Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(10)

Unified Diff: third_party/sqlite/sqlite-src-3080704/test/corrupt.test

Issue 2363173002: [sqlite] Remove obsolete reference version 3.8.7.4. (Closed)
Patch Set: Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/sqlite/sqlite-src-3080704/test/corrupt.test
diff --git a/third_party/sqlite/sqlite-src-3080704/test/corrupt.test b/third_party/sqlite/sqlite-src-3080704/test/corrupt.test
deleted file mode 100644
index 3e49a9ff189727ca6dfd22c5624526fa0402c3e0..0000000000000000000000000000000000000000
--- a/third_party/sqlite/sqlite-src-3080704/test/corrupt.test
+++ /dev/null
@@ -1,348 +0,0 @@
-# 2004 August 30 {}
-#
-# The author disclaims copyright to this source code. In place of
-# a legal notice, here is a blessing:
-#
-# May you do good and not evil.
-# May you find forgiveness for yourself and forgive others.
-# May you share freely, never taking more than you give.
-#
-#***********************************************************************
-# This file implements regression tests for SQLite library.
-#
-# This file implements tests to make sure SQLite does not crash or
-# segfault if it sees a corrupt database file.
-#
-# $Id: corrupt.test,v 1.12 2009/07/13 09:41:45 danielk1977 Exp $
-
-catch {forcedelete test.db test.db-journal test.bu}
-
-set testdir [file dirname $argv0]
-source $testdir/tester.tcl
-
-# Do not use a codec for tests in this file, as the database file is
-# manipulated directly using tcl scripts (using the [hexio_write] command).
-#
-do_not_use_codec
-
-# These tests deal with corrupt database files
-#
-database_may_be_corrupt
-
-# Construct a large database for testing.
-#
-do_test corrupt-1.1 {
- execsql {
- BEGIN;
- CREATE TABLE t1(x);
- INSERT INTO t1 VALUES(randstr(100,100));
- INSERT INTO t1 VALUES(randstr(90,90));
- INSERT INTO t1 VALUES(randstr(80,80));
- INSERT INTO t1 SELECT x || randstr(5,5) FROM t1;
- INSERT INTO t1 SELECT x || randstr(6,6) FROM t1;
- INSERT INTO t1 SELECT x || randstr(7,7) FROM t1;
- INSERT INTO t1 SELECT x || randstr(8,8) FROM t1;
- INSERT INTO t1 VALUES(randstr(3000,3000));
- INSERT INTO t1 SELECT x || randstr(9,9) FROM t1;
- INSERT INTO t1 SELECT x || randstr(10,10) FROM t1;
- INSERT INTO t1 SELECT x || randstr(11,11) FROM t1;
- INSERT INTO t1 SELECT x || randstr(12,12) FROM t1;
- CREATE INDEX t1i1 ON t1(x);
- CREATE TABLE t2 AS SELECT * FROM t1;
- DELETE FROM t2 WHERE rowid%5!=0;
- COMMIT;
- }
-} {}
-integrity_check corrupt-1.2
-
-# Setup for the tests. Make a backup copy of the good database in test.bu.
-# Create a string of garbage data that is 256 bytes long.
-#
-forcecopy test.db test.bu
-set fsize [file size test.db]
-set junk "abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
-while {[string length $junk]<256} {append junk $junk}
-set junk [string range $junk 0 255]
-
-# Go through the database and write garbage data into each 256 segment
-# of the file. Then do various operations on the file to make sure that
-# the database engine can recover gracefully from the corruption.
-#
-for {set i [expr {1*256}]} {$i<$fsize-256} {incr i 256} {
- set tn [expr {$i/256}]
- db close
- forcecopy test.bu test.db
- set fd [open test.db r+]
- fconfigure $fd -translation binary
- seek $fd $i
- puts -nonewline $fd $junk
- close $fd
- do_test corrupt-2.$tn.1 {
- sqlite3 db test.db
- catchsql {SELECT count(*) FROM sqlite_master}
- set x {}
- } {}
- do_test corrupt-2.$tn.2 {
- catchsql {SELECT count(*) FROM t1}
- set x {}
- } {}
- do_test corrupt-2.$tn.3 {
- catchsql {SELECT count(*) FROM t1 WHERE x>'abcdef'}
- set x {}
- } {}
- do_test corrupt-2.$tn.4 {
- catchsql {SELECT count(*) FROM t2}
- set x {}
- } {}
- do_test corrupt-2.$tn.5 {
- catchsql {CREATE TABLE t3 AS SELECT * FROM t1}
- set x {}
- } {}
- do_test corrupt-2.$tn.6 {
- catchsql {DROP TABLE t1}
- set x {}
- } {}
- do_test corrupt-2.$tn.7 {
- catchsql {PRAGMA integrity_check}
- set x {}
- } {}
-
- # Check that no page references were leaked.
- do_test corrupt-2.$tn.8 {
- set bt [btree_from_db db]
- db_enter db
- array set stats [btree_pager_stats $bt]
- db_leave db
- set stats(ref)
- } {0}
-}
-
-#------------------------------------------------------------------------
-# For these tests, swap the rootpage entries of t1 (a table) and t1i1 (an
-# index on t1) in sqlite_master. Then perform a few different queries
-# and make sure this is detected as corruption.
-#
-do_test corrupt-3.1 {
- db close
- forcecopy test.bu test.db
- sqlite3 db test.db
- list
-} {}
-do_test corrupt-3.2 {
- set t1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1i1'}]
- set t1i1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
- set cookie [expr [execsql {PRAGMA schema_version}] + 1]
- execsql "
- PRAGMA writable_schema = 1;
- UPDATE sqlite_master SET rootpage = $t1_r WHERE name = 't1';
- UPDATE sqlite_master SET rootpage = $t1i1_r WHERE name = 't1i1';
- PRAGMA writable_schema = 0;
- PRAGMA schema_version = $cookie;
- "
-} {}
-
-# This one tests the case caught by code in checkin [2313].
-do_test corrupt-3.3 {
- db close
- sqlite3 db test.db
- catchsql {
- INSERT INTO t1 VALUES('abc');
- }
-} {1 {database disk image is malformed}}
-do_test corrupt-3.4 {
- db close
- sqlite3 db test.db
- catchsql {
- SELECT * FROM t1;
- }
-} {1 {database disk image is malformed}}
-do_test corrupt-3.5 {
- db close
- sqlite3 db test.db
- catchsql {
- SELECT * FROM t1 WHERE oid = 10;
- }
-} {1 {database disk image is malformed}}
-do_test corrupt-3.6 {
- db close
- sqlite3 db test.db
- catchsql {
- SELECT * FROM t1 WHERE x = 'abcde';
- }
-} {1 {database disk image is malformed}}
-
-do_test corrupt-4.1 {
- db close
- forcedelete test.db test.db-journal
- sqlite3 db test.db
- execsql {
- PRAGMA page_size = 1024;
- CREATE TABLE t1(a INTEGER PRIMARY KEY, b TEXT);
- }
- for {set i 0} {$i < 10} {incr i} {
- set text [string repeat $i 220]
- execsql { INSERT INTO t1 VALUES($i, $text) }
- }
- execsql { CREATE INDEX i1 ON t1(b) }
-} {}
-do_test corrupt-4.2 {
- set iRoot [db one {SELECT rootpage FROM sqlite_master WHERE name = 'i1'}]
- set iOffset [hexio_get_int [hexio_read test.db [expr 12+($iRoot-1)*1024] 2]]
- set data [hexio_render_int32 [expr $iRoot - 1]]
- hexio_write test.db [expr ($iRoot-1)*1024 + $iOffset] $data
- db close
- sqlite3 db test.db
-
- # The following DELETE statement attempts to delete a cell stored on the
- # root page of index i1. After this cell is deleted it must be replaced
- # by a cell retrieved from the child page (a leaf) of the deleted cell.
- # This will fail, as the block modified the database image so that the
- # child page of the deleted cell is from a table (intkey) b-tree, not an
- # index b-tree as expected. At one point this was causing an assert()
- # to fail.
- catchsql { DELETE FROM t1 WHERE rowid = 3 }
-} {1 {database disk image is malformed}}
-
-do_test corrupt-5.1 {
- db close
- forcedelete test.db test.db-journal
- sqlite3 db test.db
-
- execsql { PRAGMA page_size = 1024 }
- set ct "CREATE TABLE t1(c0 "
- set i 0
- while {[string length $ct] < 950} { append ct ", c[incr i]" }
- append ct ")"
- execsql $ct
-} {}
-
-do_test corrupt-5.2 {
- db close
- hexio_write test.db 108 00000000
- sqlite3 db test.db
- catchsql { SELECT * FROM sqlite_master }
-} {1 {database disk image is malformed}}
-
-# At one point, the specific corruption caused by this test case was
-# causing a buffer overwrite. Although a crash was never demonstrated,
-# running this testcase under valgrind revealed the problem.
-do_test corrupt-6.1 {
- db close
- forcedelete test.db test.db-journal
- sqlite3 db test.db
- execsql {
- PRAGMA page_size = 1024; CREATE TABLE t1(x);
- }
-
- # The root page of t1 is 1024 bytes in size. The header is 8 bytes, and
- # each of the cells inserted by the following INSERT statements consume
- # 16 bytes (including the 2 byte cell-offset array entry). So the page
- # can contain up to 63 cells.
- for {set i 0} {$i < 63} {incr i} {
- execsql { INSERT INTO t1 VALUES( randomblob(10) ) }
- }
-
- # Free the cell stored right at the end of the page (at offset pgsz-14).
- execsql { DELETE FROM t1 WHERE rowid=1 }
- set rootpage [db one {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
- db close
-
- set offset [expr ($rootpage * 1024)-14+2]
- hexio_write test.db $offset 00FF
- sqlite3 db test.db
-
- catchsql { INSERT INTO t1 VALUES( randomblob(10) ) }
-} {1 {database disk image is malformed}}
-
-ifcapable oversize_cell_check {
- db close
- forcedelete test.db test.db-journal
- sqlite3 db test.db
- execsql {
- PRAGMA page_size = 1024; CREATE TABLE t1(x);
- }
-
- do_test corrupt-7.1 {
- for {set i 0} {$i < 39} {incr i} {
- execsql {
- INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
- }
- }
- } {}
- db close
-
- # Corrupt the root page of table t1 so that the first offset in the
- # cell-offset array points to the data for the SQL blob associated with
- # record (rowid=10). The root page still passes the checks in btreeInitPage(),
- # because the start of said blob looks like the start of a legitimate
- # page cell.
- #
- # Test case cc-2 overwrites the blob so that it no longer looks like a
- # real cell. But, by the time it is overwritten, btreeInitPage() has already
- # initialized the root page, so no corruption is detected.
- #
- # Test case cc-3 inserts an extra record into t1, forcing balance-deeper
- # to run. After copying the contents of the root page to the new child,
- # btreeInitPage() is called on the child. This time, it detects corruption
- # (because the start of the blob associated with the (rowid=10) record
- # no longer looks like a real cell). At one point the code assumed that
- # detecting corruption was not possible at that point, and an assert() failed.
- #
- set fd [open test.db r+]
- fconfigure $fd -translation binary -encoding binary
- seek $fd [expr 1024+8]
- puts -nonewline $fd "\x03\x14"
- close $fd
-
- sqlite3 db test.db
- do_test corrupt-7.2 {
- execsql {
- UPDATE t1 SET x = X'870400020003000400050006000700080009000A'
- WHERE rowid = 10;
- }
- } {}
- do_test corrupt-7.3 {
- catchsql {
- INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
- }
- } {1 {database disk image is malformed}}
-}
-
-db close
-forcedelete test.db test.db-journal
-do_test corrupt-8.1 {
- sqlite3 db test.db
- execsql {
- PRAGMA page_size = 1024;
- PRAGMA secure_delete = on;
- PRAGMA auto_vacuum = 0;
- CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
- INSERT INTO t1 VALUES(5, randomblob(1900));
- }
-
- hexio_write test.db 2044 [hexio_render_int32 2]
- hexio_write test.db 24 [hexio_render_int32 45]
-
- catchsql { INSERT OR REPLACE INTO t1 VALUES(5, randomblob(1900)) }
-} {1 {database disk image is malformed}}
-
-db close
-forcedelete test.db test.db-journal
-do_test corrupt-8.2 {
- sqlite3 db test.db
- execsql {
- PRAGMA page_size = 1024;
- PRAGMA secure_delete = on;
- PRAGMA auto_vacuum = 0;
- CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
- INSERT INTO t1 VALUES(5, randomblob(900));
- INSERT INTO t1 VALUES(6, randomblob(900));
- }
-
- hexio_write test.db 2047 FF
- hexio_write test.db 24 [hexio_render_int32 45]
-
- catchsql { INSERT INTO t1 VALUES(4, randomblob(1900)) }
-} {1 {database disk image is malformed}}
-
-finish_test
« no previous file with comments | « third_party/sqlite/sqlite-src-3080704/test/contrib01.test ('k') | third_party/sqlite/sqlite-src-3080704/test/corrupt2.test » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698