | db->mDbFlags &= ~DBFLAG_SchemaKnownOk; |
dan | 6a5a13d | 2021-02-17 20:08:22 +0000 | [diff] [blame] | 6819 | rc = sqlite3InitOne(db, iDb, &p->zErrMsg, pOp->p5); |
dan | e325ffe | 2018-08-11 13:40:20 +0000 | [diff] [blame] | 6820 | db->mDbFlags |= DBFLAG_SchemaChange; |
dan | 0d5fa6b | 2018-08-24 17:55:49 +0000 | [diff] [blame] | 6821 | p->expired = 0; |
dan | e325ffe | 2018-08-11 13:40:20 +0000 | [diff] [blame] | 6822 | }else |
| 6823 | #endif |
drh | 1595abc | 2018-08-14 19:27:51 +0000 | [diff] [blame] | 6824 | { |
drh | a4a871c | 2021-11-04 14:04:20 +0000 | [diff] [blame] | 6825 | zSchema = LEGACY_SCHEMA_TABLE; |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6826 | initData.db = db; |
mistachkin | 1c06b47 | 2018-09-27 00:04:31 +0000 | [diff] [blame] | 6827 | initData.iDb = iDb; |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6828 | initData.pzErrMsg = &p->zErrMsg; |
drh | 9fd88e8 | 2018-09-07 11:08:31 +0000 | [diff] [blame] | 6829 | initData.mInitFlags = 0; |
drh | 3b3ddba | 2020-07-22 18:03:56 +0000 | [diff] [blame] | 6830 | initData.mxPage = sqlite3BtreeLastPage(db->aDb[iDb].pBt); |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6831 | zSql = sqlite3MPrintf(db, |
drh | c5a93d4 | 2019-08-12 00:08:07 +0000 | [diff] [blame] | 6832 | "SELECT*FROM\"%w\".%s WHERE %s ORDER BY rowid", |
drh | 067b92b | 2020-06-19 15:24:12 +0000 | [diff] [blame] | 6833 | db->aDb[iDb].zDbSName, zSchema, pOp->p4.z); |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6834 | if( zSql==0 ){ |
mistachkin | fad3039 | 2016-02-13 23:43:46 +0000 | [diff] [blame] | 6835 | rc = SQLITE_NOMEM_BKPT; |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6836 | }else{ |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6837 | assert( db->init.busy==0 ); |
| 6838 | db->init.busy = 1; |
| 6839 | initData.rc = SQLITE_OK; |
drh | 6b86e51 | 2019-01-05 21:09:37 +0000 | [diff] [blame] | 6840 | initData.nInitRow = 0; |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6841 | assert( !db->mallocFailed ); |
| 6842 | rc = sqlite3_exec(db, zSql, sqlite3InitCallback, &initData, 0); |
| 6843 | if( rc==SQLITE_OK ) rc = initData.rc; |
drh | 6b86e51 | 2019-01-05 21:09:37 +0000 | [diff] [blame] | 6844 | if( rc==SQLITE_OK && initData.nInitRow==0 ){ |
| 6845 | /* The OP_ParseSchema opcode with a non-NULL P4 argument should parse |
| 6846 | ** at least one SQL statement. Any less than that indicates that |
drh | 1e32bed | 2020-06-19 13:33:53 +0000 | [diff] [blame] | 6847 | ** the sqlite_schema table is corrupt. */ |
drh | 6b86e51 | 2019-01-05 21:09:37 +0000 | [diff] [blame] | 6848 | rc = SQLITE_CORRUPT_BKPT; |
| 6849 | } |
drh | dbd6a7d | 2017-04-05 12:39:49 +0000 | [diff] [blame] | 6850 | sqlite3DbFreeNN(db, zSql); |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6851 | db->init.busy = 0; |
danielk1977 | a8bbef8 | 2009-03-23 17:11:26 +0000 | [diff] [blame] | 6852 | } |
drh | 3c23a88 | 2007-01-09 14:01:13 +0000 | [diff] [blame] | 6853 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6854 | if( rc ){ |
| 6855 | sqlite3ResetAllSchemasOfConnection(db); |
| 6856 | if( rc==SQLITE_NOMEM ){ |
| 6857 | goto no_mem; |
| 6858 | } |
| 6859 | goto abort_due_to_error; |
danielk1977 | 261919c | 2005-12-06 12:52:59 +0000 | [diff] [blame] | 6860 | } |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6861 | break; |
| 6862 | } |
| 6863 | |
drh | 8bfdf72 | 2009-06-19 14:06:03 +0000 | [diff] [blame] | 6864 | #if !defined(SQLITE_OMIT_ANALYZE) |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6865 | /* Opcode: LoadAnalysis P1 * * * * |
drh | 497e446 | 2005-07-23 03:18:40 +0000 | [diff] [blame] | 6866 | ** |
| 6867 | ** Read the sqlite_stat1 table for database P1 and load the content |
| 6868 | ** of that table into the internal index hash table. This will cause |
| 6869 | ** the analysis to be used when preparing all subsequent queries. |
| 6870 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6871 | case OP_LoadAnalysis: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 6872 | assert( pOp->p1>=0 && pOp->p1<db->nDb ); |
| 6873 | rc = sqlite3AnalysisLoad(db, pOp->p1); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 6874 | if( rc ) goto abort_due_to_error; |
drh | 497e446 | 2005-07-23 03:18:40 +0000 | [diff] [blame] | 6875 | break; |
| 6876 | } |
drh | 8bfdf72 | 2009-06-19 14:06:03 +0000 | [diff] [blame] | 6877 | #endif /* !defined(SQLITE_OMIT_ANALYZE) */ |
drh | 497e446 | 2005-07-23 03:18:40 +0000 | [diff] [blame] | 6878 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6879 | /* Opcode: DropTable P1 * * P4 * |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6880 | ** |
| 6881 | ** Remove the internal (in-memory) data structures that describe |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 6882 | ** the table named P4 in database P1. This is called after a table |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 6883 | ** is dropped from disk (using the Destroy opcode) in order to keep |
| 6884 | ** the internal representation of the |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6885 | ** schema consistent with what is on disk. |
| 6886 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6887 | case OP_DropTable: { |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6888 | sqlite3VdbeIncrWriteCounter(p, 0); |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 6889 | sqlite3UnlinkAndDeleteTable(db, pOp->p1, pOp->p4.z); |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6890 | break; |
| 6891 | } |
| 6892 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6893 | /* Opcode: DropIndex P1 * * P4 * |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6894 | ** |
| 6895 | ** Remove the internal (in-memory) data structures that describe |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 6896 | ** the index named P4 in database P1. This is called after an index |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 6897 | ** is dropped from disk (using the Destroy opcode) |
| 6898 | ** in order to keep the internal representation of the |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6899 | ** schema consistent with what is on disk. |
| 6900 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6901 | case OP_DropIndex: { |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6902 | sqlite3VdbeIncrWriteCounter(p, 0); |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 6903 | sqlite3UnlinkAndDeleteIndex(db, pOp->p1, pOp->p4.z); |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6904 | break; |
| 6905 | } |
| 6906 | |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6907 | /* Opcode: DropTrigger P1 * * P4 * |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6908 | ** |
| 6909 | ** Remove the internal (in-memory) data structures that describe |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 6910 | ** the trigger named P4 in database P1. This is called after a trigger |
drh | 5dad9a3 | 2014-07-25 18:37:42 +0000 | [diff] [blame] | 6911 | ** is dropped from disk (using the Destroy opcode) in order to keep |
| 6912 | ** the internal representation of the |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6913 | ** schema consistent with what is on disk. |
| 6914 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 6915 | case OP_DropTrigger: { |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 6916 | sqlite3VdbeIncrWriteCounter(p, 0); |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 6917 | sqlite3UnlinkAndDeleteTrigger(db, pOp->p1, pOp->p4.z); |
drh | 956bc92 | 2004-07-24 17:38:29 +0000 | [diff] [blame] | 6918 | break; |
| 6919 | } |
| 6920 | |
drh | 234c39d | 2004-07-24 03:30:47 +0000 | [diff] [blame] | 6921 | |
drh | b7f9164 | 2004-10-31 02:22:47 +0000 | [diff] [blame] | 6922 | #ifndef SQLITE_OMIT_INTEGRITY_CHECK |
drh | 98968b2 | 2016-03-15 22:00:39 +0000 | [diff] [blame] | 6923 | /* Opcode: IntegrityCk P1 P2 P3 P4 P5 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6924 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6925 | ** Do an analysis of the currently open database. Store in |
| 6926 | ** register P1 the text of an error message describing any problems. |
| 6927 | ** If no problems are found, store a NULL in register P1. |
drh | 1dcdbc0 | 2007-01-27 02:24:54 +0000 | [diff] [blame] | 6928 | ** |
drh | 66accfc | 2017-02-22 18:04:42 +0000 | [diff] [blame] | 6929 | ** The register P3 contains one less than the maximum number of allowed errors. |
drh | 60a713c | 2008-01-21 16:22:45 +0000 | [diff] [blame] | 6930 | ** At most reg(P3) errors will be reported. |
| 6931 | ** In other words, the analysis stops as soon as reg(P1) errors are |
| 6932 | ** seen. Reg(P1) is updated with the number of errors remaining. |
drh | b19a2bc | 2001-09-16 00:13:26 +0000 | [diff] [blame] | 6933 | ** |
drh | 98968b2 | 2016-03-15 22:00:39 +0000 | [diff] [blame] | 6934 | ** The root page numbers of all tables in the database are integers |
| 6935 | ** stored in P4_INTARRAY argument. |
drh | 2150432 | 2002-06-25 13:16:02 +0000 | [diff] [blame] | 6936 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6937 | ** If P5 is not zero, the check is done on the auxiliary database |
drh | 2150432 | 2002-06-25 13:16:02 +0000 | [diff] [blame] | 6938 | ** file, not the main database file. |
drh | 1dd397f | 2002-02-03 03:34:07 +0000 | [diff] [blame] | 6939 | ** |
drh | 1dcdbc0 | 2007-01-27 02:24:54 +0000 | [diff] [blame] | 6940 | ** This opcode is used to implement the integrity_check pragma. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6941 | */ |
drh | aaab572 | 2002-02-19 13:39:21 +0000 | [diff] [blame] | 6942 | case OP_IntegrityCk: { |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6943 | int nRoot; /* Number of tables to check. (Number of root pages.) */ |
drh | abc3815 | 2020-07-22 13:38:04 +0000 | [diff] [blame] | 6944 | Pgno *aRoot; /* Array of rootpage numbers for tables to be checked */ |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6945 | int nErr; /* Number of errors reported */ |
| 6946 | char *z; /* Text of the error report */ |
| 6947 | Mem *pnErr; /* Register keeping track of errors remaining */ |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 6948 | |
drh | 1713afb | 2013-06-28 01:24:57 +0000 | [diff] [blame] | 6949 | assert( p->bIsReader ); |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6950 | nRoot = pOp->p2; |
drh | 98968b2 | 2016-03-15 22:00:39 +0000 | [diff] [blame] | 6951 | aRoot = pOp->p4.ai; |
drh | 7906975 | 2004-05-22 21:30:40 +0000 | [diff] [blame] | 6952 | assert( nRoot>0 ); |
mistachkin | cec5f1d | 2020-08-04 16:11:37 +0000 | [diff] [blame] | 6953 | assert( aRoot[0]==(Pgno)nRoot ); |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 6954 | assert( pOp->p3>0 && pOp->p3<=(p->nMem+1 - p->nCursor) ); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 6955 | pnErr = &aMem[pOp->p3]; |
drh | 1dcdbc0 | 2007-01-27 02:24:54 +0000 | [diff] [blame] | 6956 | assert( (pnErr->flags & MEM_Int)!=0 ); |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6957 | assert( (pnErr->flags & (MEM_Str|MEM_Blob))==0 ); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 6958 | pIn1 = &aMem[pOp->p1]; |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6959 | assert( pOp->p5<db->nDb ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 6960 | assert( DbMaskTest(p->btreeMask, pOp->p5) ); |
drh | 21f6daa | 2019-10-11 14:21:48 +0000 | [diff] [blame] | 6961 | z = sqlite3BtreeIntegrityCheck(db, db->aDb[pOp->p5].pBt, &aRoot[1], nRoot, |
drh | 66accfc | 2017-02-22 18:04:42 +0000 | [diff] [blame] | 6962 | (int)pnErr->u.i+1, &nErr); |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 6963 | sqlite3VdbeMemSetNull(pIn1); |
drh | 1dcdbc0 | 2007-01-27 02:24:54 +0000 | [diff] [blame] | 6964 | if( nErr==0 ){ |
| 6965 | assert( z==0 ); |
drh | c890fec | 2008-08-01 20:10:08 +0000 | [diff] [blame] | 6966 | }else if( z==0 ){ |
| 6967 | goto no_mem; |
drh | 1dd397f | 2002-02-03 03:34:07 +0000 | [diff] [blame] | 6968 | }else{ |
drh | 66accfc | 2017-02-22 18:04:42 +0000 | [diff] [blame] | 6969 | pnErr->u.i -= nErr-1; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 6970 | sqlite3VdbeMemSetStr(pIn1, z, -1, SQLITE_UTF8, sqlite3_free); |
danielk1977 | 8a6b541 | 2004-05-24 07:04:25 +0000 | [diff] [blame] | 6971 | } |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 6972 | UPDATE_MAX_BLOBSIZE(pIn1); |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 6973 | sqlite3VdbeChangeEncoding(pIn1, encoding); |
drh | 21f6daa | 2019-10-11 14:21:48 +0000 | [diff] [blame] | 6974 | goto check_for_interrupt; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6975 | } |
drh | b7f9164 | 2004-10-31 02:22:47 +0000 | [diff] [blame] | 6976 | #endif /* SQLITE_OMIT_INTEGRITY_CHECK */ |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6977 | |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 6978 | /* Opcode: RowSetAdd P1 P2 * * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 6979 | ** Synopsis: rowset(P1)=r[P2] |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6980 | ** |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 6981 | ** Insert the integer value held by register P2 into a RowSet object |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 6982 | ** held in register P1. |
| 6983 | ** |
| 6984 | ** An assertion fails if P2 is not an integer. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 6985 | */ |
drh | 93952eb | 2009-11-13 19:43:43 +0000 | [diff] [blame] | 6986 | case OP_RowSetAdd: { /* in1, in2 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 6987 | pIn1 = &aMem[pOp->p1]; |
| 6988 | pIn2 = &aMem[pOp->p2]; |
drh | 93952eb | 2009-11-13 19:43:43 +0000 | [diff] [blame] | 6989 | assert( (pIn2->flags & MEM_Int)!=0 ); |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 6990 | if( (pIn1->flags & MEM_Blob)==0 ){ |
| 6991 | if( sqlite3VdbeMemSetRowSet(pIn1) ) goto no_mem; |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 6992 | } |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 6993 | assert( sqlite3VdbeMemIsRowSet(pIn1) ); |
| 6994 | sqlite3RowSetInsert((RowSet*)pIn1->z, pIn2->u.i); |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 6995 | break; |
| 6996 | } |
| 6997 | |
| 6998 | /* Opcode: RowSetRead P1 P2 P3 * * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 6999 | ** Synopsis: r[P3]=rowset(P1) |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 7000 | ** |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 7001 | ** Extract the smallest value from the RowSet object in P1 |
| 7002 | ** and put that value into register P3. |
| 7003 | ** Or, if RowSet object P1 is initially empty, leave P3 |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 7004 | ** unchanged and jump to instruction P2. |
| 7005 | */ |
drh | 93952eb | 2009-11-13 19:43:43 +0000 | [diff] [blame] | 7006 | case OP_RowSetRead: { /* jump, in1, out3 */ |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 7007 | i64 val; |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 7008 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 7009 | pIn1 = &aMem[pOp->p1]; |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 7010 | assert( (pIn1->flags & MEM_Blob)==0 || sqlite3VdbeMemIsRowSet(pIn1) ); |
| 7011 | if( (pIn1->flags & MEM_Blob)==0 |
| 7012 | || sqlite3RowSetNext((RowSet*)pIn1->z, &val)==0 |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 7013 | ){ |
| 7014 | /* The boolean index is empty */ |
drh | 93952eb | 2009-11-13 19:43:43 +0000 | [diff] [blame] | 7015 | sqlite3VdbeMemSetNull(pIn1); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 7016 | VdbeBranchTaken(1,2); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7017 | goto jump_to_p2_and_check_for_interrupt; |
drh | 3d4501e | 2008-12-04 20:40:10 +0000 | [diff] [blame] | 7018 | }else{ |
| 7019 | /* A value was pulled from the index */ |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 7020 | VdbeBranchTaken(0,2); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7021 | sqlite3VdbeMemSetInt64(&aMem[pOp->p3], val); |
drh | 1743575 | 2007-08-16 04:30:38 +0000 | [diff] [blame] | 7022 | } |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 7023 | goto check_for_interrupt; |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 7024 | } |
| 7025 | |
drh | 1b26c7c | 2009-04-22 02:15:47 +0000 | [diff] [blame] | 7026 | /* Opcode: RowSetTest P1 P2 P3 P4 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 7027 | ** Synopsis: if r[P3] in rowset(P1) goto P2 |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7028 | ** |
drh | ade9760 | 2009-04-21 15:05:18 +0000 | [diff] [blame] | 7029 | ** Register P3 is assumed to hold a 64-bit integer value. If register P1 |
drh | 1b26c7c | 2009-04-22 02:15:47 +0000 | [diff] [blame] | 7030 | ** contains a RowSet object and that RowSet object contains |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7031 | ** the value held in P3, jump to register P2. Otherwise, insert the |
drh | 1b26c7c | 2009-04-22 02:15:47 +0000 | [diff] [blame] | 7032 | ** integer in P3 into the RowSet and continue on to the |
drh | ade9760 | 2009-04-21 15:05:18 +0000 | [diff] [blame] | 7033 | ** next opcode. |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7034 | ** |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 7035 | ** The RowSet object is optimized for the case where sets of integers |
| 7036 | ** are inserted in distinct phases, which each set contains no duplicates. |
| 7037 | ** Each set is identified by a unique P4 value. The first set |
| 7038 | ** must have P4==0, the final set must have P4==-1, and for all other sets |
| 7039 | ** must have P4>0. |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7040 | ** |
| 7041 | ** This allows optimizations: (a) when P4==0 there is no need to test |
drh | bb6783b | 2017-04-29 18:02:49 +0000 | [diff] [blame] | 7042 | ** the RowSet object for P3, as it is guaranteed not to contain it, |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7043 | ** (b) when P4==-1 there is no need to insert the value, as it will |
| 7044 | ** never be tested for, and (c) when a value that is part of set X is |
| 7045 | ** inserted, there is no need to search to see if the same value was |
| 7046 | ** previously inserted as part of set X (only if it was previously |
| 7047 | ** inserted as part of some other set). |
| 7048 | */ |
drh | 1b26c7c | 2009-04-22 02:15:47 +0000 | [diff] [blame] | 7049 | case OP_RowSetTest: { /* jump, in1, in3 */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 7050 | int iSet; |
| 7051 | int exists; |
| 7052 | |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 7053 | pIn1 = &aMem[pOp->p1]; |
| 7054 | pIn3 = &aMem[pOp->p3]; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 7055 | iSet = pOp->p4.i; |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7056 | assert( pIn3->flags&MEM_Int ); |
| 7057 | |
drh | 1b26c7c | 2009-04-22 02:15:47 +0000 | [diff] [blame] | 7058 | /* If there is anything other than a rowset object in memory cell P1, |
| 7059 | ** delete it now and initialize P1 with an empty rowset |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7060 | */ |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 7061 | if( (pIn1->flags & MEM_Blob)==0 ){ |
| 7062 | if( sqlite3VdbeMemSetRowSet(pIn1) ) goto no_mem; |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7063 | } |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 7064 | assert( sqlite3VdbeMemIsRowSet(pIn1) ); |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7065 | assert( pOp->p4type==P4_INT32 ); |
drh | 1b26c7c | 2009-04-22 02:15:47 +0000 | [diff] [blame] | 7066 | assert( iSet==-1 || iSet>=0 ); |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7067 | if( iSet ){ |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 7068 | exists = sqlite3RowSetTest((RowSet*)pIn1->z, iSet, pIn3->u.i); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 7069 | VdbeBranchTaken(exists!=0,2); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7070 | if( exists ) goto jump_to_p2; |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7071 | } |
| 7072 | if( iSet>=0 ){ |
drh | 9d67afc | 2018-08-29 20:24:03 +0000 | [diff] [blame] | 7073 | sqlite3RowSetInsert((RowSet*)pIn1->z, pIn3->u.i); |
danielk1977 | 1d46146 | 2009-04-21 09:02:45 +0000 | [diff] [blame] | 7074 | } |
| 7075 | break; |
| 7076 | } |
| 7077 | |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 7078 | |
danielk1977 | 93758c8 | 2005-01-21 08:13:14 +0000 | [diff] [blame] | 7079 | #ifndef SQLITE_OMIT_TRIGGER |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7080 | |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 7081 | /* Opcode: Program P1 P2 P3 P4 P5 |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7082 | ** |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7083 | ** Execute the trigger program passed as P4 (type P4_SUBPROGRAM). |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7084 | ** |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7085 | ** P1 contains the address of the memory cell that contains the first memory |
| 7086 | ** cell in an array of values used as arguments to the sub-program. P2 |
| 7087 | ** contains the address to jump to if the sub-program throws an IGNORE |
| 7088 | ** exception using the RAISE() function. Register P3 contains the address |
| 7089 | ** of a memory cell in this (the parent) VM that is used to allocate the |
| 7090 | ** memory required by the sub-vdbe at runtime. |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7091 | ** |
| 7092 | ** P4 is a pointer to the VM containing the trigger program. |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 7093 | ** |
| 7094 | ** If P5 is non-zero, then recursive program invocation is enabled. |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7095 | */ |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7096 | case OP_Program: { /* jump */ |
dan | 65a7cd1 | 2009-09-01 12:16:01 +0000 | [diff] [blame] | 7097 | int nMem; /* Number of memory registers for sub-program */ |
| 7098 | int nByte; /* Bytes of runtime space required for sub-program */ |
| 7099 | Mem *pRt; /* Register to allocate runtime space */ |
| 7100 | Mem *pMem; /* Used to iterate through memory cells */ |
| 7101 | Mem *pEnd; /* Last memory cell in new array */ |
| 7102 | VdbeFrame *pFrame; /* New vdbe frame to execute in */ |
| 7103 | SubProgram *pProgram; /* Sub-program to execute */ |
| 7104 | void *t; /* Token identifying trigger */ |
| 7105 | |
| 7106 | pProgram = pOp->p4.pProgram; |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 7107 | pRt = &aMem[pOp->p3]; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7108 | assert( pProgram->nOp>0 ); |
| 7109 | |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 7110 | /* If the p5 flag is clear, then recursive invocation of triggers is |
| 7111 | ** disabled for backwards compatibility (p5 is set if this sub-program |
| 7112 | ** is really a trigger, not a foreign key action, and the flag set |
| 7113 | ** and cleared by the "PRAGMA recursive_triggers" command is clear). |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7114 | ** |
| 7115 | ** It is recursive invocation of triggers, at the SQL level, that is |
| 7116 | ** disabled. In some cases a single trigger may generate more than one |
| 7117 | ** SubProgram (if the trigger may be executed with more than one different |
| 7118 | ** ON CONFLICT algorithm). SubProgram structures associated with a |
| 7119 | ** single trigger all have the same value for the SubProgram.token |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 7120 | ** variable. */ |
| 7121 | if( pOp->p5 ){ |
dan | 65a7cd1 | 2009-09-01 12:16:01 +0000 | [diff] [blame] | 7122 | t = pProgram->token; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7123 | for(pFrame=p->pFrame; pFrame && pFrame->token!=t; pFrame=pFrame->pParent); |
| 7124 | if( pFrame ) break; |
| 7125 | } |
| 7126 | |
dan | f589450 | 2009-10-07 18:41:19 +0000 | [diff] [blame] | 7127 | if( p->nFrame>=db->aLimit[SQLITE_LIMIT_TRIGGER_DEPTH] ){ |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7128 | rc = SQLITE_ERROR; |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 7129 | sqlite3VdbeError(p, "too many levels of trigger recursion"); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7130 | goto abort_due_to_error; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7131 | } |
| 7132 | |
| 7133 | /* Register pRt is used to store the memory required to save the state |
| 7134 | ** of the current program, and the memory required at runtime to execute |
| 7135 | ** the trigger program. If this trigger has been fired before, then pRt |
| 7136 | ** is already allocated. Otherwise, it must be initialized. */ |
drh | 72f56ef | 2018-08-29 18:47:22 +0000 | [diff] [blame] | 7137 | if( (pRt->flags&MEM_Blob)==0 ){ |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7138 | /* SubProgram.nMem is set to the number of memory cells used by the |
| 7139 | ** program stored in SubProgram.aOp. As well as these, one memory |
| 7140 | ** cell is required for each cursor used by the program. Set local |
| 7141 | ** variable nMem (and later, VdbeFrame.nChildMem) to this value. |
| 7142 | */ |
dan | 65a7cd1 | 2009-09-01 12:16:01 +0000 | [diff] [blame] | 7143 | nMem = pProgram->nMem + pProgram->nCsr; |
drh | 3cdce92 | 2016-03-21 00:30:40 +0000 | [diff] [blame] | 7144 | assert( nMem>0 ); |
| 7145 | if( pProgram->nCsr==0 ) nMem++; |
dan | 65a7cd1 | 2009-09-01 12:16:01 +0000 | [diff] [blame] | 7146 | nByte = ROUND8(sizeof(VdbeFrame)) |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7147 | + nMem * sizeof(Mem) |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 7148 | + pProgram->nCsr * sizeof(VdbeCursor*) |
| 7149 | + (pProgram->nOp + 7)/8; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7150 | pFrame = sqlite3DbMallocZero(db, nByte); |
| 7151 | if( !pFrame ){ |
| 7152 | goto no_mem; |
| 7153 | } |
| 7154 | sqlite3VdbeMemRelease(pRt); |
drh | 72f56ef | 2018-08-29 18:47:22 +0000 | [diff] [blame] | 7155 | pRt->flags = MEM_Blob|MEM_Dyn; |
| 7156 | pRt->z = (char*)pFrame; |
| 7157 | pRt->n = nByte; |
| 7158 | pRt->xDel = sqlite3VdbeFrameMemDel; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7159 | |
| 7160 | pFrame->v = p; |
| 7161 | pFrame->nChildMem = nMem; |
| 7162 | pFrame->nChildCsr = pProgram->nCsr; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7163 | pFrame->pc = (int)(pOp - aOp); |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7164 | pFrame->aMem = p->aMem; |
| 7165 | pFrame->nMem = p->nMem; |
| 7166 | pFrame->apCsr = p->apCsr; |
| 7167 | pFrame->nCursor = p->nCursor; |
| 7168 | pFrame->aOp = p->aOp; |
| 7169 | pFrame->nOp = p->nOp; |
| 7170 | pFrame->token = pProgram->token; |
drh | 72f56ef | 2018-08-29 18:47:22 +0000 | [diff] [blame] | 7171 | #ifdef SQLITE_DEBUG |
| 7172 | pFrame->iFrameMagic = SQLITE_FRAME_MAGIC; |
| 7173 | #endif |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7174 | |
| 7175 | pEnd = &VdbeFrameMem(pFrame)[pFrame->nChildMem]; |
| 7176 | for(pMem=VdbeFrameMem(pFrame); pMem!=pEnd; pMem++){ |
drh | a5750cf | 2014-02-07 13:20:31 +0000 | [diff] [blame] | 7177 | pMem->flags = MEM_Undefined; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7178 | pMem->db = db; |
| 7179 | } |
| 7180 | }else{ |
drh | 72f56ef | 2018-08-29 18:47:22 +0000 | [diff] [blame] | 7181 | pFrame = (VdbeFrame*)pRt->z; |
| 7182 | assert( pRt->xDel==sqlite3VdbeFrameMemDel ); |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 7183 | assert( pProgram->nMem+pProgram->nCsr==pFrame->nChildMem |
| 7184 | || (pProgram->nCsr==0 && pProgram->nMem+1==pFrame->nChildMem) ); |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7185 | assert( pProgram->nCsr==pFrame->nChildCsr ); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7186 | assert( (int)(pOp - aOp)==pFrame->pc ); |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7187 | } |
| 7188 | |
| 7189 | p->nFrame++; |
| 7190 | pFrame->pParent = p->pFrame; |
drh | fae58d5 | 2017-01-26 17:26:44 +0000 | [diff] [blame] | 7191 | pFrame->lastRowid = db->lastRowid; |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7192 | pFrame->nChange = p->nChange; |
dan | c3da667 | 2014-10-28 18:24:16 +0000 | [diff] [blame] | 7193 | pFrame->nDbChange = p->db->nChange; |
dan | 3200132 | 2016-02-19 18:54:29 +0000 | [diff] [blame] | 7194 | assert( pFrame->pAuxData==0 ); |
| 7195 | pFrame->pAuxData = p->pAuxData; |
| 7196 | p->pAuxData = 0; |
dan | 2832ad4 | 2009-08-31 15:27:27 +0000 | [diff] [blame] | 7197 | p->nChange = 0; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7198 | p->pFrame = pFrame; |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 7199 | p->aMem = aMem = VdbeFrameMem(pFrame); |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7200 | p->nMem = pFrame->nChildMem; |
shane | cea72b2 | 2009-09-07 04:38:36 +0000 | [diff] [blame] | 7201 | p->nCursor = (u16)pFrame->nChildCsr; |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 7202 | p->apCsr = (VdbeCursor **)&aMem[p->nMem]; |
drh | ab087d4 | 2017-03-24 17:59:56 +0000 | [diff] [blame] | 7203 | pFrame->aOnce = (u8*)&p->apCsr[pProgram->nCsr]; |
drh | 18333ef | 2017-03-24 18:38:41 +0000 | [diff] [blame] | 7204 | memset(pFrame->aOnce, 0, (pProgram->nOp + 7)/8); |
drh | bbe879d | 2009-11-14 18:04:35 +0000 | [diff] [blame] | 7205 | p->aOp = aOp = pProgram->aOp; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7206 | p->nOp = pProgram->nOp; |
drh | b2e61bc | 2019-01-25 19:29:01 +0000 | [diff] [blame] | 7207 | #ifdef SQLITE_DEBUG |
| 7208 | /* Verify that second and subsequent executions of the same trigger do not |
| 7209 | ** try to reuse register values from the first use. */ |
| 7210 | { |
| 7211 | int i; |
| 7212 | for(i=0; i<p->nMem; i++){ |
| 7213 | aMem[i].pScopyFrom = 0; /* Prevent false-positive AboutToChange() errs */ |
drh | f5cfe6f | 2020-03-03 20:48:12 +0000 | [diff] [blame] | 7214 | MemSetTypeFlag(&aMem[i], MEM_Undefined); /* Fault if this reg is reused */ |
drh | b2e61bc | 2019-01-25 19:29:01 +0000 | [diff] [blame] | 7215 | } |
| 7216 | } |
| 7217 | #endif |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7218 | pOp = &aOp[-1]; |
drh | b1af9c6 | 2019-02-20 13:55:45 +0000 | [diff] [blame] | 7219 | goto check_for_interrupt; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7220 | } |
| 7221 | |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7222 | /* Opcode: Param P1 P2 * * * |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7223 | ** |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7224 | ** This opcode is only ever present in sub-programs called via the |
| 7225 | ** OP_Program instruction. Copy a value currently stored in a memory |
| 7226 | ** cell of the calling (parent) frame to cell P2 in the current frames |
| 7227 | ** address space. This is used by trigger programs to access the new.* |
| 7228 | ** and old.* values. |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7229 | ** |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7230 | ** The address of the cell in the parent frame is determined by adding |
| 7231 | ** the value of the P1 argument to the value of the P1 argument to the |
| 7232 | ** calling OP_Program instruction. |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7233 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 7234 | case OP_Param: { /* out2 */ |
dan | 65a7cd1 | 2009-09-01 12:16:01 +0000 | [diff] [blame] | 7235 | VdbeFrame *pFrame; |
| 7236 | Mem *pIn; |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 7237 | pOut = out2Prerelease(p, pOp); |
dan | 65a7cd1 | 2009-09-01 12:16:01 +0000 | [diff] [blame] | 7238 | pFrame = p->pFrame; |
| 7239 | pIn = &pFrame->aMem[pOp->p1 + pFrame->aOp[pFrame->pc].p1]; |
dan | 165921a | 2009-08-28 18:53:45 +0000 | [diff] [blame] | 7240 | sqlite3VdbeMemShallowCopy(pOut, pIn, MEM_Ephem); |
| 7241 | break; |
| 7242 | } |
| 7243 | |
danielk1977 | 93758c8 | 2005-01-21 08:13:14 +0000 | [diff] [blame] | 7244 | #endif /* #ifndef SQLITE_OMIT_TRIGGER */ |
rdc | b0c374f | 2004-02-20 22:53:38 +0000 | [diff] [blame] | 7245 | |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 7246 | #ifndef SQLITE_OMIT_FOREIGN_KEY |
dan | 32b09f2 | 2009-09-23 17:29:59 +0000 | [diff] [blame] | 7247 | /* Opcode: FkCounter P1 P2 * * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 7248 | ** Synopsis: fkctr[P1]+=P2 |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 7249 | ** |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 7250 | ** Increment a "constraint counter" by P2 (P2 may be negative or positive). |
| 7251 | ** If P1 is non-zero, the database constraint counter is incremented |
| 7252 | ** (deferred foreign key constraints). Otherwise, if P1 is zero, the |
dan | 32b09f2 | 2009-09-23 17:29:59 +0000 | [diff] [blame] | 7253 | ** statement counter is incremented (immediate foreign key constraints). |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 7254 | */ |
dan | 32b09f2 | 2009-09-23 17:29:59 +0000 | [diff] [blame] | 7255 | case OP_FkCounter: { |
drh | 963c74d | 2013-07-11 12:19:12 +0000 | [diff] [blame] | 7256 | if( db->flags & SQLITE_DeferFKs ){ |
dan | cb3e4b7 | 2013-07-03 19:53:05 +0000 | [diff] [blame] | 7257 | db->nDeferredImmCons += pOp->p2; |
| 7258 | }else if( pOp->p1 ){ |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 7259 | db->nDeferredCons += pOp->p2; |
dan | 32b09f2 | 2009-09-23 17:29:59 +0000 | [diff] [blame] | 7260 | }else{ |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 7261 | p->nFkConstraint += pOp->p2; |
| 7262 | } |
| 7263 | break; |
| 7264 | } |
| 7265 | |
| 7266 | /* Opcode: FkIfZero P1 P2 * * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 7267 | ** Synopsis: if fkctr[P1]==0 goto P2 |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 7268 | ** |
| 7269 | ** This opcode tests if a foreign key constraint-counter is currently zero. |
| 7270 | ** If so, jump to instruction P2. Otherwise, fall through to the next |
| 7271 | ** instruction. |
| 7272 | ** |
| 7273 | ** If P1 is non-zero, then the jump is taken if the database constraint-counter |
| 7274 | ** is zero (the one that counts deferred constraint violations). If P1 is |
| 7275 | ** zero, the jump is taken if the statement constraint-counter is zero |
| 7276 | ** (immediate foreign key constraint violations). |
| 7277 | */ |
| 7278 | case OP_FkIfZero: { /* jump */ |
| 7279 | if( pOp->p1 ){ |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 7280 | VdbeBranchTaken(db->nDeferredCons==0 && db->nDeferredImmCons==0, 2); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7281 | if( db->nDeferredCons==0 && db->nDeferredImmCons==0 ) goto jump_to_p2; |
dan | 0ff297e | 2009-09-25 17:03:14 +0000 | [diff] [blame] | 7282 | }else{ |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 7283 | VdbeBranchTaken(p->nFkConstraint==0 && db->nDeferredImmCons==0, 2); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7284 | if( p->nFkConstraint==0 && db->nDeferredImmCons==0 ) goto jump_to_p2; |
dan | 32b09f2 | 2009-09-23 17:29:59 +0000 | [diff] [blame] | 7285 | } |
dan | 1da40a3 | 2009-09-19 17:00:31 +0000 | [diff] [blame] | 7286 | break; |
| 7287 | } |
| 7288 | #endif /* #ifndef SQLITE_OMIT_FOREIGN_KEY */ |
| 7289 | |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 7290 | #ifndef SQLITE_OMIT_AUTOINCREMENT |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7291 | /* Opcode: MemMax P1 P2 * * * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 7292 | ** Synopsis: r[P1]=max(r[P1],r[P2]) |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 7293 | ** |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7294 | ** P1 is a register in the root frame of this VM (the root frame is |
| 7295 | ** different from the current frame if this instruction is being executed |
| 7296 | ** within a sub-program). Set the value of register P1 to the maximum of |
| 7297 | ** its current value and the value in register P2. |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 7298 | ** |
| 7299 | ** This instruction throws an error if the memory cell is not initially |
| 7300 | ** an integer. |
| 7301 | */ |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7302 | case OP_MemMax: { /* in2 */ |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7303 | VdbeFrame *pFrame; |
| 7304 | if( p->pFrame ){ |
| 7305 | for(pFrame=p->pFrame; pFrame->pParent; pFrame=pFrame->pParent); |
| 7306 | pIn1 = &pFrame->aMem[pOp->p1]; |
| 7307 | }else{ |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 7308 | pIn1 = &aMem[pOp->p1]; |
dan | 76d462e | 2009-08-30 11:42:51 +0000 | [diff] [blame] | 7309 | } |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 7310 | assert( memIsValid(pIn1) ); |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7311 | sqlite3VdbeMemIntegerify(pIn1); |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 7312 | pIn2 = &aMem[pOp->p2]; |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7313 | sqlite3VdbeMemIntegerify(pIn2); |
| 7314 | if( pIn1->u.i<pIn2->u.i){ |
| 7315 | pIn1->u.i = pIn2->u.i; |
drh | 205f48e | 2004-11-05 00:43:11 +0000 | [diff] [blame] | 7316 | } |
| 7317 | break; |
| 7318 | } |
| 7319 | #endif /* SQLITE_OMIT_AUTOINCREMENT */ |
| 7320 | |
drh | 8b0cf38 | 2015-10-06 21:07:06 +0000 | [diff] [blame] | 7321 | /* Opcode: IfPos P1 P2 P3 * * |
| 7322 | ** Synopsis: if r[P1]>0 then r[P1]-=P3, goto P2 |
danielk1977 | a2dc3b1 | 2005-02-05 12:48:48 +0000 | [diff] [blame] | 7323 | ** |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7324 | ** Register P1 must contain an integer. |
mistachkin | 91a3ecb | 2015-10-06 21:49:55 +0000 | [diff] [blame] | 7325 | ** If the value of register P1 is 1 or greater, subtract P3 from the |
drh | 8b0cf38 | 2015-10-06 21:07:06 +0000 | [diff] [blame] | 7326 | ** value in P1 and jump to P2. |
drh | 6f58f70 | 2006-01-08 05:26:41 +0000 | [diff] [blame] | 7327 | ** |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7328 | ** If the initial value of register P1 is less than 1, then the |
| 7329 | ** value is unchanged and control passes through to the next instruction. |
danielk1977 | a2dc3b1 | 2005-02-05 12:48:48 +0000 | [diff] [blame] | 7330 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7331 | case OP_IfPos: { /* jump, in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 7332 | pIn1 = &aMem[pOp->p1]; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 7333 | assert( pIn1->flags&MEM_Int ); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 7334 | VdbeBranchTaken( pIn1->u.i>0, 2); |
drh | 8b0cf38 | 2015-10-06 21:07:06 +0000 | [diff] [blame] | 7335 | if( pIn1->u.i>0 ){ |
| 7336 | pIn1->u.i -= pOp->p3; |
| 7337 | goto jump_to_p2; |
| 7338 | } |
drh | ec7429a | 2005-10-06 16:53:14 +0000 | [diff] [blame] | 7339 | break; |
| 7340 | } |
| 7341 | |
drh | cc2fa4c | 2016-01-25 15:57:29 +0000 | [diff] [blame] | 7342 | /* Opcode: OffsetLimit P1 P2 P3 * * |
| 7343 | ** Synopsis: if r[P1]>0 then r[P2]=r[P1]+max(0,r[P3]) else r[P2]=(-1) |
drh | 15007a9 | 2006-01-08 18:10:17 +0000 | [diff] [blame] | 7344 | ** |
drh | cc2fa4c | 2016-01-25 15:57:29 +0000 | [diff] [blame] | 7345 | ** This opcode performs a commonly used computation associated with |
drh | e24a6f5 | 2022-08-04 14:02:35 +0000 | [diff] [blame] | 7346 | ** LIMIT and OFFSET processing. r[P1] holds the limit counter. r[P3] |
drh | cc2fa4c | 2016-01-25 15:57:29 +0000 | [diff] [blame] | 7347 | ** holds the offset counter. The opcode computes the combined value |
| 7348 | ** of the LIMIT and OFFSET and stores that value in r[P2]. The r[P2] |
| 7349 | ** value computed is the total number of rows that will need to be |
| 7350 | ** visited in order to complete the query. |
| 7351 | ** |
| 7352 | ** If r[P3] is zero or negative, that means there is no OFFSET |
| 7353 | ** and r[P2] is set to be the value of the LIMIT, r[P1]. |
| 7354 | ** |
| 7355 | ** if r[P1] is zero or negative, that means there is no LIMIT |
| 7356 | ** and r[P2] is set to -1. |
| 7357 | ** |
| 7358 | ** Otherwise, r[P2] is set to the sum of r[P1] and r[P3]. |
drh | 15007a9 | 2006-01-08 18:10:17 +0000 | [diff] [blame] | 7359 | */ |
drh | cc2fa4c | 2016-01-25 15:57:29 +0000 | [diff] [blame] | 7360 | case OP_OffsetLimit: { /* in1, out2, in3 */ |
drh | 719da30 | 2016-12-10 04:06:49 +0000 | [diff] [blame] | 7361 | i64 x; |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 7362 | pIn1 = &aMem[pOp->p1]; |
drh | cc2fa4c | 2016-01-25 15:57:29 +0000 | [diff] [blame] | 7363 | pIn3 = &aMem[pOp->p3]; |
| 7364 | pOut = out2Prerelease(p, pOp); |
| 7365 | assert( pIn1->flags & MEM_Int ); |
| 7366 | assert( pIn3->flags & MEM_Int ); |
drh | 719da30 | 2016-12-10 04:06:49 +0000 | [diff] [blame] | 7367 | x = pIn1->u.i; |
| 7368 | if( x<=0 || sqlite3AddInt64(&x, pIn3->u.i>0?pIn3->u.i:0) ){ |
| 7369 | /* If the LIMIT is less than or equal to zero, loop forever. This |
| 7370 | ** is documented. But also, if the LIMIT+OFFSET exceeds 2^63 then |
| 7371 | ** also loop forever. This is undocumented. In fact, one could argue |
| 7372 | ** that the loop should terminate. But assuming 1 billion iterations |
| 7373 | ** per second (far exceeding the capabilities of any current hardware) |
| 7374 | ** it would take nearly 300 years to actually reach the limit. So |
| 7375 | ** looping forever is a reasonable approximation. */ |
| 7376 | pOut->u.i = -1; |
| 7377 | }else{ |
| 7378 | pOut->u.i = x; |
| 7379 | } |
drh | 15007a9 | 2006-01-08 18:10:17 +0000 | [diff] [blame] | 7380 | break; |
| 7381 | } |
| 7382 | |
drh | f99dd35 | 2016-12-18 17:42:00 +0000 | [diff] [blame] | 7383 | /* Opcode: IfNotZero P1 P2 * * * |
| 7384 | ** Synopsis: if r[P1]!=0 then r[P1]--, goto P2 |
drh | ec7429a | 2005-10-06 16:53:14 +0000 | [diff] [blame] | 7385 | ** |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7386 | ** Register P1 must contain an integer. If the content of register P1 is |
drh | f99dd35 | 2016-12-18 17:42:00 +0000 | [diff] [blame] | 7387 | ** initially greater than zero, then decrement the value in register P1. |
| 7388 | ** If it is non-zero (negative or positive) and then also jump to P2. |
| 7389 | ** If register P1 is initially zero, leave it unchanged and fall through. |
drh | ec7429a | 2005-10-06 16:53:14 +0000 | [diff] [blame] | 7390 | */ |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7391 | case OP_IfNotZero: { /* jump, in1 */ |
drh | 3c65721 | 2009-11-17 23:59:58 +0000 | [diff] [blame] | 7392 | pIn1 = &aMem[pOp->p1]; |
danielk1977 | a7a8e14 | 2008-02-13 18:25:27 +0000 | [diff] [blame] | 7393 | assert( pIn1->flags&MEM_Int ); |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7394 | VdbeBranchTaken(pIn1->u.i<0, 2); |
| 7395 | if( pIn1->u.i ){ |
drh | f99dd35 | 2016-12-18 17:42:00 +0000 | [diff] [blame] | 7396 | if( pIn1->u.i>0 ) pIn1->u.i--; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7397 | goto jump_to_p2; |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7398 | } |
| 7399 | break; |
| 7400 | } |
| 7401 | |
| 7402 | /* Opcode: DecrJumpZero P1 P2 * * * |
| 7403 | ** Synopsis: if (--r[P1])==0 goto P2 |
| 7404 | ** |
drh | ab5be2e | 2016-11-30 05:08:59 +0000 | [diff] [blame] | 7405 | ** Register P1 must hold an integer. Decrement the value in P1 |
| 7406 | ** and jump to P2 if the new value is exactly zero. |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7407 | */ |
| 7408 | case OP_DecrJumpZero: { /* jump, in1 */ |
| 7409 | pIn1 = &aMem[pOp->p1]; |
| 7410 | assert( pIn1->flags&MEM_Int ); |
drh | ab5be2e | 2016-11-30 05:08:59 +0000 | [diff] [blame] | 7411 | if( pIn1->u.i>SMALLEST_INT64 ) pIn1->u.i--; |
| 7412 | VdbeBranchTaken(pIn1->u.i==0, 2); |
| 7413 | if( pIn1->u.i==0 ) goto jump_to_p2; |
drh | a2a49dc | 2008-01-02 14:28:13 +0000 | [diff] [blame] | 7414 | break; |
| 7415 | } |
| 7416 | |
drh | 1689707 | 2015-03-07 00:57:37 +0000 | [diff] [blame] | 7417 | |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7418 | /* Opcode: AggStep * P2 P3 P4 P5 |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 7419 | ** Synopsis: accum=r[P3] step(r[P2@P5]) |
drh | e509535 | 2002-02-24 03:25:14 +0000 | [diff] [blame] | 7420 | ** |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7421 | ** Execute the xStep function for an aggregate. |
| 7422 | ** The function has P5 arguments. P4 is a pointer to the |
dan | 9a94722 | 2018-06-14 19:06:36 +0000 | [diff] [blame] | 7423 | ** FuncDef structure that specifies the function. Register P3 is the |
drh | e2d9e7c | 2015-06-26 18:47:53 +0000 | [diff] [blame] | 7424 | ** accumulator. |
drh | e509535 | 2002-02-24 03:25:14 +0000 | [diff] [blame] | 7425 | ** |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7426 | ** The P5 arguments are taken from register P2 and its |
| 7427 | ** successors. |
drh | e509535 | 2002-02-24 03:25:14 +0000 | [diff] [blame] | 7428 | */ |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7429 | /* Opcode: AggInverse * P2 P3 P4 P5 |
| 7430 | ** Synopsis: accum=r[P3] inverse(r[P2@P5]) |
| 7431 | ** |
| 7432 | ** Execute the xInverse function for an aggregate. |
| 7433 | ** The function has P5 arguments. P4 is a pointer to the |
| 7434 | ** FuncDef structure that specifies the function. Register P3 is the |
| 7435 | ** accumulator. |
| 7436 | ** |
| 7437 | ** The P5 arguments are taken from register P2 and its |
| 7438 | ** successors. |
| 7439 | */ |
| 7440 | /* Opcode: AggStep1 P1 P2 P3 P4 P5 |
drh | e2d9e7c | 2015-06-26 18:47:53 +0000 | [diff] [blame] | 7441 | ** Synopsis: accum=r[P3] step(r[P2@P5]) |
| 7442 | ** |
dan | 9a94722 | 2018-06-14 19:06:36 +0000 | [diff] [blame] | 7443 | ** Execute the xStep (if P1==0) or xInverse (if P1!=0) function for an |
| 7444 | ** aggregate. The function has P5 arguments. P4 is a pointer to the |
| 7445 | ** FuncDef structure that specifies the function. Register P3 is the |
| 7446 | ** accumulator. |
drh | e2d9e7c | 2015-06-26 18:47:53 +0000 | [diff] [blame] | 7447 | ** |
| 7448 | ** The P5 arguments are taken from register P2 and its |
| 7449 | ** successors. |
| 7450 | ** |
| 7451 | ** This opcode is initially coded as OP_AggStep0. On first evaluation, |
| 7452 | ** the FuncDef stored in P4 is converted into an sqlite3_context and |
| 7453 | ** the opcode is changed. In this way, the initialization of the |
| 7454 | ** sqlite3_context only happens once, instead of on each call to the |
| 7455 | ** step function. |
| 7456 | */ |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7457 | case OP_AggInverse: |
| 7458 | case OP_AggStep: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 7459 | int n; |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7460 | sqlite3_context *pCtx; |
drh | e509535 | 2002-02-24 03:25:14 +0000 | [diff] [blame] | 7461 | |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7462 | assert( pOp->p4type==P4_FUNCDEF ); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 7463 | n = pOp->p5; |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 7464 | assert( pOp->p3>0 && pOp->p3<=(p->nMem+1 - p->nCursor) ); |
| 7465 | assert( n==0 || (pOp->p2>0 && pOp->p2+n<=(p->nMem+1 - p->nCursor)+1) ); |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7466 | assert( pOp->p3<pOp->p2 || pOp->p3>=pOp->p2+n ); |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 7467 | pCtx = sqlite3DbMallocRawNN(db, n*sizeof(sqlite3_value*) + |
| 7468 | (sizeof(pCtx[0]) + sizeof(Mem) - sizeof(sqlite3_value*))); |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7469 | if( pCtx==0 ) goto no_mem; |
| 7470 | pCtx->pMem = 0; |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 7471 | pCtx->pOut = (Mem*)&(pCtx->argv[n]); |
| 7472 | sqlite3VdbeMemInit(pCtx->pOut, db, MEM_Null); |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7473 | pCtx->pFunc = pOp->p4.pFunc; |
| 7474 | pCtx->iOp = (int)(pOp - aOp); |
| 7475 | pCtx->pVdbe = p; |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 7476 | pCtx->skipFlag = 0; |
| 7477 | pCtx->isError = 0; |
drh | 659fdb4 | 2022-04-01 15:31:58 +0000 | [diff] [blame] | 7478 | pCtx->enc = encoding; |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7479 | pCtx->argc = n; |
| 7480 | pOp->p4type = P4_FUNCCTX; |
| 7481 | pOp->p4.pCtx = pCtx; |
drh | 2c885d0 | 2018-07-07 19:36:04 +0000 | [diff] [blame] | 7482 | |
| 7483 | /* OP_AggInverse must have P1==1 and OP_AggStep must have P1==0 */ |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7484 | assert( pOp->p1==(pOp->opcode==OP_AggInverse) ); |
drh | 2c885d0 | 2018-07-07 19:36:04 +0000 | [diff] [blame] | 7485 | |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7486 | pOp->opcode = OP_AggStep1; |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7487 | /* Fall through into OP_AggStep */ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 7488 | /* no break */ deliberate_fall_through |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7489 | } |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7490 | case OP_AggStep1: { |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7491 | int i; |
| 7492 | sqlite3_context *pCtx; |
| 7493 | Mem *pMem; |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7494 | |
| 7495 | assert( pOp->p4type==P4_FUNCCTX ); |
| 7496 | pCtx = pOp->p4.pCtx; |
| 7497 | pMem = &aMem[pOp->p3]; |
| 7498 | |
drh | 2c885d0 | 2018-07-07 19:36:04 +0000 | [diff] [blame] | 7499 | #ifdef SQLITE_DEBUG |
| 7500 | if( pOp->p1 ){ |
| 7501 | /* This is an OP_AggInverse call. Verify that xStep has always |
| 7502 | ** been called at least once prior to any xInverse call. */ |
| 7503 | assert( pMem->uTemp==0x1122e0e3 ); |
| 7504 | }else{ |
| 7505 | /* This is an OP_AggStep call. Mark it as such. */ |
| 7506 | pMem->uTemp = 0x1122e0e3; |
| 7507 | } |
| 7508 | #endif |
| 7509 | |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7510 | /* If this function is inside of a trigger, the register array in aMem[] |
| 7511 | ** might change from one evaluation to the next. The next block of code |
| 7512 | ** checks to see if the register array has changed, and if so it |
| 7513 | ** reinitializes the relavant parts of the sqlite3_context object */ |
| 7514 | if( pCtx->pMem != pMem ){ |
| 7515 | pCtx->pMem = pMem; |
| 7516 | for(i=pCtx->argc-1; i>=0; i--) pCtx->argv[i] = &aMem[pOp->p2+i]; |
| 7517 | } |
| 7518 | |
| 7519 | #ifdef SQLITE_DEBUG |
| 7520 | for(i=0; i<pCtx->argc; i++){ |
| 7521 | assert( memIsValid(pCtx->argv[i]) ); |
| 7522 | REGISTER_TRACE(pOp->p2+i, pCtx->argv[i]); |
| 7523 | } |
| 7524 | #endif |
| 7525 | |
drh | abfcea2 | 2005-09-06 20:36:48 +0000 | [diff] [blame] | 7526 | pMem->n++; |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 7527 | assert( pCtx->pOut->flags==MEM_Null ); |
| 7528 | assert( pCtx->isError==0 ); |
| 7529 | assert( pCtx->skipFlag==0 ); |
dan | 67a9b8e | 2018-06-22 20:51:35 +0000 | [diff] [blame] | 7530 | #ifndef SQLITE_OMIT_WINDOWFUNC |
| 7531 | if( pOp->p1 ){ |
| 7532 | (pCtx->pFunc->xInverse)(pCtx,pCtx->argc,pCtx->argv); |
| 7533 | }else |
| 7534 | #endif |
| 7535 | (pCtx->pFunc->xSFunc)(pCtx,pCtx->argc,pCtx->argv); /* IMP: R-24505-23230 */ |
| 7536 | |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 7537 | if( pCtx->isError ){ |
| 7538 | if( pCtx->isError>0 ){ |
| 7539 | sqlite3VdbeError(p, "%s", sqlite3_value_text(pCtx->pOut)); |
drh | 9c7c913 | 2015-06-26 18:16:52 +0000 | [diff] [blame] | 7540 | rc = pCtx->isError; |
| 7541 | } |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 7542 | if( pCtx->skipFlag ){ |
| 7543 | assert( pOp[-1].opcode==OP_CollSeq ); |
| 7544 | i = pOp[-1].p1; |
| 7545 | if( i ) sqlite3VdbeMemSetInt64(&aMem[i], 1); |
| 7546 | pCtx->skipFlag = 0; |
| 7547 | } |
| 7548 | sqlite3VdbeMemRelease(pCtx->pOut); |
| 7549 | pCtx->pOut->flags = MEM_Null; |
| 7550 | pCtx->isError = 0; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7551 | if( rc ) goto abort_due_to_error; |
drh | 1350b03 | 2002-02-27 19:00:20 +0000 | [diff] [blame] | 7552 | } |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 7553 | assert( pCtx->pOut->flags==MEM_Null ); |
| 7554 | assert( pCtx->skipFlag==0 ); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 7555 | break; |
| 7556 | } |
| 7557 | |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7558 | /* Opcode: AggFinal P1 P2 * P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 7559 | ** Synopsis: accum=r[P1] N=P2 |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 7560 | ** |
dan | 9a94722 | 2018-06-14 19:06:36 +0000 | [diff] [blame] | 7561 | ** P1 is the memory location that is the accumulator for an aggregate |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7562 | ** or window function. Execute the finalizer function |
| 7563 | ** for an aggregate and store the result in P1. |
drh | a10a34b | 2005-09-07 22:09:48 +0000 | [diff] [blame] | 7564 | ** |
| 7565 | ** P2 is the number of arguments that the step function takes and |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 7566 | ** P4 is a pointer to the FuncDef for this function. The P2 |
drh | a10a34b | 2005-09-07 22:09:48 +0000 | [diff] [blame] | 7567 | ** argument is not used by this opcode. It is only there to disambiguate |
| 7568 | ** functions that can take varying numbers of arguments. The |
drh | 8be47a7 | 2018-07-05 20:05:29 +0000 | [diff] [blame] | 7569 | ** P4 argument is only needed for the case where |
drh | a10a34b | 2005-09-07 22:09:48 +0000 | [diff] [blame] | 7570 | ** the step function was not previously called. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 7571 | */ |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7572 | /* Opcode: AggValue * P2 P3 P4 * |
| 7573 | ** Synopsis: r[P3]=value N=P2 |
| 7574 | ** |
| 7575 | ** Invoke the xValue() function and store the result in register P3. |
| 7576 | ** |
| 7577 | ** P2 is the number of arguments that the step function takes and |
| 7578 | ** P4 is a pointer to the FuncDef for this function. The P2 |
| 7579 | ** argument is not used by this opcode. It is only there to disambiguate |
| 7580 | ** functions that can take varying numbers of arguments. The |
| 7581 | ** P4 argument is only needed for the case where |
| 7582 | ** the step function was not previously called. |
| 7583 | */ |
| 7584 | case OP_AggValue: |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7585 | case OP_AggFinal: { |
drh | 1344989 | 2005-09-07 21:22:45 +0000 | [diff] [blame] | 7586 | Mem *pMem; |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 7587 | assert( pOp->p1>0 && pOp->p1<=(p->nMem+1 - p->nCursor) ); |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7588 | assert( pOp->p3==0 || pOp->opcode==OP_AggValue ); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 7589 | pMem = &aMem[pOp->p1]; |
drh | a10a34b | 2005-09-07 22:09:48 +0000 | [diff] [blame] | 7590 | assert( (pMem->flags & ~(MEM_Null|MEM_Agg))==0 ); |
dan | 67a9b8e | 2018-06-22 20:51:35 +0000 | [diff] [blame] | 7591 | #ifndef SQLITE_OMIT_WINDOWFUNC |
dan | 86fb6e1 | 2018-05-16 20:58:07 +0000 | [diff] [blame] | 7592 | if( pOp->p3 ){ |
dan | 108e6b2 | 2019-03-18 18:55:35 +0000 | [diff] [blame] | 7593 | memAboutToChange(p, &aMem[pOp->p3]); |
dan | 86fb6e1 | 2018-05-16 20:58:07 +0000 | [diff] [blame] | 7594 | rc = sqlite3VdbeMemAggValue(pMem, &aMem[pOp->p3], pOp->p4.pFunc); |
dan | 660af93 | 2018-06-18 16:55:22 +0000 | [diff] [blame] | 7595 | pMem = &aMem[pOp->p3]; |
dan | 67a9b8e | 2018-06-22 20:51:35 +0000 | [diff] [blame] | 7596 | }else |
| 7597 | #endif |
drh | 8f26da6 | 2018-07-05 21:22:57 +0000 | [diff] [blame] | 7598 | { |
| 7599 | rc = sqlite3VdbeMemFinalize(pMem, pOp->p4.pFunc); |
| 7600 | } |
dan | 67a9b8e | 2018-06-22 20:51:35 +0000 | [diff] [blame] | 7601 | |
drh | 4c8555f | 2009-06-25 01:47:11 +0000 | [diff] [blame] | 7602 | if( rc ){ |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 7603 | sqlite3VdbeError(p, "%s", sqlite3_value_text(pMem)); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7604 | goto abort_due_to_error; |
drh | 90669c1 | 2006-01-20 15:45:36 +0000 | [diff] [blame] | 7605 | } |
drh | 2dca868 | 2008-03-21 17:13:13 +0000 | [diff] [blame] | 7606 | sqlite3VdbeChangeEncoding(pMem, encoding); |
drh | b765411 | 2008-01-12 12:48:07 +0000 | [diff] [blame] | 7607 | UPDATE_MAX_BLOBSIZE(pMem); |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 7608 | break; |
| 7609 | } |
| 7610 | |
dan | 5cf5353 | 2010-05-01 16:40:20 +0000 | [diff] [blame] | 7611 | #ifndef SQLITE_OMIT_WAL |
dan | cdc1f04 | 2010-11-18 12:11:05 +0000 | [diff] [blame] | 7612 | /* Opcode: Checkpoint P1 P2 P3 * * |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7613 | ** |
| 7614 | ** Checkpoint database P1. This is a no-op if P1 is not currently in |
drh | a25165f | 2014-12-04 04:50:59 +0000 | [diff] [blame] | 7615 | ** WAL mode. Parameter P2 is one of SQLITE_CHECKPOINT_PASSIVE, FULL, |
| 7616 | ** RESTART, or TRUNCATE. Write 1 or 0 into mem[P3] if the checkpoint returns |
drh | 30aa3b9 | 2011-02-07 23:56:01 +0000 | [diff] [blame] | 7617 | ** SQLITE_BUSY or not, respectively. Write the number of pages in the |
| 7618 | ** WAL after the checkpoint into mem[P3+1] and the number of pages |
| 7619 | ** in the WAL that have been checkpointed after the checkpoint |
| 7620 | ** completes into mem[P3+2]. However on an error, mem[P3+1] and |
| 7621 | ** mem[P3+2] are initialized to -1. |
dan | 7c24610 | 2010-04-12 19:00:29 +0000 | [diff] [blame] | 7622 | */ |
| 7623 | case OP_Checkpoint: { |
drh | 30aa3b9 | 2011-02-07 23:56:01 +0000 | [diff] [blame] | 7624 | int i; /* Loop counter */ |
| 7625 | int aRes[3]; /* Results */ |
| 7626 | Mem *pMem; /* Write results here */ |
| 7627 | |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 7628 | assert( p->readOnly==0 ); |
drh | 30aa3b9 | 2011-02-07 23:56:01 +0000 | [diff] [blame] | 7629 | aRes[0] = 0; |
| 7630 | aRes[1] = aRes[2] = -1; |
dan | cdc1f04 | 2010-11-18 12:11:05 +0000 | [diff] [blame] | 7631 | assert( pOp->p2==SQLITE_CHECKPOINT_PASSIVE |
| 7632 | || pOp->p2==SQLITE_CHECKPOINT_FULL |
| 7633 | || pOp->p2==SQLITE_CHECKPOINT_RESTART |
dan | f26a154 | 2014-12-02 19:04:54 +0000 | [diff] [blame] | 7634 | || pOp->p2==SQLITE_CHECKPOINT_TRUNCATE |
dan | cdc1f04 | 2010-11-18 12:11:05 +0000 | [diff] [blame] | 7635 | ); |
drh | 30aa3b9 | 2011-02-07 23:56:01 +0000 | [diff] [blame] | 7636 | rc = sqlite3Checkpoint(db, pOp->p1, pOp->p2, &aRes[1], &aRes[2]); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7637 | if( rc ){ |
| 7638 | if( rc!=SQLITE_BUSY ) goto abort_due_to_error; |
dan | cdc1f04 | 2010-11-18 12:11:05 +0000 | [diff] [blame] | 7639 | rc = SQLITE_OK; |
drh | 30aa3b9 | 2011-02-07 23:56:01 +0000 | [diff] [blame] | 7640 | aRes[0] = 1; |
dan | cdc1f04 | 2010-11-18 12:11:05 +0000 | [diff] [blame] | 7641 | } |
drh | 30aa3b9 | 2011-02-07 23:56:01 +0000 | [diff] [blame] | 7642 | for(i=0, pMem = &aMem[pOp->p3]; i<3; i++, pMem++){ |
| 7643 | sqlite3VdbeMemSetInt64(pMem, (i64)aRes[i]); |
| 7644 | } |
dan | 7c24610 | 2010-04-12 19:00:29 +0000 | [diff] [blame] | 7645 | break; |
| 7646 | }; |
dan | 5cf5353 | 2010-05-01 16:40:20 +0000 | [diff] [blame] | 7647 | #endif |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 7648 | |
drh | cac29a6 | 2010-07-02 19:36:52 +0000 | [diff] [blame] | 7649 | #ifndef SQLITE_OMIT_PRAGMA |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 7650 | /* Opcode: JournalMode P1 P2 P3 * * |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7651 | ** |
| 7652 | ** Change the journal mode of database P1 to P3. P3 must be one of the |
| 7653 | ** PAGER_JOURNALMODE_XXX values. If changing between the various rollback |
| 7654 | ** modes (delete, truncate, persist, off and memory), this is a simple |
| 7655 | ** operation. No IO is required. |
| 7656 | ** |
| 7657 | ** If changing into or out of WAL mode the procedure is more complicated. |
| 7658 | ** |
| 7659 | ** Write a string containing the final journal-mode to register P2. |
| 7660 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 7661 | case OP_JournalMode: { /* out2 */ |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7662 | Btree *pBt; /* Btree to change journal mode of */ |
| 7663 | Pager *pPager; /* Pager associated with pBt */ |
drh | d80b233 | 2010-05-01 00:59:37 +0000 | [diff] [blame] | 7664 | int eNew; /* New journal mode */ |
| 7665 | int eOld; /* The old journal mode */ |
mistachkin | 59ee77c | 2012-09-13 15:26:44 +0000 | [diff] [blame] | 7666 | #ifndef SQLITE_OMIT_WAL |
drh | d80b233 | 2010-05-01 00:59:37 +0000 | [diff] [blame] | 7667 | const char *zFilename; /* Name of database file for pPager */ |
mistachkin | 59ee77c | 2012-09-13 15:26:44 +0000 | [diff] [blame] | 7668 | #endif |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7669 | |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 7670 | pOut = out2Prerelease(p, pOp); |
drh | d80b233 | 2010-05-01 00:59:37 +0000 | [diff] [blame] | 7671 | eNew = pOp->p3; |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7672 | assert( eNew==PAGER_JOURNALMODE_DELETE |
| 7673 | || eNew==PAGER_JOURNALMODE_TRUNCATE |
| 7674 | || eNew==PAGER_JOURNALMODE_PERSIST |
| 7675 | || eNew==PAGER_JOURNALMODE_OFF |
| 7676 | || eNew==PAGER_JOURNALMODE_MEMORY |
| 7677 | || eNew==PAGER_JOURNALMODE_WAL |
| 7678 | || eNew==PAGER_JOURNALMODE_QUERY |
| 7679 | ); |
| 7680 | assert( pOp->p1>=0 && pOp->p1<db->nDb ); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 7681 | assert( p->readOnly==0 ); |
drh | 3ebaee9 | 2010-05-06 21:37:22 +0000 | [diff] [blame] | 7682 | |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7683 | pBt = db->aDb[pOp->p1].pBt; |
| 7684 | pPager = sqlite3BtreePager(pBt); |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7685 | eOld = sqlite3PagerGetJournalMode(pPager); |
| 7686 | if( eNew==PAGER_JOURNALMODE_QUERY ) eNew = eOld; |
dan | a8f249f | 2021-05-20 11:42:51 +0000 | [diff] [blame] | 7687 | assert( sqlite3BtreeHoldsMutex(pBt) ); |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7688 | if( !sqlite3PagerOkToChangeJournalMode(pPager) ) eNew = eOld; |
dan | 5cf5353 | 2010-05-01 16:40:20 +0000 | [diff] [blame] | 7689 | |
| 7690 | #ifndef SQLITE_OMIT_WAL |
drh | d4e0bb0 | 2012-05-27 01:19:04 +0000 | [diff] [blame] | 7691 | zFilename = sqlite3PagerFilename(pPager, 1); |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7692 | |
drh | d80b233 | 2010-05-01 00:59:37 +0000 | [diff] [blame] | 7693 | /* Do not allow a transition to journal_mode=WAL for a database |
drh | 6e1f482 | 2010-07-13 23:41:40 +0000 | [diff] [blame] | 7694 | ** in temporary storage or if the VFS does not support shared memory |
drh | d80b233 | 2010-05-01 00:59:37 +0000 | [diff] [blame] | 7695 | */ |
| 7696 | if( eNew==PAGER_JOURNALMODE_WAL |
drh | 057fc81 | 2011-10-17 23:15:31 +0000 | [diff] [blame] | 7697 | && (sqlite3Strlen30(zFilename)==0 /* Temp file */ |
drh | 6e1f482 | 2010-07-13 23:41:40 +0000 | [diff] [blame] | 7698 | || !sqlite3PagerWalSupported(pPager)) /* No shared-memory support */ |
dan | e180c29 | 2010-04-26 17:42:56 +0000 | [diff] [blame] | 7699 | ){ |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7700 | eNew = eOld; |
dan | e180c29 | 2010-04-26 17:42:56 +0000 | [diff] [blame] | 7701 | } |
| 7702 | |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7703 | if( (eNew!=eOld) |
| 7704 | && (eOld==PAGER_JOURNALMODE_WAL || eNew==PAGER_JOURNALMODE_WAL) |
| 7705 | ){ |
dan | c0537fe | 2013-06-28 19:41:43 +0000 | [diff] [blame] | 7706 | if( !db->autoCommit || db->nVdbeRead>1 ){ |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7707 | rc = SQLITE_ERROR; |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 7708 | sqlite3VdbeError(p, |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7709 | "cannot change %s wal mode from within a transaction", |
| 7710 | (eNew==PAGER_JOURNALMODE_WAL ? "into" : "out of") |
| 7711 | ); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7712 | goto abort_due_to_error; |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7713 | }else{ |
| 7714 | |
| 7715 | if( eOld==PAGER_JOURNALMODE_WAL ){ |
| 7716 | /* If leaving WAL mode, close the log file. If successful, the call |
| 7717 | ** to PagerCloseWal() checkpoints and deletes the write-ahead-log |
| 7718 | ** file. An EXCLUSIVE lock may still be held on the database file |
| 7719 | ** after a successful return. |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7720 | */ |
dan | 7fb8990 | 2016-08-12 16:21:15 +0000 | [diff] [blame] | 7721 | rc = sqlite3PagerCloseWal(pPager, db); |
drh | ab9b744 | 2010-05-10 11:20:05 +0000 | [diff] [blame] | 7722 | if( rc==SQLITE_OK ){ |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7723 | sqlite3PagerSetJournalMode(pPager, eNew); |
drh | 89c3f2f | 2010-05-15 01:09:38 +0000 | [diff] [blame] | 7724 | } |
drh | 242c4f7 | 2010-06-22 14:49:39 +0000 | [diff] [blame] | 7725 | }else if( eOld==PAGER_JOURNALMODE_MEMORY ){ |
| 7726 | /* Cannot transition directly from MEMORY to WAL. Use mode OFF |
| 7727 | ** as an intermediate */ |
| 7728 | sqlite3PagerSetJournalMode(pPager, PAGER_JOURNALMODE_OFF); |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7729 | } |
| 7730 | |
| 7731 | /* Open a transaction on the database file. Regardless of the journal |
| 7732 | ** mode, this transaction always uses a rollback journal. |
| 7733 | */ |
drh | 99744fa | 2020-08-25 19:09:07 +0000 | [diff] [blame] | 7734 | assert( sqlite3BtreeTxnState(pBt)!=SQLITE_TXN_WRITE ); |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7735 | if( rc==SQLITE_OK ){ |
dan | 731bf5b | 2010-06-17 16:44:21 +0000 | [diff] [blame] | 7736 | rc = sqlite3BtreeSetVersion(pBt, (eNew==PAGER_JOURNALMODE_WAL ? 2 : 1)); |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7737 | } |
| 7738 | } |
| 7739 | } |
dan | 5cf5353 | 2010-05-01 16:40:20 +0000 | [diff] [blame] | 7740 | #endif /* ifndef SQLITE_OMIT_WAL */ |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7741 | |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7742 | if( rc ) eNew = eOld; |
drh | 0b9b430 | 2010-06-11 17:01:24 +0000 | [diff] [blame] | 7743 | eNew = sqlite3PagerSetJournalMode(pPager, eNew); |
dan | 731bf5b | 2010-06-17 16:44:21 +0000 | [diff] [blame] | 7744 | |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7745 | pOut->flags = MEM_Str|MEM_Static|MEM_Term; |
dan | b978002 | 2010-04-21 18:37:57 +0000 | [diff] [blame] | 7746 | pOut->z = (char *)sqlite3JournalModename(eNew); |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7747 | pOut->n = sqlite3Strlen30(pOut->z); |
| 7748 | pOut->enc = SQLITE_UTF8; |
| 7749 | sqlite3VdbeChangeEncoding(pOut, encoding); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7750 | if( rc ) goto abort_due_to_error; |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7751 | break; |
drh | cac29a6 | 2010-07-02 19:36:52 +0000 | [diff] [blame] | 7752 | }; |
| 7753 | #endif /* SQLITE_OMIT_PRAGMA */ |
dan | e04dc88 | 2010-04-20 18:53:15 +0000 | [diff] [blame] | 7754 | |
drh | fdbcdee | 2007-03-27 14:44:50 +0000 | [diff] [blame] | 7755 | #if !defined(SQLITE_OMIT_VACUUM) && !defined(SQLITE_OMIT_ATTACH) |
drh | 2f6239e | 2018-12-08 00:43:08 +0000 | [diff] [blame] | 7756 | /* Opcode: Vacuum P1 P2 * * * |
drh | 6f8c91c | 2003-12-07 00:24:35 +0000 | [diff] [blame] | 7757 | ** |
drh | 9ef5e77 | 2016-08-19 14:20:56 +0000 | [diff] [blame] | 7758 | ** Vacuum the entire database P1. P1 is 0 for "main", and 2 or more |
| 7759 | ** for an attached database. The "temp" database may not be vacuumed. |
drh | b0b7db9 | 2018-12-07 17:28:28 +0000 | [diff] [blame] | 7760 | ** |
drh | 2f6239e | 2018-12-08 00:43:08 +0000 | [diff] [blame] | 7761 | ** If P2 is not zero, then it is a register holding a string which is |
| 7762 | ** the file into which the result of vacuum should be written. When |
| 7763 | ** P2 is zero, the vacuum overwrites the original database. |
drh | 6f8c91c | 2003-12-07 00:24:35 +0000 | [diff] [blame] | 7764 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7765 | case OP_Vacuum: { |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 7766 | assert( p->readOnly==0 ); |
drh | 2f6239e | 2018-12-08 00:43:08 +0000 | [diff] [blame] | 7767 | rc = sqlite3RunVacuum(&p->zErrMsg, db, pOp->p1, |
| 7768 | pOp->p2 ? &aMem[pOp->p2] : 0); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7769 | if( rc ) goto abort_due_to_error; |
drh | 6f8c91c | 2003-12-07 00:24:35 +0000 | [diff] [blame] | 7770 | break; |
| 7771 | } |
drh | 154d4b2 | 2006-09-21 11:02:16 +0000 | [diff] [blame] | 7772 | #endif |
drh | 6f8c91c | 2003-12-07 00:24:35 +0000 | [diff] [blame] | 7773 | |
danielk1977 | dddbcdc | 2007-04-26 14:42:34 +0000 | [diff] [blame] | 7774 | #if !defined(SQLITE_OMIT_AUTOVACUUM) |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7775 | /* Opcode: IncrVacuum P1 P2 * * * |
danielk1977 | dddbcdc | 2007-04-26 14:42:34 +0000 | [diff] [blame] | 7776 | ** |
| 7777 | ** Perform a single step of the incremental vacuum procedure on |
drh | ca5557f | 2007-05-04 18:30:40 +0000 | [diff] [blame] | 7778 | ** the P1 database. If the vacuum has finished, jump to instruction |
danielk1977 | dddbcdc | 2007-04-26 14:42:34 +0000 | [diff] [blame] | 7779 | ** P2. Otherwise, fall through to the next instruction. |
| 7780 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7781 | case OP_IncrVacuum: { /* jump */ |
drh | ca5557f | 2007-05-04 18:30:40 +0000 | [diff] [blame] | 7782 | Btree *pBt; |
| 7783 | |
| 7784 | assert( pOp->p1>=0 && pOp->p1<db->nDb ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 7785 | assert( DbMaskTest(p->btreeMask, pOp->p1) ); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 7786 | assert( p->readOnly==0 ); |
drh | ca5557f | 2007-05-04 18:30:40 +0000 | [diff] [blame] | 7787 | pBt = db->aDb[pOp->p1].pBt; |
danielk1977 | dddbcdc | 2007-04-26 14:42:34 +0000 | [diff] [blame] | 7788 | rc = sqlite3BtreeIncrVacuum(pBt); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 7789 | VdbeBranchTaken(rc==SQLITE_DONE,2); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7790 | if( rc ){ |
| 7791 | if( rc!=SQLITE_DONE ) goto abort_due_to_error; |
danielk1977 | dddbcdc | 2007-04-26 14:42:34 +0000 | [diff] [blame] | 7792 | rc = SQLITE_OK; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 7793 | goto jump_to_p2; |
danielk1977 | dddbcdc | 2007-04-26 14:42:34 +0000 | [diff] [blame] | 7794 | } |
| 7795 | break; |
| 7796 | } |
| 7797 | #endif |
| 7798 | |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 7799 | /* Opcode: Expire P1 P2 * * * |
danielk1977 | a21c6b6 | 2005-01-24 10:25:59 +0000 | [diff] [blame] | 7800 | ** |
drh | 25df48d | 2014-07-22 14:58:12 +0000 | [diff] [blame] | 7801 | ** Cause precompiled statements to expire. When an expired statement |
| 7802 | ** is executed using sqlite3_step() it will either automatically |
| 7803 | ** reprepare itself (if it was originally created using sqlite3_prepare_v2()) |
| 7804 | ** or it will fail with SQLITE_SCHEMA. |
danielk1977 | a21c6b6 | 2005-01-24 10:25:59 +0000 | [diff] [blame] | 7805 | ** |
| 7806 | ** If P1 is 0, then all SQL statements become expired. If P1 is non-zero, |
drh | 25df48d | 2014-07-22 14:58:12 +0000 | [diff] [blame] | 7807 | ** then only the currently executing statement is expired. |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 7808 | ** |
| 7809 | ** If P2 is 0, then SQL statements are expired immediately. If P2 is 1, |
| 7810 | ** then running SQL statements are allowed to continue to run to completion. |
| 7811 | ** The P2==1 case occurs when a CREATE INDEX or similar schema change happens |
| 7812 | ** that might help the statement run faster but which does not affect the |
| 7813 | ** correctness of operation. |
danielk1977 | a21c6b6 | 2005-01-24 10:25:59 +0000 | [diff] [blame] | 7814 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7815 | case OP_Expire: { |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 7816 | assert( pOp->p2==0 || pOp->p2==1 ); |
danielk1977 | a21c6b6 | 2005-01-24 10:25:59 +0000 | [diff] [blame] | 7817 | if( !pOp->p1 ){ |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 7818 | sqlite3ExpirePreparedStatements(db, pOp->p2); |
danielk1977 | a21c6b6 | 2005-01-24 10:25:59 +0000 | [diff] [blame] | 7819 | }else{ |
drh | ba968db | 2018-07-24 22:02:12 +0000 | [diff] [blame] | 7820 | p->expired = pOp->p2+1; |
danielk1977 | a21c6b6 | 2005-01-24 10:25:59 +0000 | [diff] [blame] | 7821 | } |
| 7822 | break; |
| 7823 | } |
| 7824 | |
drh | 7b14b65 | 2019-12-29 22:08:20 +0000 | [diff] [blame] | 7825 | /* Opcode: CursorLock P1 * * * * |
| 7826 | ** |
| 7827 | ** Lock the btree to which cursor P1 is pointing so that the btree cannot be |
| 7828 | ** written by an other cursor. |
| 7829 | */ |
| 7830 | case OP_CursorLock: { |
| 7831 | VdbeCursor *pC; |
| 7832 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 7833 | pC = p->apCsr[pOp->p1]; |
| 7834 | assert( pC!=0 ); |
| 7835 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 7836 | sqlite3BtreeCursorPin(pC->uc.pCursor); |
| 7837 | break; |
| 7838 | } |
| 7839 | |
| 7840 | /* Opcode: CursorUnlock P1 * * * * |
| 7841 | ** |
| 7842 | ** Unlock the btree to which cursor P1 is pointing so that it can be |
| 7843 | ** written by other cursors. |
| 7844 | */ |
| 7845 | case OP_CursorUnlock: { |
| 7846 | VdbeCursor *pC; |
| 7847 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 7848 | pC = p->apCsr[pOp->p1]; |
| 7849 | assert( pC!=0 ); |
| 7850 | assert( pC->eCurType==CURTYPE_BTREE ); |
| 7851 | sqlite3BtreeCursorUnpin(pC->uc.pCursor); |
| 7852 | break; |
| 7853 | } |
| 7854 | |
danielk1977 | c00da10 | 2006-01-07 13:21:04 +0000 | [diff] [blame] | 7855 | #ifndef SQLITE_OMIT_SHARED_CACHE |
drh | 6a9ad3d | 2008-04-02 16:29:30 +0000 | [diff] [blame] | 7856 | /* Opcode: TableLock P1 P2 P3 P4 * |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 7857 | ** Synopsis: iDb=P1 root=P2 write=P3 |
danielk1977 | c00da10 | 2006-01-07 13:21:04 +0000 | [diff] [blame] | 7858 | ** |
| 7859 | ** Obtain a lock on a particular table. This instruction is only used when |
| 7860 | ** the shared-cache feature is enabled. |
| 7861 | ** |
danielk1977 | 96d48e9 | 2009-06-29 06:00:37 +0000 | [diff] [blame] | 7862 | ** P1 is the index of the database in sqlite3.aDb[] of the database |
drh | 6a9ad3d | 2008-04-02 16:29:30 +0000 | [diff] [blame] | 7863 | ** on which the lock is acquired. A readlock is obtained if P3==0 or |
| 7864 | ** a write lock if P3==1. |
danielk1977 | c00da10 | 2006-01-07 13:21:04 +0000 | [diff] [blame] | 7865 | ** |
| 7866 | ** P2 contains the root-page of the table to lock. |
| 7867 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 7868 | ** P4 contains a pointer to the name of the table being locked. This is only |
danielk1977 | c00da10 | 2006-01-07 13:21:04 +0000 | [diff] [blame] | 7869 | ** used to generate an error message if the lock cannot be obtained. |
| 7870 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7871 | case OP_TableLock: { |
danielk1977 | e0d9e6f | 2009-07-03 16:25:06 +0000 | [diff] [blame] | 7872 | u8 isWriteLock = (u8)pOp->p3; |
drh | 169dd92 | 2017-06-26 13:57:49 +0000 | [diff] [blame] | 7873 | if( isWriteLock || 0==(db->flags&SQLITE_ReadUncommit) ){ |
danielk1977 | e0d9e6f | 2009-07-03 16:25:06 +0000 | [diff] [blame] | 7874 | int p1 = pOp->p1; |
| 7875 | assert( p1>=0 && p1<db->nDb ); |
drh | a7ab6d8 | 2014-07-21 15:44:39 +0000 | [diff] [blame] | 7876 | assert( DbMaskTest(p->btreeMask, p1) ); |
danielk1977 | e0d9e6f | 2009-07-03 16:25:06 +0000 | [diff] [blame] | 7877 | assert( isWriteLock==0 || isWriteLock==1 ); |
| 7878 | rc = sqlite3BtreeLockTable(db->aDb[p1].pBt, pOp->p2, isWriteLock); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7879 | if( rc ){ |
| 7880 | if( (rc&0xFF)==SQLITE_LOCKED ){ |
| 7881 | const char *z = pOp->p4.z; |
| 7882 | sqlite3VdbeError(p, "database table is locked: %s", z); |
| 7883 | } |
| 7884 | goto abort_due_to_error; |
danielk1977 | e0d9e6f | 2009-07-03 16:25:06 +0000 | [diff] [blame] | 7885 | } |
danielk1977 | c00da10 | 2006-01-07 13:21:04 +0000 | [diff] [blame] | 7886 | } |
| 7887 | break; |
| 7888 | } |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 7889 | #endif /* SQLITE_OMIT_SHARED_CACHE */ |
| 7890 | |
| 7891 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7892 | /* Opcode: VBegin * * * P4 * |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 7893 | ** |
danielk1977 | 3e3a84d | 2008-08-01 17:37:40 +0000 | [diff] [blame] | 7894 | ** P4 may be a pointer to an sqlite3_vtab structure. If so, call the |
| 7895 | ** xBegin method for that table. |
| 7896 | ** |
| 7897 | ** Also, whether or not P4 is set, check that this is not being called from |
danielk1977 | 404ca07 | 2009-03-16 13:19:36 +0000 | [diff] [blame] | 7898 | ** within a callback to a virtual table xSync() method. If it is, the error |
| 7899 | ** code will be set to SQLITE_LOCKED. |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 7900 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7901 | case OP_VBegin: { |
danielk1977 | 595a523 | 2009-07-24 17:58:53 +0000 | [diff] [blame] | 7902 | VTable *pVTab; |
| 7903 | pVTab = pOp->p4.pVtab; |
| 7904 | rc = sqlite3VtabBegin(db, pVTab); |
dan | 016f781 | 2013-08-21 17:35:48 +0000 | [diff] [blame] | 7905 | if( pVTab ) sqlite3VtabImportErrmsg(p, pVTab->pVtab); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7906 | if( rc ) goto abort_due_to_error; |
danielk1977 | f9e7dda | 2006-06-16 16:08:53 +0000 | [diff] [blame] | 7907 | break; |
| 7908 | } |
| 7909 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 7910 | |
| 7911 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
dan | 7377945 | 2015-03-19 18:56:17 +0000 | [diff] [blame] | 7912 | /* Opcode: VCreate P1 P2 * * * |
danielk1977 | f9e7dda | 2006-06-16 16:08:53 +0000 | [diff] [blame] | 7913 | ** |
dan | 7377945 | 2015-03-19 18:56:17 +0000 | [diff] [blame] | 7914 | ** P2 is a register that holds the name of a virtual table in database |
| 7915 | ** P1. Call the xCreate method for that table. |
danielk1977 | f9e7dda | 2006-06-16 16:08:53 +0000 | [diff] [blame] | 7916 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7917 | case OP_VCreate: { |
dan | 7377945 | 2015-03-19 18:56:17 +0000 | [diff] [blame] | 7918 | Mem sMem; /* For storing the record being decoded */ |
drh | 4746406 | 2015-03-21 12:22:16 +0000 | [diff] [blame] | 7919 | const char *zTab; /* Name of the virtual table */ |
| 7920 | |
dan | 7377945 | 2015-03-19 18:56:17 +0000 | [diff] [blame] | 7921 | memset(&sMem, 0, sizeof(sMem)); |
| 7922 | sMem.db = db; |
drh | 4746406 | 2015-03-21 12:22:16 +0000 | [diff] [blame] | 7923 | /* Because P2 is always a static string, it is impossible for the |
| 7924 | ** sqlite3VdbeMemCopy() to fail */ |
| 7925 | assert( (aMem[pOp->p2].flags & MEM_Str)!=0 ); |
| 7926 | assert( (aMem[pOp->p2].flags & MEM_Static)!=0 ); |
dan | 7377945 | 2015-03-19 18:56:17 +0000 | [diff] [blame] | 7927 | rc = sqlite3VdbeMemCopy(&sMem, &aMem[pOp->p2]); |
drh | 4746406 | 2015-03-21 12:22:16 +0000 | [diff] [blame] | 7928 | assert( rc==SQLITE_OK ); |
| 7929 | zTab = (const char*)sqlite3_value_text(&sMem); |
| 7930 | assert( zTab || db->mallocFailed ); |
| 7931 | if( zTab ){ |
| 7932 | rc = sqlite3VtabCallCreate(db, pOp->p1, zTab, &p->zErrMsg); |
dan | 7377945 | 2015-03-19 18:56:17 +0000 | [diff] [blame] | 7933 | } |
| 7934 | sqlite3VdbeMemRelease(&sMem); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7935 | if( rc ) goto abort_due_to_error; |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 7936 | break; |
| 7937 | } |
| 7938 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 7939 | |
| 7940 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7941 | /* Opcode: VDestroy P1 * * P4 * |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 7942 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 7943 | ** P4 is the name of a virtual table in database P1. Call the xDestroy method |
danielk1977 | 9e39ce8 | 2006-06-12 16:01:21 +0000 | [diff] [blame] | 7944 | ** of that table. |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 7945 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 7946 | case OP_VDestroy: { |
drh | 086723a | 2015-03-24 12:51:52 +0000 | [diff] [blame] | 7947 | db->nVDestroy++; |
danielk1977 | 2dca4ac | 2008-01-03 11:50:29 +0000 | [diff] [blame] | 7948 | rc = sqlite3VtabCallDestroy(db, pOp->p1, pOp->p4.z); |
drh | 086723a | 2015-03-24 12:51:52 +0000 | [diff] [blame] | 7949 | db->nVDestroy--; |
dan | 1d4b164 | 2018-12-28 17:45:08 +0000 | [diff] [blame] | 7950 | assert( p->errorAction==OE_Abort && p->usesStmtJournal ); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7951 | if( rc ) goto abort_due_to_error; |
drh | b9bb7c1 | 2006-06-11 23:41:55 +0000 | [diff] [blame] | 7952 | break; |
| 7953 | } |
| 7954 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
danielk1977 | c00da10 | 2006-01-07 13:21:04 +0000 | [diff] [blame] | 7955 | |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 7956 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 7957 | /* Opcode: VOpen P1 * * P4 * |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 7958 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 7959 | ** P4 is a pointer to a virtual table object, an sqlite3_vtab structure. |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 7960 | ** P1 is a cursor number. This opcode opens a cursor to the virtual |
| 7961 | ** table and stores that cursor in P1. |
| 7962 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 7963 | case OP_VOpen: { /* ncycle */ |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 7964 | VdbeCursor *pCur; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 7965 | sqlite3_vtab_cursor *pVCur; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 7966 | sqlite3_vtab *pVtab; |
drh | f496a7d | 2015-03-24 14:05:50 +0000 | [diff] [blame] | 7967 | const sqlite3_module *pModule; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 7968 | |
drh | 1713afb | 2013-06-28 01:24:57 +0000 | [diff] [blame] | 7969 | assert( p->bIsReader ); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 7970 | pCur = 0; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 7971 | pVCur = 0; |
danielk1977 | 595a523 | 2009-07-24 17:58:53 +0000 | [diff] [blame] | 7972 | pVtab = pOp->p4.pVtab->pVtab; |
drh | f496a7d | 2015-03-24 14:05:50 +0000 | [diff] [blame] | 7973 | if( pVtab==0 || NEVER(pVtab->pModule==0) ){ |
| 7974 | rc = SQLITE_LOCKED; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7975 | goto abort_due_to_error; |
drh | f496a7d | 2015-03-24 14:05:50 +0000 | [diff] [blame] | 7976 | } |
| 7977 | pModule = pVtab->pModule; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 7978 | rc = pModule->xOpen(pVtab, &pVCur); |
dan | 016f781 | 2013-08-21 17:35:48 +0000 | [diff] [blame] | 7979 | sqlite3VtabImportErrmsg(p, pVtab); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7980 | if( rc ) goto abort_due_to_error; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 7981 | |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7982 | /* Initialize sqlite3_vtab_cursor base class */ |
| 7983 | pVCur->pVtab = pVtab; |
| 7984 | |
| 7985 | /* Initialize vdbe cursor object */ |
drh | b248668 | 2022-01-03 01:43:28 +0000 | [diff] [blame] | 7986 | pCur = allocateCursor(p, pOp->p1, 0, CURTYPE_VTAB); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 7987 | if( pCur ){ |
| 7988 | pCur->uc.pVCur = pVCur; |
| 7989 | pVtab->nRef++; |
| 7990 | }else{ |
| 7991 | assert( db->mallocFailed ); |
| 7992 | pModule->xClose(pVCur); |
| 7993 | goto no_mem; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 7994 | } |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 7995 | break; |
| 7996 | } |
| 7997 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 7998 | |
| 7999 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | 0fe7e7d | 2022-02-01 14:58:29 +0000 | [diff] [blame] | 8000 | /* Opcode: VInitIn P1 P2 P3 * * |
drh | 30e314e | 2022-02-02 14:36:58 +0000 | [diff] [blame] | 8001 | ** Synopsis: r[P2]=ValueList(P1,P3) |
drh | 0fe7e7d | 2022-02-01 14:58:29 +0000 | [diff] [blame] | 8002 | ** |
drh | 30e314e | 2022-02-02 14:36:58 +0000 | [diff] [blame] | 8003 | ** Set register P2 to be a pointer to a ValueList object for cursor P1 |
| 8004 | ** with cache register P3 and output register P3+1. This ValueList object |
| 8005 | ** can be used as the first argument to sqlite3_vtab_in_first() and |
| 8006 | ** sqlite3_vtab_in_next() to extract all of the values stored in the P1 |
| 8007 | ** cursor. Register P3 is used to hold the values returned by |
| 8008 | ** sqlite3_vtab_in_first() and sqlite3_vtab_in_next(). |
drh | 0fe7e7d | 2022-02-01 14:58:29 +0000 | [diff] [blame] | 8009 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 8010 | case OP_VInitIn: { /* out2, ncycle */ |
drh | 30e314e | 2022-02-02 14:36:58 +0000 | [diff] [blame] | 8011 | VdbeCursor *pC; /* The cursor containing the RHS values */ |
| 8012 | ValueList *pRhs; /* New ValueList object to put in reg[P2] */ |
| 8013 | |
drh | 0fe7e7d | 2022-02-01 14:58:29 +0000 | [diff] [blame] | 8014 | pC = p->apCsr[pOp->p1]; |
drh | 30e314e | 2022-02-02 14:36:58 +0000 | [diff] [blame] | 8015 | pRhs = sqlite3_malloc64( sizeof(*pRhs) ); |
| 8016 | if( pRhs==0 ) goto no_mem; |
| 8017 | pRhs->pCsr = pC->uc.pCursor; |
| 8018 | pRhs->pOut = &aMem[pOp->p3]; |
drh | 0fe7e7d | 2022-02-01 14:58:29 +0000 | [diff] [blame] | 8019 | pOut = out2Prerelease(p, pOp); |
drh | 0fe7e7d | 2022-02-01 14:58:29 +0000 | [diff] [blame] | 8020 | pOut->flags = MEM_Null; |
drh | 30e314e | 2022-02-02 14:36:58 +0000 | [diff] [blame] | 8021 | sqlite3VdbeMemSetPointer(pOut, pRhs, "ValueList", sqlite3_free); |
drh | 0fe7e7d | 2022-02-01 14:58:29 +0000 | [diff] [blame] | 8022 | break; |
| 8023 | } |
| 8024 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 8025 | |
| 8026 | |
| 8027 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
danielk1977 | 6dbee81 | 2008-01-03 18:39:41 +0000 | [diff] [blame] | 8028 | /* Opcode: VFilter P1 P2 P3 P4 * |
drh | 831116d | 2014-04-03 14:31:00 +0000 | [diff] [blame] | 8029 | ** Synopsis: iplan=r[P3] zplan='P4' |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8030 | ** |
| 8031 | ** P1 is a cursor opened using VOpen. P2 is an address to jump to if |
| 8032 | ** the filtered result set is empty. |
| 8033 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 8034 | ** P4 is either NULL or a string that was generated by the xBestIndex |
| 8035 | ** method of the module. The interpretation of the P4 string is left |
drh | 4be8b51 | 2006-06-13 23:51:34 +0000 | [diff] [blame] | 8036 | ** to the module implementation. |
danielk1977 | 5fac9f8 | 2006-06-13 14:16:58 +0000 | [diff] [blame] | 8037 | ** |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8038 | ** This opcode invokes the xFilter method on the virtual table specified |
danielk1977 | 6dbee81 | 2008-01-03 18:39:41 +0000 | [diff] [blame] | 8039 | ** by P1. The integer query plan parameter to xFilter is stored in register |
| 8040 | ** P3. Register P3+1 stores the argc parameter to be passed to the |
drh | 174edc6 | 2008-05-29 05:23:41 +0000 | [diff] [blame] | 8041 | ** xFilter method. Registers P3+2..P3+1+argc are the argc |
| 8042 | ** additional parameters which are passed to |
danielk1977 | 6dbee81 | 2008-01-03 18:39:41 +0000 | [diff] [blame] | 8043 | ** xFilter as argv. Register P3+2 becomes argv[0] when passed to xFilter. |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8044 | ** |
danielk1977 | 6dbee81 | 2008-01-03 18:39:41 +0000 | [diff] [blame] | 8045 | ** A jump is made to P2 if the result set after filtering would be empty. |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8046 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 8047 | case OP_VFilter: { /* jump, ncycle */ |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8048 | int nArg; |
danielk1977 | 6dbee81 | 2008-01-03 18:39:41 +0000 | [diff] [blame] | 8049 | int iQuery; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8050 | const sqlite3_module *pModule; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8051 | Mem *pQuery; |
| 8052 | Mem *pArgc; |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8053 | sqlite3_vtab_cursor *pVCur; |
drh | 4dc754d | 2008-07-23 18:17:32 +0000 | [diff] [blame] | 8054 | sqlite3_vtab *pVtab; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8055 | VdbeCursor *pCur; |
| 8056 | int res; |
| 8057 | int i; |
| 8058 | Mem **apArg; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8059 | |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 8060 | pQuery = &aMem[pOp->p3]; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8061 | pArgc = &pQuery[1]; |
| 8062 | pCur = p->apCsr[pOp->p1]; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 8063 | assert( memIsValid(pQuery) ); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 8064 | REGISTER_TRACE(pOp->p3, pQuery); |
drh | 3ab4ffc | 2021-11-11 11:23:08 +0000 | [diff] [blame] | 8065 | assert( pCur!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8066 | assert( pCur->eCurType==CURTYPE_VTAB ); |
| 8067 | pVCur = pCur->uc.pVCur; |
| 8068 | pVtab = pVCur->pVtab; |
drh | 4dc754d | 2008-07-23 18:17:32 +0000 | [diff] [blame] | 8069 | pModule = pVtab->pModule; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8070 | |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 8071 | /* Grab the index number and argc parameters */ |
danielk1977 | 6dbee81 | 2008-01-03 18:39:41 +0000 | [diff] [blame] | 8072 | assert( (pQuery->flags&MEM_Int)!=0 && pArgc->flags==MEM_Int ); |
drh | 9c1905f | 2008-12-10 22:32:56 +0000 | [diff] [blame] | 8073 | nArg = (int)pArgc->u.i; |
| 8074 | iQuery = (int)pQuery->u.i; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8075 | |
drh | 644a529 | 2006-12-20 14:53:38 +0000 | [diff] [blame] | 8076 | /* Invoke the xFilter method */ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 8077 | apArg = p->apArg; |
| 8078 | for(i = 0; i<nArg; i++){ |
| 8079 | apArg[i] = &pArgc[i+1]; |
| 8080 | } |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8081 | rc = pModule->xFilter(pVCur, iQuery, pOp->p4.z, nArg, apArg); |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 8082 | sqlite3VtabImportErrmsg(p, pVtab); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8083 | if( rc ) goto abort_due_to_error; |
| 8084 | res = pModule->xEof(pVCur); |
drh | 1d454a3 | 2008-01-31 19:34:51 +0000 | [diff] [blame] | 8085 | pCur->nullRow = 0; |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 8086 | VdbeBranchTaken(res!=0,2); |
| 8087 | if( res ) goto jump_to_p2; |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8088 | break; |
| 8089 | } |
| 8090 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 8091 | |
| 8092 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | ce2fbd1 | 2018-01-12 21:00:14 +0000 | [diff] [blame] | 8093 | /* Opcode: VColumn P1 P2 P3 * P5 |
drh | 81316f8 | 2013-10-29 20:40:47 +0000 | [diff] [blame] | 8094 | ** Synopsis: r[P3]=vcolumn(P2) |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8095 | ** |
drh | 6f390be | 2018-01-11 17:04:26 +0000 | [diff] [blame] | 8096 | ** Store in register P3 the value of the P2-th column of |
| 8097 | ** the current row of the virtual-table of cursor P1. |
| 8098 | ** |
| 8099 | ** If the VColumn opcode is being used to fetch the value of |
drh | ce2fbd1 | 2018-01-12 21:00:14 +0000 | [diff] [blame] | 8100 | ** an unchanging column during an UPDATE operation, then the P5 |
drh | 09d00b2 | 2018-09-27 20:20:01 +0000 | [diff] [blame] | 8101 | ** value is OPFLAG_NOCHNG. This will cause the sqlite3_vtab_nochange() |
| 8102 | ** function to return true inside the xColumn method of the virtual |
| 8103 | ** table implementation. The P5 column might also contain other |
| 8104 | ** bits (OPFLAG_LENGTHARG or OPFLAG_TYPEOFARG) but those bits are |
| 8105 | ** unused by OP_VColumn. |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8106 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 8107 | case OP_VColumn: { /* ncycle */ |
danielk1977 | 3e3a84d | 2008-08-01 17:37:40 +0000 | [diff] [blame] | 8108 | sqlite3_vtab *pVtab; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8109 | const sqlite3_module *pModule; |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 8110 | Mem *pDest; |
| 8111 | sqlite3_context sContext; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8112 | |
drh | dfe88ec | 2008-11-03 20:55:06 +0000 | [diff] [blame] | 8113 | VdbeCursor *pCur = p->apCsr[pOp->p1]; |
drh | 3ab4ffc | 2021-11-11 11:23:08 +0000 | [diff] [blame] | 8114 | assert( pCur!=0 ); |
drh | 9f6168b | 2016-03-19 23:32:58 +0000 | [diff] [blame] | 8115 | assert( pOp->p3>0 && pOp->p3<=(p->nMem+1 - p->nCursor) ); |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 8116 | pDest = &aMem[pOp->p3]; |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 8117 | memAboutToChange(p, pDest); |
drh | 2945b4a | 2008-01-31 15:53:45 +0000 | [diff] [blame] | 8118 | if( pCur->nullRow ){ |
| 8119 | sqlite3VdbeMemSetNull(pDest); |
| 8120 | break; |
| 8121 | } |
drh | a27e350 | 2022-06-10 10:10:31 +0000 | [diff] [blame] | 8122 | assert( pCur->eCurType==CURTYPE_VTAB ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8123 | pVtab = pCur->uc.pVCur->pVtab; |
danielk1977 | 3e3a84d | 2008-08-01 17:37:40 +0000 | [diff] [blame] | 8124 | pModule = pVtab->pModule; |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 8125 | assert( pModule->xColumn ); |
| 8126 | memset(&sContext, 0, sizeof(sContext)); |
drh | 9bd038f | 2014-08-27 14:14:06 +0000 | [diff] [blame] | 8127 | sContext.pOut = pDest; |
drh | 659fdb4 | 2022-04-01 15:31:58 +0000 | [diff] [blame] | 8128 | sContext.enc = encoding; |
drh | 75f1076 | 2019-12-14 18:08:22 +0000 | [diff] [blame] | 8129 | assert( pOp->p5==OPFLAG_NOCHNG || pOp->p5==0 ); |
drh | 09d00b2 | 2018-09-27 20:20:01 +0000 | [diff] [blame] | 8130 | if( pOp->p5 & OPFLAG_NOCHNG ){ |
drh | ce2fbd1 | 2018-01-12 21:00:14 +0000 | [diff] [blame] | 8131 | sqlite3VdbeMemSetNull(pDest); |
| 8132 | pDest->flags = MEM_Null|MEM_Zero; |
| 8133 | pDest->u.nZero = 0; |
| 8134 | }else{ |
| 8135 | MemSetTypeFlag(pDest, MEM_Null); |
| 8136 | } |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8137 | rc = pModule->xColumn(pCur->uc.pVCur, &sContext, pOp->p2); |
dan | 016f781 | 2013-08-21 17:35:48 +0000 | [diff] [blame] | 8138 | sqlite3VtabImportErrmsg(p, pVtab); |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 8139 | if( sContext.isError>0 ){ |
dan | 099fa84 | 2018-01-30 18:33:23 +0000 | [diff] [blame] | 8140 | sqlite3VdbeError(p, "%s", sqlite3_value_text(pDest)); |
drh | 4c8555f | 2009-06-25 01:47:11 +0000 | [diff] [blame] | 8141 | rc = sContext.isError; |
| 8142 | } |
drh | 9bd038f | 2014-08-27 14:14:06 +0000 | [diff] [blame] | 8143 | sqlite3VdbeChangeEncoding(pDest, encoding); |
drh | 5ff4437 | 2009-11-24 16:26:17 +0000 | [diff] [blame] | 8144 | REGISTER_TRACE(pOp->p3, pDest); |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 8145 | UPDATE_MAX_BLOBSIZE(pDest); |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8146 | |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8147 | if( rc ) goto abort_due_to_error; |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8148 | break; |
| 8149 | } |
| 8150 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 8151 | |
| 8152 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 8153 | /* Opcode: VNext P1 P2 * * * |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8154 | ** |
| 8155 | ** Advance virtual table P1 to the next row in its result set and |
| 8156 | ** jump to instruction P2. Or, if the virtual table has reached |
| 8157 | ** the end of its result set, then fall through to the next instruction. |
| 8158 | */ |
dan | 2adb309 | 2022-12-06 18:48:06 +0000 | [diff] [blame] | 8159 | case OP_VNext: { /* jump, ncycle */ |
danielk1977 | 3e3a84d | 2008-08-01 17:37:40 +0000 | [diff] [blame] | 8160 | sqlite3_vtab *pVtab; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8161 | const sqlite3_module *pModule; |
drh | c54a617 | 2009-06-02 16:06:03 +0000 | [diff] [blame] | 8162 | int res; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8163 | VdbeCursor *pCur; |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8164 | |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8165 | pCur = p->apCsr[pOp->p1]; |
drh | 3ab4ffc | 2021-11-11 11:23:08 +0000 | [diff] [blame] | 8166 | assert( pCur!=0 ); |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8167 | assert( pCur->eCurType==CURTYPE_VTAB ); |
drh | 2945b4a | 2008-01-31 15:53:45 +0000 | [diff] [blame] | 8168 | if( pCur->nullRow ){ |
| 8169 | break; |
| 8170 | } |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8171 | pVtab = pCur->uc.pVCur->pVtab; |
danielk1977 | 3e3a84d | 2008-08-01 17:37:40 +0000 | [diff] [blame] | 8172 | pModule = pVtab->pModule; |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 8173 | assert( pModule->xNext ); |
danielk1977 | b7a7b9a | 2006-06-13 10:24:42 +0000 | [diff] [blame] | 8174 | |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 8175 | /* Invoke the xNext() method of the module. There is no way for the |
| 8176 | ** underlying implementation to return an error if one occurs during |
| 8177 | ** xNext(). Instead, if an error occurs, true is returned (indicating that |
| 8178 | ** data is available) and the error code returned when xColumn or |
| 8179 | ** some other method is next invoked on the save virtual table cursor. |
| 8180 | */ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8181 | rc = pModule->xNext(pCur->uc.pVCur); |
dan | 016f781 | 2013-08-21 17:35:48 +0000 | [diff] [blame] | 8182 | sqlite3VtabImportErrmsg(p, pVtab); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8183 | if( rc ) goto abort_due_to_error; |
| 8184 | res = pModule->xEof(pCur->uc.pVCur); |
drh | 688852a | 2014-02-17 22:40:43 +0000 | [diff] [blame] | 8185 | VdbeBranchTaken(!res,2); |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 8186 | if( !res ){ |
| 8187 | /* If there is data, jump to P2 */ |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 8188 | goto jump_to_p2_and_check_for_interrupt; |
drh | de4fcfd | 2008-01-19 23:50:26 +0000 | [diff] [blame] | 8189 | } |
drh | 49afe3a | 2013-07-10 03:05:14 +0000 | [diff] [blame] | 8190 | goto check_for_interrupt; |
drh | 9eff616 | 2006-06-12 21:59:13 +0000 | [diff] [blame] | 8191 | } |
| 8192 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 8193 | |
danielk1977 | 182c4ba | 2007-06-27 15:53:34 +0000 | [diff] [blame] | 8194 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | 9875715 | 2008-01-09 23:04:12 +0000 | [diff] [blame] | 8195 | /* Opcode: VRename P1 * * P4 * |
danielk1977 | 182c4ba | 2007-06-27 15:53:34 +0000 | [diff] [blame] | 8196 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 8197 | ** P4 is a pointer to a virtual table object, an sqlite3_vtab structure. |
danielk1977 | 182c4ba | 2007-06-27 15:53:34 +0000 | [diff] [blame] | 8198 | ** This opcode invokes the corresponding xRename method. The value |
danielk1977 | 6dbee81 | 2008-01-03 18:39:41 +0000 | [diff] [blame] | 8199 | ** in register P1 is passed as the zName argument to the xRename method. |
danielk1977 | 182c4ba | 2007-06-27 15:53:34 +0000 | [diff] [blame] | 8200 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 8201 | case OP_VRename: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8202 | sqlite3_vtab *pVtab; |
| 8203 | Mem *pName; |
dan | 34566c4 | 2018-09-20 17:21:21 +0000 | [diff] [blame] | 8204 | int isLegacy; |
| 8205 | |
| 8206 | isLegacy = (db->flags & SQLITE_LegacyAlter); |
| 8207 | db->flags |= SQLITE_LegacyAlter; |
danielk1977 | 595a523 | 2009-07-24 17:58:53 +0000 | [diff] [blame] | 8208 | pVtab = pOp->p4.pVtab->pVtab; |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 8209 | pName = &aMem[pOp->p1]; |
danielk1977 | 182c4ba | 2007-06-27 15:53:34 +0000 | [diff] [blame] | 8210 | assert( pVtab->pModule->xRename ); |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 8211 | assert( memIsValid(pName) ); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 8212 | assert( p->readOnly==0 ); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 8213 | REGISTER_TRACE(pOp->p1, pName); |
drh | 35f6b93 | 2009-06-23 14:15:04 +0000 | [diff] [blame] | 8214 | assert( pName->flags & MEM_Str ); |
drh | 98655a6 | 2011-10-18 22:07:47 +0000 | [diff] [blame] | 8215 | testcase( pName->enc==SQLITE_UTF8 ); |
| 8216 | testcase( pName->enc==SQLITE_UTF16BE ); |
| 8217 | testcase( pName->enc==SQLITE_UTF16LE ); |
| 8218 | rc = sqlite3VdbeChangeEncoding(pName, SQLITE_UTF8); |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8219 | if( rc ) goto abort_due_to_error; |
| 8220 | rc = pVtab->pModule->xRename(pVtab, pName->z); |
drh | d5b44d6 | 2018-12-06 17:06:02 +0000 | [diff] [blame] | 8221 | if( isLegacy==0 ) db->flags &= ~(u64)SQLITE_LegacyAlter; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8222 | sqlite3VtabImportErrmsg(p, pVtab); |
| 8223 | p->expired = 0; |
| 8224 | if( rc ) goto abort_due_to_error; |
danielk1977 | 182c4ba | 2007-06-27 15:53:34 +0000 | [diff] [blame] | 8225 | break; |
| 8226 | } |
| 8227 | #endif |
drh | 4cbdda9 | 2006-06-14 19:00:20 +0000 | [diff] [blame] | 8228 | |
| 8229 | #ifndef SQLITE_OMIT_VIRTUALTABLE |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 8230 | /* Opcode: VUpdate P1 P2 P3 P4 P5 |
drh | f63552b | 2013-10-30 00:25:03 +0000 | [diff] [blame] | 8231 | ** Synopsis: data=r[P3@P2] |
danielk1977 | 399918f | 2006-06-14 13:03:23 +0000 | [diff] [blame] | 8232 | ** |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 8233 | ** P4 is a pointer to a virtual table object, an sqlite3_vtab structure. |
danielk1977 | 399918f | 2006-06-14 13:03:23 +0000 | [diff] [blame] | 8234 | ** This opcode invokes the corresponding xUpdate method. P2 values |
danielk1977 | 2a339ff | 2008-01-03 17:31:44 +0000 | [diff] [blame] | 8235 | ** are contiguous memory cells starting at P3 to pass to the xUpdate |
| 8236 | ** invocation. The value in register (P3+P2-1) corresponds to the |
| 8237 | ** p2th element of the argv array passed to xUpdate. |
drh | 4cbdda9 | 2006-06-14 19:00:20 +0000 | [diff] [blame] | 8238 | ** |
| 8239 | ** The xUpdate method will do a DELETE or an INSERT or both. |
danielk1977 | 2a339ff | 2008-01-03 17:31:44 +0000 | [diff] [blame] | 8240 | ** The argv[0] element (which corresponds to memory cell P3) |
| 8241 | ** is the rowid of a row to delete. If argv[0] is NULL then no |
| 8242 | ** deletion occurs. The argv[1] element is the rowid of the new |
| 8243 | ** row. This can be NULL to have the virtual table select the new |
| 8244 | ** rowid for itself. The subsequent elements in the array are |
| 8245 | ** the values of columns in the new row. |
drh | 4cbdda9 | 2006-06-14 19:00:20 +0000 | [diff] [blame] | 8246 | ** |
| 8247 | ** If P2==1 then no insert is performed. argv[0] is the rowid of |
| 8248 | ** a row to delete. |
danielk1977 | 1f6eec5 | 2006-06-16 06:17:47 +0000 | [diff] [blame] | 8249 | ** |
| 8250 | ** P1 is a boolean flag. If it is set to true and the xUpdate call |
| 8251 | ** is successful, then the value returned by sqlite3_last_insert_rowid() |
| 8252 | ** is set to the value of the rowid for the row just inserted. |
drh | 0fd6135 | 2014-02-07 02:29:45 +0000 | [diff] [blame] | 8253 | ** |
| 8254 | ** P5 is the error actions (OE_Replace, OE_Fail, OE_Ignore, etc) to |
| 8255 | ** apply in the case of a constraint failure on an insert or update. |
danielk1977 | 399918f | 2006-06-14 13:03:23 +0000 | [diff] [blame] | 8256 | */ |
drh | 9cbf342 | 2008-01-17 16:22:13 +0000 | [diff] [blame] | 8257 | case OP_VUpdate: { |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8258 | sqlite3_vtab *pVtab; |
drh | f496a7d | 2015-03-24 14:05:50 +0000 | [diff] [blame] | 8259 | const sqlite3_module *pModule; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8260 | int nArg; |
| 8261 | int i; |
drh | 9135ebb | 2021-11-11 23:52:44 +0000 | [diff] [blame] | 8262 | sqlite_int64 rowid = 0; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8263 | Mem **apArg; |
| 8264 | Mem *pX; |
| 8265 | |
dan | b061d05 | 2011-04-25 18:49:57 +0000 | [diff] [blame] | 8266 | assert( pOp->p2==1 || pOp->p5==OE_Fail || pOp->p5==OE_Rollback |
| 8267 | || pOp->p5==OE_Abort || pOp->p5==OE_Ignore || pOp->p5==OE_Replace |
| 8268 | ); |
drh | 9e92a47 | 2013-06-27 17:40:30 +0000 | [diff] [blame] | 8269 | assert( p->readOnly==0 ); |
dan | 466ea9b | 2018-06-13 11:11:13 +0000 | [diff] [blame] | 8270 | if( db->mallocFailed ) goto no_mem; |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 8271 | sqlite3VdbeIncrWriteCounter(p, 0); |
danielk1977 | 595a523 | 2009-07-24 17:58:53 +0000 | [diff] [blame] | 8272 | pVtab = pOp->p4.pVtab->pVtab; |
drh | f496a7d | 2015-03-24 14:05:50 +0000 | [diff] [blame] | 8273 | if( pVtab==0 || NEVER(pVtab->pModule==0) ){ |
| 8274 | rc = SQLITE_LOCKED; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8275 | goto abort_due_to_error; |
drh | f496a7d | 2015-03-24 14:05:50 +0000 | [diff] [blame] | 8276 | } |
| 8277 | pModule = pVtab->pModule; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8278 | nArg = pOp->p2; |
drh | 66a5167 | 2008-01-03 00:01:23 +0000 | [diff] [blame] | 8279 | assert( pOp->p4type==P4_VTAB ); |
drh | 35f6b93 | 2009-06-23 14:15:04 +0000 | [diff] [blame] | 8280 | if( ALWAYS(pModule->xUpdate) ){ |
dan | b061d05 | 2011-04-25 18:49:57 +0000 | [diff] [blame] | 8281 | u8 vtabOnConflict = db->vtabOnConflict; |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8282 | apArg = p->apArg; |
drh | a6c2ed9 | 2009-11-14 23:22:23 +0000 | [diff] [blame] | 8283 | pX = &aMem[pOp->p3]; |
danielk1977 | 2a339ff | 2008-01-03 17:31:44 +0000 | [diff] [blame] | 8284 | for(i=0; i<nArg; i++){ |
drh | 2b4ded9 | 2010-09-27 21:09:31 +0000 | [diff] [blame] | 8285 | assert( memIsValid(pX) ); |
| 8286 | memAboutToChange(p, pX); |
drh | 9c41938 | 2006-06-16 21:13:21 +0000 | [diff] [blame] | 8287 | apArg[i] = pX; |
danielk1977 | 2a339ff | 2008-01-03 17:31:44 +0000 | [diff] [blame] | 8288 | pX++; |
danielk1977 | 399918f | 2006-06-14 13:03:23 +0000 | [diff] [blame] | 8289 | } |
dan | b061d05 | 2011-04-25 18:49:57 +0000 | [diff] [blame] | 8290 | db->vtabOnConflict = pOp->p5; |
danielk1977 | 1f6eec5 | 2006-06-16 06:17:47 +0000 | [diff] [blame] | 8291 | rc = pModule->xUpdate(pVtab, nArg, apArg, &rowid); |
dan | b061d05 | 2011-04-25 18:49:57 +0000 | [diff] [blame] | 8292 | db->vtabOnConflict = vtabOnConflict; |
dan | 016f781 | 2013-08-21 17:35:48 +0000 | [diff] [blame] | 8293 | sqlite3VtabImportErrmsg(p, pVtab); |
drh | 35f6b93 | 2009-06-23 14:15:04 +0000 | [diff] [blame] | 8294 | if( rc==SQLITE_OK && pOp->p1 ){ |
danielk1977 | 1f6eec5 | 2006-06-16 06:17:47 +0000 | [diff] [blame] | 8295 | assert( nArg>1 && apArg[0] && (apArg[0]->flags&MEM_Null) ); |
drh | fae58d5 | 2017-01-26 17:26:44 +0000 | [diff] [blame] | 8296 | db->lastRowid = rowid; |
danielk1977 | 1f6eec5 | 2006-06-16 06:17:47 +0000 | [diff] [blame] | 8297 | } |
drh | d91c1a1 | 2013-02-09 13:58:25 +0000 | [diff] [blame] | 8298 | if( (rc&0xff)==SQLITE_CONSTRAINT && pOp->p4.pVtab->bConstraint ){ |
dan | b061d05 | 2011-04-25 18:49:57 +0000 | [diff] [blame] | 8299 | if( pOp->p5==OE_Ignore ){ |
| 8300 | rc = SQLITE_OK; |
| 8301 | }else{ |
| 8302 | p->errorAction = ((pOp->p5==OE_Replace) ? OE_Abort : pOp->p5); |
| 8303 | } |
| 8304 | }else{ |
| 8305 | p->nChange++; |
| 8306 | } |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8307 | if( rc ) goto abort_due_to_error; |
danielk1977 | 399918f | 2006-06-14 13:03:23 +0000 | [diff] [blame] | 8308 | } |
drh | 4cbdda9 | 2006-06-14 19:00:20 +0000 | [diff] [blame] | 8309 | break; |
danielk1977 | 399918f | 2006-06-14 13:03:23 +0000 | [diff] [blame] | 8310 | } |
| 8311 | #endif /* SQLITE_OMIT_VIRTUALTABLE */ |
| 8312 | |
danielk1977 | 59a9379 | 2008-05-15 17:48:20 +0000 | [diff] [blame] | 8313 | #ifndef SQLITE_OMIT_PAGER_PRAGMAS |
| 8314 | /* Opcode: Pagecount P1 P2 * * * |
| 8315 | ** |
| 8316 | ** Write the current number of pages in database P1 to memory cell P2. |
| 8317 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 8318 | case OP_Pagecount: { /* out2 */ |
| 8319 | pOut = out2Prerelease(p, pOp); |
drh | b129915 | 2010-03-30 22:58:33 +0000 | [diff] [blame] | 8320 | pOut->u.i = sqlite3BtreeLastPage(db->aDb[pOp->p1].pBt); |
danielk1977 | 59a9379 | 2008-05-15 17:48:20 +0000 | [diff] [blame] | 8321 | break; |
| 8322 | } |
| 8323 | #endif |
| 8324 | |
drh | 60ac3f4 | 2010-11-23 18:59:27 +0000 | [diff] [blame] | 8325 | |
| 8326 | #ifndef SQLITE_OMIT_PAGER_PRAGMAS |
| 8327 | /* Opcode: MaxPgcnt P1 P2 P3 * * |
| 8328 | ** |
| 8329 | ** Try to set the maximum page count for database P1 to the value in P3. |
drh | c84e033 | 2010-11-23 20:25:08 +0000 | [diff] [blame] | 8330 | ** Do not let the maximum page count fall below the current page count and |
| 8331 | ** do not change the maximum page count value if P3==0. |
| 8332 | ** |
drh | 60ac3f4 | 2010-11-23 18:59:27 +0000 | [diff] [blame] | 8333 | ** Store the maximum page count after the change in register P2. |
| 8334 | */ |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 8335 | case OP_MaxPgcnt: { /* out2 */ |
drh | c84e033 | 2010-11-23 20:25:08 +0000 | [diff] [blame] | 8336 | unsigned int newMax; |
drh | 60ac3f4 | 2010-11-23 18:59:27 +0000 | [diff] [blame] | 8337 | Btree *pBt; |
| 8338 | |
drh | 27a348c | 2015-04-13 19:14:06 +0000 | [diff] [blame] | 8339 | pOut = out2Prerelease(p, pOp); |
drh | 60ac3f4 | 2010-11-23 18:59:27 +0000 | [diff] [blame] | 8340 | pBt = db->aDb[pOp->p1].pBt; |
drh | c84e033 | 2010-11-23 20:25:08 +0000 | [diff] [blame] | 8341 | newMax = 0; |
| 8342 | if( pOp->p3 ){ |
| 8343 | newMax = sqlite3BtreeLastPage(pBt); |
drh | 6ea28d6 | 2010-11-26 16:49:59 +0000 | [diff] [blame] | 8344 | if( newMax < (unsigned)pOp->p3 ) newMax = (unsigned)pOp->p3; |
drh | c84e033 | 2010-11-23 20:25:08 +0000 | [diff] [blame] | 8345 | } |
| 8346 | pOut->u.i = sqlite3BtreeMaxPageCount(pBt, newMax); |
drh | 60ac3f4 | 2010-11-23 18:59:27 +0000 | [diff] [blame] | 8347 | break; |
| 8348 | } |
| 8349 | #endif |
| 8350 | |
drh | 920cf59 | 2019-10-30 16:29:02 +0000 | [diff] [blame] | 8351 | /* Opcode: Function P1 P2 P3 P4 * |
drh | d7b10d7 | 2020-02-01 17:38:24 +0000 | [diff] [blame] | 8352 | ** Synopsis: r[P3]=func(r[P2@NP]) |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8353 | ** |
| 8354 | ** Invoke a user function (P4 is a pointer to an sqlite3_context object that |
drh | 920cf59 | 2019-10-30 16:29:02 +0000 | [diff] [blame] | 8355 | ** contains a pointer to the function to be run) with arguments taken |
| 8356 | ** from register P2 and successors. The number of arguments is in |
| 8357 | ** the sqlite3_context object that P4 points to. |
| 8358 | ** The result of the function is stored |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8359 | ** in register P3. Register P3 must not be one of the function inputs. |
| 8360 | ** |
| 8361 | ** P1 is a 32-bit bitmask indicating whether or not each argument to the |
| 8362 | ** function was determined to be constant at compile time. If the first |
| 8363 | ** argument was constant then bit 0 of P1 is set. This is used to determine |
| 8364 | ** whether meta data associated with a user function argument using the |
| 8365 | ** sqlite3_set_auxdata() API may be safely retained until the next |
| 8366 | ** invocation of this opcode. |
| 8367 | ** |
drh | 920cf59 | 2019-10-30 16:29:02 +0000 | [diff] [blame] | 8368 | ** See also: AggStep, AggFinal, PureFunc |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8369 | */ |
drh | 920cf59 | 2019-10-30 16:29:02 +0000 | [diff] [blame] | 8370 | /* Opcode: PureFunc P1 P2 P3 P4 * |
drh | d7b10d7 | 2020-02-01 17:38:24 +0000 | [diff] [blame] | 8371 | ** Synopsis: r[P3]=func(r[P2@NP]) |
drh | 920cf59 | 2019-10-30 16:29:02 +0000 | [diff] [blame] | 8372 | ** |
| 8373 | ** Invoke a user function (P4 is a pointer to an sqlite3_context object that |
| 8374 | ** contains a pointer to the function to be run) with arguments taken |
| 8375 | ** from register P2 and successors. The number of arguments is in |
| 8376 | ** the sqlite3_context object that P4 points to. |
| 8377 | ** The result of the function is stored |
| 8378 | ** in register P3. Register P3 must not be one of the function inputs. |
| 8379 | ** |
| 8380 | ** P1 is a 32-bit bitmask indicating whether or not each argument to the |
| 8381 | ** function was determined to be constant at compile time. If the first |
| 8382 | ** argument was constant then bit 0 of P1 is set. This is used to determine |
| 8383 | ** whether meta data associated with a user function argument using the |
| 8384 | ** sqlite3_set_auxdata() API may be safely retained until the next |
| 8385 | ** invocation of this opcode. |
| 8386 | ** |
| 8387 | ** This opcode works exactly like OP_Function. The only difference is in |
| 8388 | ** its name. This opcode is used in places where the function must be |
| 8389 | ** purely non-deterministic. Some built-in date/time functions can be |
| 8390 | ** either determinitic of non-deterministic, depending on their arguments. |
| 8391 | ** When those function are used in a non-deterministic way, they will check |
| 8392 | ** to see if they were called using OP_PureFunc instead of OP_Function, and |
| 8393 | ** if they were, they throw an error. |
| 8394 | ** |
| 8395 | ** See also: AggStep, AggFinal, Function |
| 8396 | */ |
mistachkin | 758784d | 2018-07-25 15:12:29 +0000 | [diff] [blame] | 8397 | case OP_PureFunc: /* group */ |
| 8398 | case OP_Function: { /* group */ |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8399 | int i; |
| 8400 | sqlite3_context *pCtx; |
| 8401 | |
| 8402 | assert( pOp->p4type==P4_FUNCCTX ); |
| 8403 | pCtx = pOp->p4.pCtx; |
| 8404 | |
| 8405 | /* If this function is inside of a trigger, the register array in aMem[] |
| 8406 | ** might change from one evaluation to the next. The next block of code |
| 8407 | ** checks to see if the register array has changed, and if so it |
| 8408 | ** reinitializes the relavant parts of the sqlite3_context object */ |
| 8409 | pOut = &aMem[pOp->p3]; |
| 8410 | if( pCtx->pOut != pOut ){ |
drh | 920cf59 | 2019-10-30 16:29:02 +0000 | [diff] [blame] | 8411 | pCtx->pVdbe = p; |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8412 | pCtx->pOut = pOut; |
drh | 659fdb4 | 2022-04-01 15:31:58 +0000 | [diff] [blame] | 8413 | pCtx->enc = encoding; |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8414 | for(i=pCtx->argc-1; i>=0; i--) pCtx->argv[i] = &aMem[pOp->p2+i]; |
| 8415 | } |
drh | 920cf59 | 2019-10-30 16:29:02 +0000 | [diff] [blame] | 8416 | assert( pCtx->pVdbe==p ); |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8417 | |
| 8418 | memAboutToChange(p, pOut); |
| 8419 | #ifdef SQLITE_DEBUG |
| 8420 | for(i=0; i<pCtx->argc; i++){ |
| 8421 | assert( memIsValid(pCtx->argv[i]) ); |
| 8422 | REGISTER_TRACE(pOp->p2+i, pCtx->argv[i]); |
| 8423 | } |
| 8424 | #endif |
| 8425 | MemSetTypeFlag(pOut, MEM_Null); |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 8426 | assert( pCtx->isError==0 ); |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8427 | (*pCtx->pFunc->xSFunc)(pCtx, pCtx->argc, pCtx->argv);/* IMP: R-24505-23230 */ |
| 8428 | |
| 8429 | /* If the function returned an error, throw an exception */ |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 8430 | if( pCtx->isError ){ |
| 8431 | if( pCtx->isError>0 ){ |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8432 | sqlite3VdbeError(p, "%s", sqlite3_value_text(pOut)); |
| 8433 | rc = pCtx->isError; |
| 8434 | } |
| 8435 | sqlite3VdbeDeleteAuxData(db, &p->pAuxData, pCtx->iOp, pOp->p1); |
drh | f09ac0b | 2018-01-23 03:44:06 +0000 | [diff] [blame] | 8436 | pCtx->isError = 0; |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8437 | if( rc ) goto abort_due_to_error; |
| 8438 | } |
| 8439 | |
drh | fb92e07 | 2022-03-29 01:43:09 +0000 | [diff] [blame] | 8440 | assert( (pOut->flags&MEM_Str)==0 |
| 8441 | || pOut->enc==encoding |
| 8442 | || db->mallocFailed ); |
| 8443 | assert( !sqlite3VdbeMemTooBig(pOut) ); |
drh | 3e34eab | 2017-07-19 19:48:40 +0000 | [diff] [blame] | 8444 | |
| 8445 | REGISTER_TRACE(pOp->p3, pOut); |
| 8446 | UPDATE_MAX_BLOBSIZE(pOut); |
| 8447 | break; |
| 8448 | } |
| 8449 | |
drh | 8878f8a | 2022-06-09 16:19:01 +0000 | [diff] [blame] | 8450 | /* Opcode: ClrSubtype P1 * * * * |
| 8451 | ** Synopsis: r[P1].subtype = 0 |
| 8452 | ** |
| 8453 | ** Clear the subtype from register P1. |
| 8454 | */ |
| 8455 | case OP_ClrSubtype: { /* in1 */ |
| 8456 | pIn1 = &aMem[pOp->p1]; |
| 8457 | pIn1->flags &= ~MEM_Subtype; |
| 8458 | break; |
| 8459 | } |
| 8460 | |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8461 | /* Opcode: FilterAdd P1 * P3 P4 * |
| 8462 | ** Synopsis: filter(P1) += key(P3@P4) |
| 8463 | ** |
| 8464 | ** Compute a hash on the P4 registers starting with r[P3] and |
| 8465 | ** add that hash to the bloom filter contained in r[P1]. |
| 8466 | */ |
| 8467 | case OP_FilterAdd: { |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 8468 | u64 h; |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8469 | |
| 8470 | assert( pOp->p1>0 && pOp->p1<=(p->nMem+1 - p->nCursor) ); |
| 8471 | pIn1 = &aMem[pOp->p1]; |
| 8472 | assert( pIn1->flags & MEM_Blob ); |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 8473 | assert( pIn1->n>0 ); |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8474 | h = filterHash(aMem, pOp); |
| 8475 | #ifdef SQLITE_DEBUG |
| 8476 | if( db->flags&SQLITE_VdbeTrace ){ |
| 8477 | int ii; |
| 8478 | for(ii=pOp->p3; ii<pOp->p3+pOp->p4.i; ii++){ |
| 8479 | registerTrace(ii, &aMem[ii]); |
| 8480 | } |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 8481 | printf("hash: %llu modulo %d -> %u\n", h, pIn1->n, (int)(h%pIn1->n)); |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8482 | } |
| 8483 | #endif |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 8484 | h %= pIn1->n; |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8485 | pIn1->z[h/8] |= 1<<(h&7); |
| 8486 | break; |
| 8487 | } |
| 8488 | |
| 8489 | /* Opcode: Filter P1 P2 P3 P4 * |
| 8490 | ** Synopsis: if key(P3@P4) not in filter(P1) goto P2 |
| 8491 | ** |
| 8492 | ** Compute a hash on the key contained in the P4 registers starting |
| 8493 | ** with r[P3]. Check to see if that hash is found in the |
| 8494 | ** bloom filter hosted by register P1. If it is not present then |
| 8495 | ** maybe jump to P2. Otherwise fall through. |
| 8496 | ** |
| 8497 | ** False negatives are harmless. It is always safe to fall through, |
| 8498 | ** even if the value is in the bloom filter. A false negative causes |
| 8499 | ** more CPU cycles to be used, but it should still yield the correct |
| 8500 | ** answer. However, an incorrect answer may well arise from a |
| 8501 | ** false positive - if the jump is taken when it should fall through. |
| 8502 | */ |
| 8503 | case OP_Filter: { /* jump */ |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 8504 | u64 h; |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8505 | |
| 8506 | assert( pOp->p1>0 && pOp->p1<=(p->nMem+1 - p->nCursor) ); |
| 8507 | pIn1 = &aMem[pOp->p1]; |
drh | 7e910f6 | 2021-12-09 01:28:15 +0000 | [diff] [blame] | 8508 | assert( (pIn1->flags & MEM_Blob)!=0 ); |
| 8509 | assert( pIn1->n >= 1 ); |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8510 | h = filterHash(aMem, pOp); |
| 8511 | #ifdef SQLITE_DEBUG |
| 8512 | if( db->flags&SQLITE_VdbeTrace ){ |
| 8513 | int ii; |
| 8514 | for(ii=pOp->p3; ii<pOp->p3+pOp->p4.i; ii++){ |
| 8515 | registerTrace(ii, &aMem[ii]); |
| 8516 | } |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 8517 | printf("hash: %llu modulo %d -> %u\n", h, pIn1->n, (int)(h%pIn1->n)); |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8518 | } |
| 8519 | #endif |
drh | 5baaf40 | 2021-12-06 13:07:28 +0000 | [diff] [blame] | 8520 | h %= pIn1->n; |
drh | 067c60c | 2021-12-04 18:45:08 +0000 | [diff] [blame] | 8521 | if( (pIn1->z[h/8] & (1<<(h&7)))==0 ){ |
| 8522 | VdbeBranchTaken(1, 2); |
drh | 23d41e6 | 2021-12-06 21:45:31 +0000 | [diff] [blame] | 8523 | p->aCounter[SQLITE_STMTSTATUS_FILTER_HIT]++; |
drh | 067c60c | 2021-12-04 18:45:08 +0000 | [diff] [blame] | 8524 | goto jump_to_p2; |
| 8525 | }else{ |
drh | 23d41e6 | 2021-12-06 21:45:31 +0000 | [diff] [blame] | 8526 | p->aCounter[SQLITE_STMTSTATUS_FILTER_MISS]++; |
drh | 067c60c | 2021-12-04 18:45:08 +0000 | [diff] [blame] | 8527 | VdbeBranchTaken(0, 2); |
| 8528 | } |
drh | 2db144c | 2021-12-01 16:31:02 +0000 | [diff] [blame] | 8529 | break; |
| 8530 | } |
| 8531 | |
drh | f259df5 | 2017-12-27 20:38:35 +0000 | [diff] [blame] | 8532 | /* Opcode: Trace P1 P2 * P4 * |
| 8533 | ** |
| 8534 | ** Write P4 on the statement trace output if statement tracing is |
| 8535 | ** enabled. |
| 8536 | ** |
| 8537 | ** Operand P1 must be 0x7fffffff and P2 must positive. |
| 8538 | */ |
drh | 74588ce | 2017-09-13 00:13:05 +0000 | [diff] [blame] | 8539 | /* Opcode: Init P1 P2 P3 P4 * |
drh | 72e26de | 2016-08-24 21:24:04 +0000 | [diff] [blame] | 8540 | ** Synopsis: Start at P2 |
drh | aceb31b | 2014-02-08 01:40:27 +0000 | [diff] [blame] | 8541 | ** |
| 8542 | ** Programs contain a single instance of this opcode as the very first |
| 8543 | ** opcode. |
drh | 949f9cd | 2008-01-12 21:35:57 +0000 | [diff] [blame] | 8544 | ** |
| 8545 | ** If tracing is enabled (by the sqlite3_trace()) interface, then |
| 8546 | ** the UTF-8 string contained in P4 is emitted on the trace callback. |
drh | aceb31b | 2014-02-08 01:40:27 +0000 | [diff] [blame] | 8547 | ** Or if P4 is blank, use the string returned by sqlite3_sql(). |
| 8548 | ** |
| 8549 | ** If P2 is not zero, jump to instruction P2. |
drh | 9e5eb9c | 2016-09-18 16:08:10 +0000 | [diff] [blame] | 8550 | ** |
| 8551 | ** Increment the value of P1 so that OP_Once opcodes will jump the |
| 8552 | ** first time they are evaluated for this run. |
drh | 74588ce | 2017-09-13 00:13:05 +0000 | [diff] [blame] | 8553 | ** |
| 8554 | ** If P3 is not zero, then it is an address to jump to if an SQLITE_CORRUPT |
| 8555 | ** error is encountered. |
drh | 949f9cd | 2008-01-12 21:35:57 +0000 | [diff] [blame] | 8556 | */ |
drh | f259df5 | 2017-12-27 20:38:35 +0000 | [diff] [blame] | 8557 | case OP_Trace: |
drh | aceb31b | 2014-02-08 01:40:27 +0000 | [diff] [blame] | 8558 | case OP_Init: { /* jump */ |
drh | 9e5eb9c | 2016-09-18 16:08:10 +0000 | [diff] [blame] | 8559 | int i; |
drh | b9f4799 | 2018-01-24 12:14:43 +0000 | [diff] [blame] | 8560 | #ifndef SQLITE_OMIT_TRACE |
| 8561 | char *zTrace; |
| 8562 | #endif |
drh | 5fe63bf | 2016-07-25 02:42:22 +0000 | [diff] [blame] | 8563 | |
| 8564 | /* If the P4 argument is not NULL, then it must be an SQL comment string. |
| 8565 | ** The "--" string is broken up to prevent false-positives with srcck1.c. |
| 8566 | ** |
| 8567 | ** This assert() provides evidence for: |
| 8568 | ** EVIDENCE-OF: R-50676-09860 The callback can compute the same text that |
| 8569 | ** would have been returned by the legacy sqlite3_trace() interface by |
| 8570 | ** using the X argument when X begins with "--" and invoking |
| 8571 | ** sqlite3_expanded_sql(P) otherwise. |
| 8572 | */ |
| 8573 | assert( pOp->p4.z==0 || strncmp(pOp->p4.z, "-" "- ", 3)==0 ); |
drh | f259df5 | 2017-12-27 20:38:35 +0000 | [diff] [blame] | 8574 | |
| 8575 | /* OP_Init is always instruction 0 */ |
| 8576 | assert( pOp==p->aOp || pOp->opcode==OP_Trace ); |
drh | 856c103 | 2009-06-02 15:21:42 +0000 | [diff] [blame] | 8577 | |
drh | aceb31b | 2014-02-08 01:40:27 +0000 | [diff] [blame] | 8578 | #ifndef SQLITE_OMIT_TRACE |
drh | fca760c | 2016-07-14 01:09:08 +0000 | [diff] [blame] | 8579 | if( (db->mTrace & (SQLITE_TRACE_STMT|SQLITE_TRACE_LEGACY))!=0 |
drh | a24832b | 2022-04-01 19:04:13 +0000 | [diff] [blame] | 8580 | && p->minWriteFileFormat!=254 /* tag-20220401a */ |
drh | 37f58e9 | 2012-09-04 21:34:26 +0000 | [diff] [blame] | 8581 | && (zTrace = (pOp->p4.z ? pOp->p4.z : p->zSql))!=0 |
| 8582 | ){ |
drh | 3d2a529 | 2016-07-13 22:55:01 +0000 | [diff] [blame] | 8583 | #ifndef SQLITE_OMIT_DEPRECATED |
drh | fca760c | 2016-07-14 01:09:08 +0000 | [diff] [blame] | 8584 | if( db->mTrace & SQLITE_TRACE_LEGACY ){ |
drh | 5fe63bf | 2016-07-25 02:42:22 +0000 | [diff] [blame] | 8585 | char *z = sqlite3VdbeExpandSql(p, zTrace); |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 8586 | db->trace.xLegacy(db->pTraceArg, z); |
drh | bd441f7 | 2016-07-25 02:31:48 +0000 | [diff] [blame] | 8587 | sqlite3_free(z); |
drh | fca760c | 2016-07-14 01:09:08 +0000 | [diff] [blame] | 8588 | }else |
drh | 3d2a529 | 2016-07-13 22:55:01 +0000 | [diff] [blame] | 8589 | #endif |
drh | 7adbcff | 2017-03-20 15:29:28 +0000 | [diff] [blame] | 8590 | if( db->nVdbeExec>1 ){ |
| 8591 | char *z = sqlite3MPrintf(db, "-- %s", zTrace); |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 8592 | (void)db->trace.xV2(SQLITE_TRACE_STMT, db->pTraceArg, p, z); |
drh | 7adbcff | 2017-03-20 15:29:28 +0000 | [diff] [blame] | 8593 | sqlite3DbFree(db, z); |
| 8594 | }else{ |
drh | 08b9208 | 2020-08-10 14:18:00 +0000 | [diff] [blame] | 8595 | (void)db->trace.xV2(SQLITE_TRACE_STMT, db->pTraceArg, p, zTrace); |
drh | 3d2a529 | 2016-07-13 22:55:01 +0000 | [diff] [blame] | 8596 | } |
drh | 949f9cd | 2008-01-12 21:35:57 +0000 | [diff] [blame] | 8597 | } |
drh | 8f8b231 | 2013-10-18 20:03:43 +0000 | [diff] [blame] | 8598 | #ifdef SQLITE_USE_FCNTL_TRACE |
| 8599 | zTrace = (pOp->p4.z ? pOp->p4.z : p->zSql); |
| 8600 | if( zTrace ){ |
mistachkin | d8992ce | 2016-09-20 17:49:01 +0000 | [diff] [blame] | 8601 | int j; |
| 8602 | for(j=0; j<db->nDb; j++){ |
| 8603 | if( DbMaskTest(p->btreeMask, j)==0 ) continue; |
| 8604 | sqlite3_file_control(db, db->aDb[j].zDbSName, SQLITE_FCNTL_TRACE, zTrace); |
drh | 8f8b231 | 2013-10-18 20:03:43 +0000 | [diff] [blame] | 8605 | } |
| 8606 | } |
| 8607 | #endif /* SQLITE_USE_FCNTL_TRACE */ |
drh | c3f1d5f | 2011-05-30 23:42:16 +0000 | [diff] [blame] | 8608 | #ifdef SQLITE_DEBUG |
| 8609 | if( (db->flags & SQLITE_SqlTrace)!=0 |
| 8610 | && (zTrace = (pOp->p4.z ? pOp->p4.z : p->zSql))!=0 |
| 8611 | ){ |
| 8612 | sqlite3DebugPrintf("SQL-trace: %s\n", zTrace); |
| 8613 | } |
| 8614 | #endif /* SQLITE_DEBUG */ |
drh | aceb31b | 2014-02-08 01:40:27 +0000 | [diff] [blame] | 8615 | #endif /* SQLITE_OMIT_TRACE */ |
drh | 4910a76 | 2016-09-03 01:46:15 +0000 | [diff] [blame] | 8616 | assert( pOp->p2>0 ); |
drh | 9e5eb9c | 2016-09-18 16:08:10 +0000 | [diff] [blame] | 8617 | if( pOp->p1>=sqlite3GlobalConfig.iOnceResetThreshold ){ |
drh | f259df5 | 2017-12-27 20:38:35 +0000 | [diff] [blame] | 8618 | if( pOp->opcode==OP_Trace ) break; |
drh | 9e5eb9c | 2016-09-18 16:08:10 +0000 | [diff] [blame] | 8619 | for(i=1; i<p->nOp; i++){ |
| 8620 | if( p->aOp[i].opcode==OP_Once ) p->aOp[i].p1 = 0; |
| 8621 | } |
| 8622 | pOp->p1 = 0; |
| 8623 | } |
| 8624 | pOp->p1++; |
drh | 00d11d4 | 2017-06-29 12:49:18 +0000 | [diff] [blame] | 8625 | p->aCounter[SQLITE_STMTSTATUS_RUN]++; |
drh | 4910a76 | 2016-09-03 01:46:15 +0000 | [diff] [blame] | 8626 | goto jump_to_p2; |
drh | 949f9cd | 2008-01-12 21:35:57 +0000 | [diff] [blame] | 8627 | } |
drh | 949f9cd | 2008-01-12 21:35:57 +0000 | [diff] [blame] | 8628 | |
drh | 2893536 | 2013-12-07 20:39:19 +0000 | [diff] [blame] | 8629 | #ifdef SQLITE_ENABLE_CURSOR_HINTS |
drh | 0df5701 | 2015-08-14 15:05:55 +0000 | [diff] [blame] | 8630 | /* Opcode: CursorHint P1 * * P4 * |
drh | 2893536 | 2013-12-07 20:39:19 +0000 | [diff] [blame] | 8631 | ** |
| 8632 | ** Provide a hint to cursor P1 that it only needs to return rows that |
drh | 0df5701 | 2015-08-14 15:05:55 +0000 | [diff] [blame] | 8633 | ** satisfy the Expr in P4. TK_REGISTER terms in the P4 expression refer |
| 8634 | ** to values currently held in registers. TK_COLUMN terms in the P4 |
| 8635 | ** expression refer to columns in the b-tree to which cursor P1 is pointing. |
drh | 2893536 | 2013-12-07 20:39:19 +0000 | [diff] [blame] | 8636 | */ |
| 8637 | case OP_CursorHint: { |
| 8638 | VdbeCursor *pC; |
| 8639 | |
| 8640 | assert( pOp->p1>=0 && pOp->p1<p->nCursor ); |
| 8641 | assert( pOp->p4type==P4_EXPR ); |
| 8642 | pC = p->apCsr[pOp->p1]; |
dan | 91d3a61 | 2014-07-15 11:59:44 +0000 | [diff] [blame] | 8643 | if( pC ){ |
drh | c960dcb | 2015-11-20 19:22:01 +0000 | [diff] [blame] | 8644 | assert( pC->eCurType==CURTYPE_BTREE ); |
drh | 62aaa6c | 2015-11-21 17:27:42 +0000 | [diff] [blame] | 8645 | sqlite3BtreeCursorHint(pC->uc.pCursor, BTREE_HINT_RANGE, |
| 8646 | pOp->p4.pExpr, aMem); |
dan | 91d3a61 | 2014-07-15 11:59:44 +0000 | [diff] [blame] | 8647 | } |
drh | 2893536 | 2013-12-07 20:39:19 +0000 | [diff] [blame] | 8648 | break; |
| 8649 | } |
| 8650 | #endif /* SQLITE_ENABLE_CURSOR_HINTS */ |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 8651 | |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 8652 | #ifdef SQLITE_DEBUG |
| 8653 | /* Opcode: Abortable * * * * * |
| 8654 | ** |
| 8655 | ** Verify that an Abort can happen. Assert if an Abort at this point |
| 8656 | ** might cause database corruption. This opcode only appears in debugging |
| 8657 | ** builds. |
| 8658 | ** |
| 8659 | ** An Abort is safe if either there have been no writes, or if there is |
| 8660 | ** an active statement journal. |
| 8661 | */ |
| 8662 | case OP_Abortable: { |
| 8663 | sqlite3VdbeAssertAbortable(p); |
| 8664 | break; |
| 8665 | } |
| 8666 | #endif |
| 8667 | |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 8668 | #ifdef SQLITE_DEBUG |
drh | 3aef2fb | 2020-01-02 17:46:02 +0000 | [diff] [blame] | 8669 | /* Opcode: ReleaseReg P1 P2 P3 * P5 |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 8670 | ** Synopsis: release r[P1@P2] mask P3 |
| 8671 | ** |
| 8672 | ** Release registers from service. Any content that was in the |
| 8673 | ** the registers is unreliable after this opcode completes. |
| 8674 | ** |
| 8675 | ** The registers released will be the P2 registers starting at P1, |
| 8676 | ** except if bit ii of P3 set, then do not release register P1+ii. |
| 8677 | ** In other words, P3 is a mask of registers to preserve. |
| 8678 | ** |
| 8679 | ** Releasing a register clears the Mem.pScopyFrom pointer. That means |
| 8680 | ** that if the content of the released register was set using OP_SCopy, |
| 8681 | ** a change to the value of the source register for the OP_SCopy will no longer |
| 8682 | ** generate an assertion fault in sqlite3VdbeMemAboutToChange(). |
| 8683 | ** |
drh | 3aef2fb | 2020-01-02 17:46:02 +0000 | [diff] [blame] | 8684 | ** If P5 is set, then all released registers have their type set |
| 8685 | ** to MEM_Undefined so that any subsequent attempt to read the released |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 8686 | ** register (before it is reinitialized) will generate an assertion fault. |
drh | 3aef2fb | 2020-01-02 17:46:02 +0000 | [diff] [blame] | 8687 | ** |
| 8688 | ** P5 ought to be set on every call to this opcode. |
| 8689 | ** However, there are places in the code generator will release registers |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 8690 | ** before their are used, under the (valid) assumption that the registers |
| 8691 | ** will not be reallocated for some other purpose before they are used and |
| 8692 | ** hence are safe to release. |
| 8693 | ** |
| 8694 | ** This opcode is only available in testing and debugging builds. It is |
| 8695 | ** not generated for release builds. The purpose of this opcode is to help |
| 8696 | ** validate the generated bytecode. This opcode does not actually contribute |
| 8697 | ** to computing an answer. |
| 8698 | */ |
| 8699 | case OP_ReleaseReg: { |
| 8700 | Mem *pMem; |
| 8701 | int i; |
| 8702 | u32 constMask; |
| 8703 | assert( pOp->p1>0 ); |
| 8704 | assert( pOp->p1+pOp->p2<=(p->nMem+1 - p->nCursor)+1 ); |
| 8705 | pMem = &aMem[pOp->p1]; |
| 8706 | constMask = pOp->p3; |
| 8707 | for(i=0; i<pOp->p2; i++, pMem++){ |
drh | 7edce5e | 2019-12-23 13:24:34 +0000 | [diff] [blame] | 8708 | if( i>=32 || (constMask & MASKBIT32(i))==0 ){ |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 8709 | pMem->pScopyFrom = 0; |
drh | 3aef2fb | 2020-01-02 17:46:02 +0000 | [diff] [blame] | 8710 | if( i<32 && pOp->p5 ) MemSetTypeFlag(pMem, MEM_Undefined); |
drh | 13d7950 | 2019-12-23 02:18:49 +0000 | [diff] [blame] | 8711 | } |
| 8712 | } |
| 8713 | break; |
| 8714 | } |
| 8715 | #endif |
| 8716 | |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 8717 | /* Opcode: Noop * * * * * |
| 8718 | ** |
| 8719 | ** Do nothing. This instruction is often useful as a jump |
| 8720 | ** destination. |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 8721 | */ |
drh | 91fd4d4 | 2008-01-19 20:11:25 +0000 | [diff] [blame] | 8722 | /* |
| 8723 | ** The magic Explain opcode are only inserted when explain==2 (which |
| 8724 | ** is to say when the EXPLAIN QUERY PLAN syntax is used.) |
| 8725 | ** This opcode records information from the optimizer. It is the |
| 8726 | ** the same as a no-op. This opcodesnever appears in a real VM program. |
| 8727 | */ |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 8728 | default: { /* This is really OP_Noop, OP_Explain */ |
drh | 13573c7 | 2010-01-12 17:04:07 +0000 | [diff] [blame] | 8729 | assert( pOp->opcode==OP_Noop || pOp->opcode==OP_Explain ); |
drh | 4031baf | 2018-05-28 17:31:20 +0000 | [diff] [blame] | 8730 | |
drh | 5e00f6c | 2001-09-13 13:46:56 +0000 | [diff] [blame] | 8731 | break; |
| 8732 | } |
| 8733 | |
| 8734 | /***************************************************************************** |
| 8735 | ** The cases of the switch statement above this line should all be indented |
| 8736 | ** by 6 spaces. But the left-most 6 spaces have been removed to improve the |
| 8737 | ** readability. From this point on down, the normal indentation rules are |
| 8738 | ** restored. |
| 8739 | *****************************************************************************/ |
| 8740 | } |
drh | 6e142f5 | 2000-06-08 13:36:40 +0000 | [diff] [blame] | 8741 | |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 8742 | #if defined(VDBE_PROFILE) |
dan | 7f4b066 | 2022-12-07 20:09:54 +0000 | [diff] [blame] | 8743 | *pnCycle += sqlite3NProfileCnt ? sqlite3NProfileCnt : sqlite3Hwtime(); |
| 8744 | pnCycle = 0; |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 8745 | #elif defined(SQLITE_ENABLE_STMT_SCANSTATUS) |
dan | 7f4b066 | 2022-12-07 20:09:54 +0000 | [diff] [blame] | 8746 | *pnCycle += sqlite3Hwtime(); |
| 8747 | pnCycle = 0; |
drh | 7b39686 | 2003-01-01 23:06:20 +0000 | [diff] [blame] | 8748 | #endif |
| 8749 | |
drh | 6e142f5 | 2000-06-08 13:36:40 +0000 | [diff] [blame] | 8750 | /* The following code adds nothing to the actual functionality |
| 8751 | ** of the program. It is only here for testing and debugging. |
| 8752 | ** On the other hand, it does burn CPU cycles every time through |
| 8753 | ** the evaluator loop. So we can leave it out when NDEBUG is defined. |
| 8754 | */ |
| 8755 | #ifndef NDEBUG |
drh | 6dc4148 | 2015-04-16 17:31:02 +0000 | [diff] [blame] | 8756 | assert( pOp>=&aOp[-1] && pOp<&aOp[p->nOp-1] ); |
drh | ae7e151 | 2007-05-02 16:51:59 +0000 | [diff] [blame] | 8757 | |
drh | cf1023c | 2007-05-08 20:59:49 +0000 | [diff] [blame] | 8758 | #ifdef SQLITE_DEBUG |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 8759 | if( db->flags & SQLITE_VdbeTrace ){ |
drh | 7cc84c2 | 2016-04-11 13:36:42 +0000 | [diff] [blame] | 8760 | u8 opProperty = sqlite3OpcodeProperty[pOrigOp->opcode]; |
drh | 84e55a8 | 2013-11-13 17:58:23 +0000 | [diff] [blame] | 8761 | if( rc!=0 ) printf("rc=%d\n",rc); |
drh | 7cc84c2 | 2016-04-11 13:36:42 +0000 | [diff] [blame] | 8762 | if( opProperty & (OPFLG_OUT2) ){ |
drh | 6dc4148 | 2015-04-16 17:31:02 +0000 | [diff] [blame] | 8763 | registerTrace(pOrigOp->p2, &aMem[pOrigOp->p2]); |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 8764 | } |
drh | 7cc84c2 | 2016-04-11 13:36:42 +0000 | [diff] [blame] | 8765 | if( opProperty & OPFLG_OUT3 ){ |
drh | 6dc4148 | 2015-04-16 17:31:02 +0000 | [diff] [blame] | 8766 | registerTrace(pOrigOp->p3, &aMem[pOrigOp->p3]); |
drh | 5b6afba | 2008-01-05 16:29:28 +0000 | [diff] [blame] | 8767 | } |
drh | 17aceeb | 2020-01-04 19:12:13 +0000 | [diff] [blame] | 8768 | if( opProperty==0xff ){ |
| 8769 | /* Never happens. This code exists to avoid a harmless linkage |
| 8770 | ** warning aboud sqlite3VdbeRegisterDump() being defined but not |
| 8771 | ** used. */ |
| 8772 | sqlite3VdbeRegisterDump(p); |
| 8773 | } |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 8774 | } |
danielk1977 | b5402fb | 2005-01-12 07:15:04 +0000 | [diff] [blame] | 8775 | #endif /* SQLITE_DEBUG */ |
| 8776 | #endif /* NDEBUG */ |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 8777 | } /* The end of the for(;;) loop the loops through opcodes */ |
drh | 7589723 | 2000-05-29 14:26:00 +0000 | [diff] [blame] | 8778 | |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 8779 | /* If we reach this point, it means that execution is finished with |
| 8780 | ** an error of some kind. |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 8781 | */ |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8782 | abort_due_to_error: |
drh | f56a4bf | 2020-11-18 21:50:05 +0000 | [diff] [blame] | 8783 | if( db->mallocFailed ){ |
| 8784 | rc = SQLITE_NOMEM_BKPT; |
| 8785 | }else if( rc==SQLITE_IOERR_CORRUPTFS ){ |
| 8786 | rc = SQLITE_CORRUPT_BKPT; |
| 8787 | } |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 8788 | assert( rc ); |
drh | 11eb9c6 | 2021-09-16 12:33:53 +0000 | [diff] [blame] | 8789 | #ifdef SQLITE_DEBUG |
| 8790 | if( db->flags & SQLITE_VdbeTrace ){ |
drh | 5b001cc | 2021-11-15 13:22:42 +0000 | [diff] [blame] | 8791 | const char *zTrace = p->zSql; |
| 8792 | if( zTrace==0 ){ |
| 8793 | if( aOp[0].opcode==OP_Trace ){ |
| 8794 | zTrace = aOp[0].p4.z; |
| 8795 | } |
| 8796 | if( zTrace==0 ) zTrace = "???"; |
| 8797 | } |
| 8798 | printf("ABORT-due-to-error (rc=%d): %s\n", rc, zTrace); |
drh | 11eb9c6 | 2021-09-16 12:33:53 +0000 | [diff] [blame] | 8799 | } |
| 8800 | #endif |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8801 | if( p->zErrMsg==0 && rc!=SQLITE_IOERR_NOMEM ){ |
| 8802 | sqlite3VdbeError(p, "%s", sqlite3ErrStr(rc)); |
| 8803 | } |
drh | a05a722 | 2008-01-19 03:35:58 +0000 | [diff] [blame] | 8804 | p->rc = rc; |
drh | f68521c | 2016-03-21 12:28:02 +0000 | [diff] [blame] | 8805 | sqlite3SystemError(db, rc); |
drh | a64fa91 | 2010-03-04 00:53:32 +0000 | [diff] [blame] | 8806 | testcase( sqlite3GlobalConfig.xLog!=0 ); |
| 8807 | sqlite3_log(rc, "statement aborts at %d: [%s] %s", |
drh | f56fa46 | 2015-04-13 21:39:54 +0000 | [diff] [blame] | 8808 | (int)(pOp - aOp), p->zSql, p->zErrMsg); |
drh | 8703edd | 2022-04-03 22:35:13 +0000 | [diff] [blame] | 8809 | if( p->eVdbeState==VDBE_RUN_STATE ) sqlite3VdbeHalt(p); |
drh | 4a642b6 | 2016-02-05 01:55:27 +0000 | [diff] [blame] | 8810 | if( rc==SQLITE_IOERR_NOMEM ) sqlite3OomFault(db); |
drh | 46c425b | 2021-11-10 10:59:10 +0000 | [diff] [blame] | 8811 | if( rc==SQLITE_CORRUPT && db->autoCommit==0 ){ |
| 8812 | db->flags |= SQLITE_CorruptRdOnly; |
| 8813 | } |
danielk1977 | 7eaabcd | 2008-07-07 14:56:56 +0000 | [diff] [blame] | 8814 | rc = SQLITE_ERROR; |
drh | cdf011d | 2011-04-04 21:25:28 +0000 | [diff] [blame] | 8815 | if( resetSchemaOnFault>0 ){ |
drh | 81028a4 | 2012-05-15 18:28:27 +0000 | [diff] [blame] | 8816 | sqlite3ResetOneSchema(db, resetSchemaOnFault-1); |
drh | bdaec52 | 2011-04-04 00:14:43 +0000 | [diff] [blame] | 8817 | } |
drh | 900b31e | 2007-08-28 02:27:51 +0000 | [diff] [blame] | 8818 | |
| 8819 | /* This is the only way out of this procedure. We have to |
| 8820 | ** release the mutexes on btrees that were acquired at the |
| 8821 | ** top. */ |
| 8822 | vdbe_return: |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 8823 | #if defined(VDBE_PROFILE) |
dan | 7f4b066 | 2022-12-07 20:09:54 +0000 | [diff] [blame] | 8824 | if( pnCycle ){ |
| 8825 | *pnCycle += sqlite3NProfileCnt ? sqlite3NProfileCnt : sqlite3Hwtime(); |
| 8826 | pnCycle = 0; |
| 8827 | } |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 8828 | #elif defined(SQLITE_ENABLE_STMT_SCANSTATUS) |
dan | a3d0c15 | 2022-12-05 18:19:56 +0000 | [diff] [blame] | 8829 | if( pnCycle ){ |
| 8830 | *pnCycle += sqlite3Hwtime(); |
| 8831 | pnCycle = 0; |
| 8832 | } |
dan | 231ff4b | 2022-12-02 20:32:22 +0000 | [diff] [blame] | 8833 | #endif |
| 8834 | |
drh | c332e04 | 2019-02-12 21:04:33 +0000 | [diff] [blame] | 8835 | #ifndef SQLITE_OMIT_PROGRESS_CALLBACK |
drh | b1af9c6 | 2019-02-20 13:55:45 +0000 | [diff] [blame] | 8836 | while( nVmStep>=nProgressLimit && db->xProgress!=0 ){ |
| 8837 | nProgressLimit += db->nProgressOps; |
drh | c332e04 | 2019-02-12 21:04:33 +0000 | [diff] [blame] | 8838 | if( db->xProgress(db->pProgressArg) ){ |
drh | d1d8914 | 2020-07-06 12:13:05 +0000 | [diff] [blame] | 8839 | nProgressLimit = LARGEST_UINT64; |
drh | c332e04 | 2019-02-12 21:04:33 +0000 | [diff] [blame] | 8840 | rc = SQLITE_INTERRUPT; |
| 8841 | goto abort_due_to_error; |
| 8842 | } |
| 8843 | } |
| 8844 | #endif |
drh | 9b47ee3 | 2013-08-20 03:13:51 +0000 | [diff] [blame] | 8845 | p->aCounter[SQLITE_STMTSTATUS_VM_STEP] += (int)nVmStep; |
drh | de5f3af | 2022-12-23 11:46:57 +0000 | [diff] [blame] | 8846 | if( DbMaskNonZero(p->lockMask) ){ |
| 8847 | sqlite3VdbeLeave(p); |
| 8848 | } |
dan | 83f0ab8 | 2016-01-29 18:04:31 +0000 | [diff] [blame] | 8849 | assert( rc!=SQLITE_OK || nExtraDelete==0 |
| 8850 | || sqlite3_strlike("DELETE%",p->zSql,0)!=0 |
| 8851 | ); |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 8852 | return rc; |
| 8853 | |
drh | 023ae03 | 2007-05-08 12:12:16 +0000 | [diff] [blame] | 8854 | /* Jump to here if a string or blob larger than SQLITE_MAX_LENGTH |
| 8855 | ** is encountered. |
| 8856 | */ |
| 8857 | too_big: |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 8858 | sqlite3VdbeError(p, "string or blob too big"); |
drh | 023ae03 | 2007-05-08 12:12:16 +0000 | [diff] [blame] | 8859 | rc = SQLITE_TOOBIG; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8860 | goto abort_due_to_error; |
drh | 023ae03 | 2007-05-08 12:12:16 +0000 | [diff] [blame] | 8861 | |
drh | 98640a3 | 2007-06-07 19:08:32 +0000 | [diff] [blame] | 8862 | /* Jump to here if a malloc() fails. |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 8863 | */ |
| 8864 | no_mem: |
drh | 4a642b6 | 2016-02-05 01:55:27 +0000 | [diff] [blame] | 8865 | sqlite3OomFault(db); |
drh | 22c17b8 | 2015-05-15 04:13:15 +0000 | [diff] [blame] | 8866 | sqlite3VdbeError(p, "out of memory"); |
mistachkin | fad3039 | 2016-02-13 23:43:46 +0000 | [diff] [blame] | 8867 | rc = SQLITE_NOMEM_BKPT; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8868 | goto abort_due_to_error; |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 8869 | |
danielk1977 | 6f8a503 | 2004-05-10 10:34:51 +0000 | [diff] [blame] | 8870 | /* Jump to here if the sqlite3_interrupt() API sets the interrupt |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 8871 | ** flag. |
| 8872 | */ |
| 8873 | abort_due_to_interrupt: |
dan | 892edb6 | 2020-03-30 13:35:05 +0000 | [diff] [blame] | 8874 | assert( AtomicLoad(&db->u1.isInterrupted) ); |
drh | 56f1873 | 2020-06-03 15:59:22 +0000 | [diff] [blame] | 8875 | rc = SQLITE_INTERRUPT; |
drh | 9467abf | 2016-02-17 18:44:11 +0000 | [diff] [blame] | 8876 | goto abort_due_to_error; |
drh | b86ccfb | 2003-01-28 23:13:10 +0000 | [diff] [blame] | 8877 | } |