| 1 | /*------------------------------------------------------------------------- |
| 2 | * |
| 3 | * levenshtein.c |
| 4 | * Levenshtein distance implementation. |
| 5 | * |
| 6 | * Original author: Joe Conway <mail@joeconway.com> |
| 7 | * |
| 8 | * This file is included by varlena.c twice, to provide matching code for (1) |
| 9 | * Levenshtein distance with custom costings, and (2) Levenshtein distance with |
| 10 | * custom costings and a "max" value above which exact distances are not |
| 11 | * interesting. Before the inclusion, we rely on the presence of the inline |
| 12 | * function rest_of_char_same(). |
| 13 | * |
| 14 | * Written based on a description of the algorithm by Michael Gilleland found |
| 15 | * at http://www.merriampark.com/ld.htm. Also looked at levenshtein.c in the |
| 16 | * PHP 4.0.6 distribution for inspiration. Configurable penalty costs |
| 17 | * extension is introduced by Volkan YAZICI <volkan.yazici@gmail.com. |
| 18 | * |
| 19 | * Copyright (c) 2001-2019, PostgreSQL Global Development Group |
| 20 | * |
| 21 | * IDENTIFICATION |
| 22 | * src/backend/utils/adt/levenshtein.c |
| 23 | * |
| 24 | *------------------------------------------------------------------------- |
| 25 | */ |
| 26 | #define MAX_LEVENSHTEIN_STRLEN 255 |
| 27 | |
| 28 | /* |
| 29 | * Calculates Levenshtein distance metric between supplied strings, which are |
| 30 | * not necessarily null-terminated. |
| 31 | * |
| 32 | * source: source string, of length slen bytes. |
| 33 | * target: target string, of length tlen bytes. |
| 34 | * ins_c, del_c, sub_c: costs to charge for character insertion, deletion, |
| 35 | * and substitution respectively; (1, 1, 1) costs suffice for common |
| 36 | * cases, but your mileage may vary. |
| 37 | * max_d: if provided and >= 0, maximum distance we care about; see below. |
| 38 | * trusted: caller is trusted and need not obey MAX_LEVENSHTEIN_STRLEN. |
| 39 | * |
| 40 | * One way to compute Levenshtein distance is to incrementally construct |
| 41 | * an (m+1)x(n+1) matrix where cell (i, j) represents the minimum number |
| 42 | * of operations required to transform the first i characters of s into |
| 43 | * the first j characters of t. The last column of the final row is the |
| 44 | * answer. |
| 45 | * |
| 46 | * We use that algorithm here with some modification. In lieu of holding |
| 47 | * the entire array in memory at once, we'll just use two arrays of size |
| 48 | * m+1 for storing accumulated values. At each step one array represents |
| 49 | * the "previous" row and one is the "current" row of the notional large |
| 50 | * array. |
| 51 | * |
| 52 | * If max_d >= 0, we only need to provide an accurate answer when that answer |
| 53 | * is less than or equal to max_d. From any cell in the matrix, there is |
| 54 | * theoretical "minimum residual distance" from that cell to the last column |
| 55 | * of the final row. This minimum residual distance is zero when the |
| 56 | * untransformed portions of the strings are of equal length (because we might |
| 57 | * get lucky and find all the remaining characters matching) and is otherwise |
| 58 | * based on the minimum number of insertions or deletions needed to make them |
| 59 | * equal length. The residual distance grows as we move toward the upper |
| 60 | * right or lower left corners of the matrix. When the max_d bound is |
| 61 | * usefully tight, we can use this property to avoid computing the entirety |
| 62 | * of each row; instead, we maintain a start_column and stop_column that |
| 63 | * identify the portion of the matrix close to the diagonal which can still |
| 64 | * affect the final answer. |
| 65 | */ |
| 66 | int |
| 67 | #ifdef LEVENSHTEIN_LESS_EQUAL |
| 68 | varstr_levenshtein_less_equal(const char *source, int slen, |
| 69 | const char *target, int tlen, |
| 70 | int ins_c, int del_c, int sub_c, |
| 71 | int max_d, bool trusted) |
| 72 | #else |
| 73 | varstr_levenshtein(const char *source, int slen, |
| 74 | const char *target, int tlen, |
| 75 | int ins_c, int del_c, int sub_c, |
| 76 | bool trusted) |
| 77 | #endif |
| 78 | { |
| 79 | int m, |
| 80 | n; |
| 81 | int *prev; |
| 82 | int *curr; |
| 83 | int *s_char_len = NULL; |
| 84 | int i, |
| 85 | j; |
| 86 | const char *y; |
| 87 | |
| 88 | /* |
| 89 | * For varstr_levenshtein_less_equal, we have real variables called |
| 90 | * start_column and stop_column; otherwise it's just short-hand for 0 and |
| 91 | * m. |
| 92 | */ |
| 93 | #ifdef LEVENSHTEIN_LESS_EQUAL |
| 94 | int start_column, |
| 95 | stop_column; |
| 96 | |
| 97 | #undef START_COLUMN |
| 98 | #undef STOP_COLUMN |
| 99 | #define START_COLUMN start_column |
| 100 | #define STOP_COLUMN stop_column |
| 101 | #else |
| 102 | #undef START_COLUMN |
| 103 | #undef STOP_COLUMN |
| 104 | #define START_COLUMN 0 |
| 105 | #define STOP_COLUMN m |
| 106 | #endif |
| 107 | |
| 108 | /* Convert string lengths (in bytes) to lengths in characters */ |
| 109 | m = pg_mbstrlen_with_len(source, slen); |
| 110 | n = pg_mbstrlen_with_len(target, tlen); |
| 111 | |
| 112 | /* |
| 113 | * We can transform an empty s into t with n insertions, or a non-empty t |
| 114 | * into an empty s with m deletions. |
| 115 | */ |
| 116 | if (!m) |
| 117 | return n * ins_c; |
| 118 | if (!n) |
| 119 | return m * del_c; |
| 120 | |
| 121 | /* |
| 122 | * For security concerns, restrict excessive CPU+RAM usage. (This |
| 123 | * implementation uses O(m) memory and has O(mn) complexity.) If |
| 124 | * "trusted" is true, caller is responsible for not making excessive |
| 125 | * requests, typically by using a small max_d along with strings that are |
| 126 | * bounded, though not necessarily to MAX_LEVENSHTEIN_STRLEN exactly. |
| 127 | */ |
| 128 | if (!trusted && |
| 129 | (m > MAX_LEVENSHTEIN_STRLEN || |
| 130 | n > MAX_LEVENSHTEIN_STRLEN)) |
| 131 | ereport(ERROR, |
| 132 | (errcode(ERRCODE_INVALID_PARAMETER_VALUE), |
| 133 | errmsg("levenshtein argument exceeds maximum length of %d characters" , |
| 134 | MAX_LEVENSHTEIN_STRLEN))); |
| 135 | |
| 136 | #ifdef LEVENSHTEIN_LESS_EQUAL |
| 137 | /* Initialize start and stop columns. */ |
| 138 | start_column = 0; |
| 139 | stop_column = m + 1; |
| 140 | |
| 141 | /* |
| 142 | * If max_d >= 0, determine whether the bound is impossibly tight. If so, |
| 143 | * return max_d + 1 immediately. Otherwise, determine whether it's tight |
| 144 | * enough to limit the computation we must perform. If so, figure out |
| 145 | * initial stop column. |
| 146 | */ |
| 147 | if (max_d >= 0) |
| 148 | { |
| 149 | int min_theo_d; /* Theoretical minimum distance. */ |
| 150 | int max_theo_d; /* Theoretical maximum distance. */ |
| 151 | int net_inserts = n - m; |
| 152 | |
| 153 | min_theo_d = net_inserts < 0 ? |
| 154 | -net_inserts * del_c : net_inserts * ins_c; |
| 155 | if (min_theo_d > max_d) |
| 156 | return max_d + 1; |
| 157 | if (ins_c + del_c < sub_c) |
| 158 | sub_c = ins_c + del_c; |
| 159 | max_theo_d = min_theo_d + sub_c * Min(m, n); |
| 160 | if (max_d >= max_theo_d) |
| 161 | max_d = -1; |
| 162 | else if (ins_c + del_c > 0) |
| 163 | { |
| 164 | /* |
| 165 | * Figure out how much of the first row of the notional matrix we |
| 166 | * need to fill in. If the string is growing, the theoretical |
| 167 | * minimum distance already incorporates the cost of deleting the |
| 168 | * number of characters necessary to make the two strings equal in |
| 169 | * length. Each additional deletion forces another insertion, so |
| 170 | * the best-case total cost increases by ins_c + del_c. If the |
| 171 | * string is shrinking, the minimum theoretical cost assumes no |
| 172 | * excess deletions; that is, we're starting no further right than |
| 173 | * column n - m. If we do start further right, the best-case |
| 174 | * total cost increases by ins_c + del_c for each move right. |
| 175 | */ |
| 176 | int slack_d = max_d - min_theo_d; |
| 177 | int best_column = net_inserts < 0 ? -net_inserts : 0; |
| 178 | |
| 179 | stop_column = best_column + (slack_d / (ins_c + del_c)) + 1; |
| 180 | if (stop_column > m) |
| 181 | stop_column = m + 1; |
| 182 | } |
| 183 | } |
| 184 | #endif |
| 185 | |
| 186 | /* |
| 187 | * In order to avoid calling pg_mblen() repeatedly on each character in s, |
| 188 | * we cache all the lengths before starting the main loop -- but if all |
| 189 | * the characters in both strings are single byte, then we skip this and |
| 190 | * use a fast-path in the main loop. If only one string contains |
| 191 | * multi-byte characters, we still build the array, so that the fast-path |
| 192 | * needn't deal with the case where the array hasn't been initialized. |
| 193 | */ |
| 194 | if (m != slen || n != tlen) |
| 195 | { |
| 196 | int i; |
| 197 | const char *cp = source; |
| 198 | |
| 199 | s_char_len = (int *) palloc((m + 1) * sizeof(int)); |
| 200 | for (i = 0; i < m; ++i) |
| 201 | { |
| 202 | s_char_len[i] = pg_mblen(cp); |
| 203 | cp += s_char_len[i]; |
| 204 | } |
| 205 | s_char_len[i] = 0; |
| 206 | } |
| 207 | |
| 208 | /* One more cell for initialization column and row. */ |
| 209 | ++m; |
| 210 | ++n; |
| 211 | |
| 212 | /* Previous and current rows of notional array. */ |
| 213 | prev = (int *) palloc(2 * m * sizeof(int)); |
| 214 | curr = prev + m; |
| 215 | |
| 216 | /* |
| 217 | * To transform the first i characters of s into the first 0 characters of |
| 218 | * t, we must perform i deletions. |
| 219 | */ |
| 220 | for (i = START_COLUMN; i < STOP_COLUMN; i++) |
| 221 | prev[i] = i * del_c; |
| 222 | |
| 223 | /* Loop through rows of the notional array */ |
| 224 | for (y = target, j = 1; j < n; j++) |
| 225 | { |
| 226 | int *temp; |
| 227 | const char *x = source; |
| 228 | int y_char_len = n != tlen + 1 ? pg_mblen(y) : 1; |
| 229 | |
| 230 | #ifdef LEVENSHTEIN_LESS_EQUAL |
| 231 | |
| 232 | /* |
| 233 | * In the best case, values percolate down the diagonal unchanged, so |
| 234 | * we must increment stop_column unless it's already on the right end |
| 235 | * of the array. The inner loop will read prev[stop_column], so we |
| 236 | * have to initialize it even though it shouldn't affect the result. |
| 237 | */ |
| 238 | if (stop_column < m) |
| 239 | { |
| 240 | prev[stop_column] = max_d + 1; |
| 241 | ++stop_column; |
| 242 | } |
| 243 | |
| 244 | /* |
| 245 | * The main loop fills in curr, but curr[0] needs a special case: to |
| 246 | * transform the first 0 characters of s into the first j characters |
| 247 | * of t, we must perform j insertions. However, if start_column > 0, |
| 248 | * this special case does not apply. |
| 249 | */ |
| 250 | if (start_column == 0) |
| 251 | { |
| 252 | curr[0] = j * ins_c; |
| 253 | i = 1; |
| 254 | } |
| 255 | else |
| 256 | i = start_column; |
| 257 | #else |
| 258 | curr[0] = j * ins_c; |
| 259 | i = 1; |
| 260 | #endif |
| 261 | |
| 262 | /* |
| 263 | * This inner loop is critical to performance, so we include a |
| 264 | * fast-path to handle the (fairly common) case where no multibyte |
| 265 | * characters are in the mix. The fast-path is entitled to assume |
| 266 | * that if s_char_len is not initialized then BOTH strings contain |
| 267 | * only single-byte characters. |
| 268 | */ |
| 269 | if (s_char_len != NULL) |
| 270 | { |
| 271 | for (; i < STOP_COLUMN; i++) |
| 272 | { |
| 273 | int ins; |
| 274 | int del; |
| 275 | int sub; |
| 276 | int x_char_len = s_char_len[i - 1]; |
| 277 | |
| 278 | /* |
| 279 | * Calculate costs for insertion, deletion, and substitution. |
| 280 | * |
| 281 | * When calculating cost for substitution, we compare the last |
| 282 | * character of each possibly-multibyte character first, |
| 283 | * because that's enough to rule out most mis-matches. If we |
| 284 | * get past that test, then we compare the lengths and the |
| 285 | * remaining bytes. |
| 286 | */ |
| 287 | ins = prev[i] + ins_c; |
| 288 | del = curr[i - 1] + del_c; |
| 289 | if (x[x_char_len - 1] == y[y_char_len - 1] |
| 290 | && x_char_len == y_char_len && |
| 291 | (x_char_len == 1 || rest_of_char_same(x, y, x_char_len))) |
| 292 | sub = prev[i - 1]; |
| 293 | else |
| 294 | sub = prev[i - 1] + sub_c; |
| 295 | |
| 296 | /* Take the one with minimum cost. */ |
| 297 | curr[i] = Min(ins, del); |
| 298 | curr[i] = Min(curr[i], sub); |
| 299 | |
| 300 | /* Point to next character. */ |
| 301 | x += x_char_len; |
| 302 | } |
| 303 | } |
| 304 | else |
| 305 | { |
| 306 | for (; i < STOP_COLUMN; i++) |
| 307 | { |
| 308 | int ins; |
| 309 | int del; |
| 310 | int sub; |
| 311 | |
| 312 | /* Calculate costs for insertion, deletion, and substitution. */ |
| 313 | ins = prev[i] + ins_c; |
| 314 | del = curr[i - 1] + del_c; |
| 315 | sub = prev[i - 1] + ((*x == *y) ? 0 : sub_c); |
| 316 | |
| 317 | /* Take the one with minimum cost. */ |
| 318 | curr[i] = Min(ins, del); |
| 319 | curr[i] = Min(curr[i], sub); |
| 320 | |
| 321 | /* Point to next character. */ |
| 322 | x++; |
| 323 | } |
| 324 | } |
| 325 | |
| 326 | /* Swap current row with previous row. */ |
| 327 | temp = curr; |
| 328 | curr = prev; |
| 329 | prev = temp; |
| 330 | |
| 331 | /* Point to next character. */ |
| 332 | y += y_char_len; |
| 333 | |
| 334 | #ifdef LEVENSHTEIN_LESS_EQUAL |
| 335 | |
| 336 | /* |
| 337 | * This chunk of code represents a significant performance hit if used |
| 338 | * in the case where there is no max_d bound. This is probably not |
| 339 | * because the max_d >= 0 test itself is expensive, but rather because |
| 340 | * the possibility of needing to execute this code prevents tight |
| 341 | * optimization of the loop as a whole. |
| 342 | */ |
| 343 | if (max_d >= 0) |
| 344 | { |
| 345 | /* |
| 346 | * The "zero point" is the column of the current row where the |
| 347 | * remaining portions of the strings are of equal length. There |
| 348 | * are (n - 1) characters in the target string, of which j have |
| 349 | * been transformed. There are (m - 1) characters in the source |
| 350 | * string, so we want to find the value for zp where (n - 1) - j = |
| 351 | * (m - 1) - zp. |
| 352 | */ |
| 353 | int zp = j - (n - m); |
| 354 | |
| 355 | /* Check whether the stop column can slide left. */ |
| 356 | while (stop_column > 0) |
| 357 | { |
| 358 | int ii = stop_column - 1; |
| 359 | int net_inserts = ii - zp; |
| 360 | |
| 361 | if (prev[ii] + (net_inserts > 0 ? net_inserts * ins_c : |
| 362 | -net_inserts * del_c) <= max_d) |
| 363 | break; |
| 364 | stop_column--; |
| 365 | } |
| 366 | |
| 367 | /* Check whether the start column can slide right. */ |
| 368 | while (start_column < stop_column) |
| 369 | { |
| 370 | int net_inserts = start_column - zp; |
| 371 | |
| 372 | if (prev[start_column] + |
| 373 | (net_inserts > 0 ? net_inserts * ins_c : |
| 374 | -net_inserts * del_c) <= max_d) |
| 375 | break; |
| 376 | |
| 377 | /* |
| 378 | * We'll never again update these values, so we must make sure |
| 379 | * there's nothing here that could confuse any future |
| 380 | * iteration of the outer loop. |
| 381 | */ |
| 382 | prev[start_column] = max_d + 1; |
| 383 | curr[start_column] = max_d + 1; |
| 384 | if (start_column != 0) |
| 385 | source += (s_char_len != NULL) ? s_char_len[start_column - 1] : 1; |
| 386 | start_column++; |
| 387 | } |
| 388 | |
| 389 | /* If they cross, we're going to exceed the bound. */ |
| 390 | if (start_column >= stop_column) |
| 391 | return max_d + 1; |
| 392 | } |
| 393 | #endif |
| 394 | } |
| 395 | |
| 396 | /* |
| 397 | * Because the final value was swapped from the previous row to the |
| 398 | * current row, that's where we'll find it. |
| 399 | */ |
| 400 | return prev[m - 1]; |
| 401 | } |
| 402 | |