Changeset: ecc1eefb4054 for MonetDB URL: https://dev.monetdb.org/hg/MonetDB?cmd=changeset;node=ecc1eefb4054 Modified Files: geom/monetdb5/geom.c monetdb5/extras/rapi/rapi.c monetdb5/mal/mal_atom.c monetdb5/mal/mal_authorize.c monetdb5/mal/mal_dataflow.c monetdb5/mal/mal_exception.c monetdb5/mal/mal_factory.c monetdb5/mal/mal_import.c monetdb5/mal/mal_instruction.c monetdb5/mal/mal_interpreter.c monetdb5/mal/mal_namespace.c monetdb5/mal/mal_parser.c monetdb5/mal/mal_session.c monetdb5/modules/atoms/batxml.c monetdb5/modules/atoms/blob.c monetdb5/modules/atoms/inet.c monetdb5/modules/atoms/json.c monetdb5/modules/atoms/mcurl.c monetdb5/modules/atoms/mtime.c monetdb5/modules/atoms/str.c monetdb5/modules/atoms/streams.c monetdb5/modules/atoms/url.c monetdb5/modules/atoms/uuid.c monetdb5/modules/atoms/xml.c monetdb5/modules/kernel/aggr.c monetdb5/modules/kernel/algebra.c monetdb5/modules/kernel/bat5.c monetdb5/modules/kernel/batcolor.c monetdb5/modules/kernel/batmmath.c monetdb5/modules/kernel/batstr.c monetdb5/modules/kernel/status.c monetdb5/modules/mal/batExtensions.c monetdb5/modules/mal/bbp.c monetdb5/modules/mal/calc.c monetdb5/modules/mal/clients.c monetdb5/modules/mal/groupby.c monetdb5/modules/mal/inspect.c monetdb5/modules/mal/iterator.c monetdb5/modules/mal/json_util.c monetdb5/modules/mal/language.c monetdb5/modules/mal/mal_io.c monetdb5/modules/mal/mal_mapi.c monetdb5/modules/mal/manifold.c monetdb5/modules/mal/manual.c monetdb5/modules/mal/mat.c monetdb5/modules/mal/mdb.c monetdb5/modules/mal/mkey.c monetdb5/modules/mal/oltp.c monetdb5/modules/mal/orderidx.c monetdb5/modules/mal/pcre.c monetdb5/modules/mal/projectionpath.c monetdb5/modules/mal/querylog.c monetdb5/modules/mal/remote.c monetdb5/modules/mal/sysmon.c monetdb5/modules/mal/tablet.c monetdb5/modules/mal/tokenizer.c monetdb5/modules/mal/txtsim.c monetdb5/optimizer/opt_aliases.c monetdb5/optimizer/opt_coercion.c monetdb5/optimizer/opt_commonTerms.c monetdb5/optimizer/opt_constants.c monetdb5/optimizer/opt_dataflow.c monetdb5/optimizer/opt_deadcode.c monetdb5/optimizer/opt_emptybind.c monetdb5/optimizer/opt_evaluate.c monetdb5/optimizer/opt_garbageCollector.c monetdb5/optimizer/opt_generator.c monetdb5/optimizer/opt_jit.c monetdb5/optimizer/opt_json.c monetdb5/optimizer/opt_macro.c monetdb5/optimizer/opt_matpack.c monetdb5/optimizer/opt_mergetable.c monetdb5/optimizer/opt_mitosis.c monetdb5/optimizer/opt_multiplex.c monetdb5/optimizer/opt_oltp.c monetdb5/optimizer/opt_pipes.c monetdb5/optimizer/opt_projectionpath.c monetdb5/optimizer/opt_pushselect.c monetdb5/optimizer/opt_querylog.c monetdb5/optimizer/opt_remap.c monetdb5/optimizer/opt_remoteQueries.c monetdb5/optimizer/opt_reorder.c monetdb5/optimizer/opt_volcano.c monetdb5/optimizer/opt_wlc.c monetdb5/optimizer/opt_wrapper.c monetdb5/scheduler/run_adder.c monetdb5/scheduler/run_memo.c sql/backends/monet5/LSST/lsst.c sql/backends/monet5/UDF/cudf/udf.c sql/backends/monet5/UDF/pyapi/connection.c sql/backends/monet5/UDF/pyapi/type_conversion.c sql/backends/monet5/generator/generator.c sql/backends/monet5/sql_cast_impl_down_from_flt.h sql/backends/monet5/sql_execute.c sql/backends/monet5/sql_fround_impl.h sql/backends/monet5/sql_rank.c sql/backends/monet5/sql_round_impl.h sql/backends/monet5/sql_statistics.c sql/backends/monet5/vaults/fits/fits.c sql/backends/monet5/vaults/netcdf/netcdf.c Branch: data-vaults Log Message:
Merge with default diffs (truncated from 5150 to 300 lines): diff --git a/geom/monetdb5/geom.c b/geom/monetdb5/geom.c --- a/geom/monetdb5/geom.c +++ b/geom/monetdb5/geom.c @@ -4624,7 +4624,7 @@ wkbBox2D(mbr **box, wkb **point1, wkb ** //Assign the coordinates. Ensure that they are in correct order *box = GDKmalloc(sizeof(mbr)); if (*box == NULL) { - err = createException(MAL, SQLSTATE(38000) "geom.MakeBox2D", MAL_MALLOC_FAIL); + err = createException(MAL, "geom.MakeBox2D", SQLSTATE(HY001) MAL_MALLOC_FAIL); } else { (*box)->xmin = (float) (xmin < xmax ? xmin : xmax); (*box)->ymin = (float) (ymin < ymax ? ymin : ymax); diff --git a/monetdb5/extras/rapi/rapi.c b/monetdb5/extras/rapi/rapi.c --- a/monetdb5/extras/rapi/rapi.c +++ b/monetdb5/extras/rapi/rapi.c @@ -268,7 +268,7 @@ str RAPIeval(Client cntxt, MalBlkPtr mb, args = (str*) GDKzalloc(sizeof(str) * pci->argc); if (args == NULL) { - throw(MAL, "rapi.eval", MAL_MALLOC_FAIL); + throw(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); } // get the lock even before initialization of the R interpreter, as this can take a second and must be done only once. @@ -312,21 +312,21 @@ str RAPIeval(Client cntxt, MalBlkPtr mb, if (!isaBatType(getArgType(mb,pci,i))) { b = COLnew(0, getArgType(mb, pci, i), 0, TRANSIENT); if (b == NULL) { - msg = createException(MAL, "rapi.eval", MAL_MALLOC_FAIL); + msg = createException(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); goto wrapup; } if ( getArgType(mb,pci,i) == TYPE_str) { if (BUNappend(b, *getArgReference_str(stk, pci, i), FALSE) != GDK_SUCCEED) { BBPreclaim(b); b = NULL; - msg = createException(MAL, "rapi.eval", MAL_MALLOC_FAIL); + msg = createException(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); goto wrapup; } } else { if (BUNappend(b, getArgReference(stk, pci, i), FALSE) != GDK_SUCCEED) { BBPreclaim(b); b = NULL; - msg = createException(MAL, "rapi.eval", MAL_MALLOC_FAIL); + msg = createException(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); goto wrapup; } } @@ -335,7 +335,7 @@ str RAPIeval(Client cntxt, MalBlkPtr mb, } else { b = BATdescriptor(*getArgReference_bat(stk, pci, i)); if (b == NULL) { - msg = createException(MAL, "rapi.eval", MAL_MALLOC_FAIL); + msg = createException(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); goto wrapup; } } @@ -369,7 +369,7 @@ str RAPIeval(Client cntxt, MalBlkPtr mb, pos = 0; argnames = malloc(argnameslen); if (argnames == NULL) { - msg = createException(MAL, "rapi.eval", MAL_MALLOC_FAIL); + msg = createException(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); goto wrapup; } argnames[0] = '\0'; @@ -380,7 +380,7 @@ str RAPIeval(Client cntxt, MalBlkPtr mb, rcalllen = 2 * pos + strlen(exprStr) + 100; rcall = malloc(rcalllen); if (rcall == NULL) { - msg = createException(MAL, "rapi.eval", MAL_MALLOC_FAIL); + msg = createException(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); goto wrapup; } snprintf(rcall, rcalllen, @@ -453,7 +453,7 @@ str RAPIeval(Client cntxt, MalBlkPtr mb, BATiter li = bat_iterator(b); if (VALinit(&stk->stk[pci->argv[i]], bat_type, BUNtail(li, 0)) == NULL) { // TODO BUNtail here - msg = createException(MAL, "rapi.eval", MAL_MALLOC_FAIL); + msg = createException(MAL, "rapi.eval", SQLSTATE(HY001) MAL_MALLOC_FAIL); goto wrapup; } } diff --git a/monetdb5/mal/mal_atom.c b/monetdb5/mal/mal_atom.c --- a/monetdb5/mal/mal_atom.c +++ b/monetdb5/mal/mal_atom.c @@ -183,7 +183,7 @@ malAtomDefinition(str name, int tpe) i = ATOMallocate(name); if (i == int_nil) - throw(TYPE,"atomDefinition", MAL_MALLOC_FAIL); + throw(TYPE,"atomDefinition", SQLSTATE(HY001) MAL_MALLOC_FAIL); /* overload atom ? */ if (tpe) { BATatoms[i] = BATatoms[tpe]; diff --git a/monetdb5/mal/mal_authorize.c b/monetdb5/mal/mal_authorize.c --- a/monetdb5/mal/mal_authorize.c +++ b/monetdb5/mal/mal_authorize.c @@ -172,7 +172,7 @@ AUTHinitTables(const char *passwd) { if (!bid) { user = COLnew(0, TYPE_str, 256, PERSISTENT); if (user == NULL) - throw(MAL, "initTables.user", MAL_MALLOC_FAIL " user table"); + throw(MAL, "initTables.user", SQLSTATE(HY001) MAL_MALLOC_FAIL " user table"); if (BATkey(user, TRUE) != GDK_SUCCEED || BBPrename(BBPcacheid(user), "M5system_auth_user") != 0 || @@ -194,7 +194,7 @@ AUTHinitTables(const char *passwd) { if (!bid) { pass = COLnew(0, TYPE_str, 256, PERSISTENT); if (pass == NULL) - throw(MAL, "initTables.passwd", MAL_MALLOC_FAIL " password table"); + throw(MAL, "initTables.passwd", SQLSTATE(HY001) MAL_MALLOC_FAIL " password table"); if (BBPrename(BBPcacheid(pass), "M5system_auth_passwd_v2") != 0 || BATmode(pass, PERSISTENT) != GDK_SUCCEED) { @@ -215,7 +215,7 @@ AUTHinitTables(const char *passwd) { if (!bid) { duser = COLnew(0, TYPE_oid, 256, PERSISTENT); if (duser == NULL) - throw(MAL, "initTables.duser", MAL_MALLOC_FAIL " deleted user table"); + throw(MAL, "initTables.duser", SQLSTATE(HY001) MAL_MALLOC_FAIL " deleted user table"); if (BBPrename(BBPcacheid(duser), "M5system_auth_deleted") != 0 || BATmode(duser, PERSISTENT) != GDK_SUCCEED) { @@ -345,7 +345,7 @@ AUTHaddUser(oid *uid, Client cntxt, cons if (BUNappend(user, username, TRUE) != GDK_SUCCEED || BUNappend(pass, hash, TRUE) != GDK_SUCCEED) { GDKfree(hash); - throw(MAL, "addUser", MAL_MALLOC_FAIL); + throw(MAL, "addUser", SQLSTATE(HY001) MAL_MALLOC_FAIL); } GDKfree(hash); /* retrieve the oid of the just inserted user */ @@ -388,7 +388,7 @@ AUTHremoveUser(Client cntxt, const char /* now, we got the oid, start removing the related tuples */ if (BUNappend(duser, &id, TRUE) != GDK_SUCCEED) - throw(MAL, "removeUser", MAL_MALLOC_FAIL); + throw(MAL, "removeUser", SQLSTATE(HY001) MAL_MALLOC_FAIL); /* make the stuff persistent */ AUTHcommit(); @@ -558,7 +558,7 @@ AUTHresolveUser(str *username, oid uid) assert(username != NULL); useri = bat_iterator(user); if ((*username = GDKstrdup((str)(BUNtail(useri, p)))) == NULL) - throw(MAL, "resolveUser", MAL_MALLOC_FAIL); + throw(MAL, "resolveUser", SQLSTATE(HY001) MAL_MALLOC_FAIL); return(MAL_SUCCEED); } @@ -583,7 +583,7 @@ AUTHgetUsername(str *username, Client cn useri = bat_iterator(user); if ((*username = GDKstrdup( BUNtail(useri, p))) == NULL) - throw(MAL, "getUsername", MAL_MALLOC_FAIL); + throw(MAL, "getUsername", SQLSTATE(HY001) MAL_MALLOC_FAIL); return(MAL_SUCCEED); } @@ -600,7 +600,7 @@ AUTHgetUsers(BAT **ret1, BAT **ret2, Cli *ret1 = BATdense(user->hseqbase, user->hseqbase, BATcount(user)); if (*ret1 == NULL) - throw(MAL, "getUsers", MAL_MALLOC_FAIL); + throw(MAL, "getUsers", SQLSTATE(HY001) MAL_MALLOC_FAIL); if (BATcount(duser)) { bn = BATdiff(*ret1, duser, NULL, NULL, 0, BUN_NONE); BBPunfix((*ret1)->batCacheid); @@ -614,7 +614,7 @@ AUTHgetUsers(BAT **ret1, BAT **ret2, Cli BBPunfix((*ret1)->batCacheid); if (*ret2) BBPunfix((*ret2)->batCacheid); - throw(MAL, "getUsers", MAL_MALLOC_FAIL); + throw(MAL, "getUsers", SQLSTATE(HY001) MAL_MALLOC_FAIL); } return(NULL); } @@ -675,7 +675,7 @@ AUTHunlockVault(const char *password) GDKfree(vaultKey); if ((vaultKey = GDKstrdup(password)) == NULL) - throw(MAL, "unlockVault", MAL_MALLOC_FAIL " vault key"); + throw(MAL, "unlockVault", SQLSTATE(HY001) MAL_MALLOC_FAIL " vault key"); return(MAL_SUCCEED); } @@ -712,7 +712,7 @@ AUTHdecypherValue(str *ret, const char * throw(MAL, "decypherValue", "The vault is still locked!"); w = r = GDKmalloc(sizeof(char) * (strlen(value) + 1)); if( r == NULL) - throw(MAL, "decypherValue", MAL_MALLOC_FAIL); + throw(MAL, "decypherValue", SQLSTATE(HY001) MAL_MALLOC_FAIL); keylen = (int) strlen(vaultKey); @@ -754,7 +754,7 @@ AUTHcypherValue(str *ret, const char *va throw(MAL, "cypherValue", "The vault is still locked!"); w = r = GDKmalloc(sizeof(char) * (strlen(value) * 2 + 1)); if( r == NULL) - throw(MAL, "cypherValue", MAL_MALLOC_FAIL); + throw(MAL, "cypherValue", SQLSTATE(HY001) MAL_MALLOC_FAIL); keylen = (int) strlen(vaultKey); diff --git a/monetdb5/mal/mal_dataflow.c b/monetdb5/mal/mal_dataflow.c --- a/monetdb5/mal/mal_dataflow.c +++ b/monetdb5/mal/mal_dataflow.c @@ -556,7 +556,7 @@ DFLOWinitBlk(DataFlow flow, MalBlkPtr mb PARDEBUG fprintf(stderr, "#Initialize dflow block\n"); assign = (int *) GDKzalloc(mb->vtop * sizeof(int)); if (assign == NULL) - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); etop = flow->stop - flow->start; for (n = 0, pc = flow->start; pc < flow->stop; pc++, n++) { p = getInstrPtr(mb, pc); @@ -595,13 +595,13 @@ DFLOWinitBlk(DataFlow flow, MalBlkPtr mb tmp = (int*) GDKrealloc(flow->nodes, sizeof(int) * 2 * size); if (tmp == NULL) { GDKfree(assign); - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); } flow->nodes = tmp; tmp = (int*) GDKrealloc(flow->edges, sizeof(int) * 2 * size); if (tmp == NULL) { GDKfree(assign); - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); } flow->edges = tmp; size *=2; @@ -639,13 +639,13 @@ DFLOWinitBlk(DataFlow flow, MalBlkPtr mb tmp = (int*) GDKrealloc(flow->nodes, sizeof(int) * 2 * size); if (tmp == NULL) { GDKfree(assign); - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); } flow->nodes = tmp; tmp = (int*) GDKrealloc(flow->edges, sizeof(int) * 2 * size); if (tmp == NULL) { GDKfree(assign); - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); } flow->edges = tmp; size *=2; @@ -904,7 +904,7 @@ runMALdataflow(Client cntxt, MalBlkPtr m flow = (DataFlow)GDKzalloc(sizeof(DataFlowRec)); if (flow == NULL) - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); flow->cntxt = cntxt; flow->mb = mb; @@ -928,7 +928,7 @@ runMALdataflow(Client cntxt, MalBlkPtr m q_destroy(flow->done); MT_lock_destroy(&flow->flowlock); GDKfree(flow); - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); } size = DFLOWgraphSize(mb, startpc, stoppc); size += stoppc - startpc; @@ -938,7 +938,7 @@ runMALdataflow(Client cntxt, MalBlkPtr m q_destroy(flow->done); MT_lock_destroy(&flow->flowlock); GDKfree(flow); - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); } flow->edges = (int*)GDKzalloc(sizeof(int) * size); if (flow->edges == NULL) { @@ -947,7 +947,7 @@ runMALdataflow(Client cntxt, MalBlkPtr m q_destroy(flow->done); MT_lock_destroy(&flow->flowlock); GDKfree(flow); - throw(MAL, "dataflow", MAL_MALLOC_FAIL); + throw(MAL, "dataflow", SQLSTATE(HY001) MAL_MALLOC_FAIL); } msg = DFLOWinitBlk(flow, mb, size); diff --git a/monetdb5/mal/mal_exception.c b/monetdb5/mal/mal_exception.c --- a/monetdb5/mal/mal_exception.c +++ b/monetdb5/mal/mal_exception.c @@ -96,7 +96,7 @@ createException(enum malexception type, if (GDKerrbuf && /* prevent recursion * note, sizeof("string") includes terminating NULL byte */ - strncmp(format, MAL_MALLOC_FAIL ":", sizeof(MAL_MALLOC_FAIL)) != 0 && + strncmp(format, SQLSTATE(HY001) MAL_MALLOC_FAIL ":", sizeof(MAL_MALLOC_FAIL)) != 0 && (strncmp(GDKerrbuf, "GDKmalloc", 9) == 0 || strncmp(GDKerrbuf, "GDKrealloc", 10) == 0 || strncmp(GDKerrbuf, "GDKzalloc", 9) == 0 || _______________________________________________ checkin-list mailing list checkin-list@monetdb.org https://www.monetdb.org/mailman/listinfo/checkin-list