Index: third_party/sqlite/sqlite-src-3070603/test/malloc.test |
diff --git a/third_party/sqlite/sqlite-src-3070603/test/malloc.test b/third_party/sqlite/sqlite-src-3070603/test/malloc.test |
new file mode 100644 |
index 0000000000000000000000000000000000000000..678b2be075fe8e2f831790c123f4e4b0f7f7032d |
--- /dev/null |
+++ b/third_party/sqlite/sqlite-src-3070603/test/malloc.test |
@@ -0,0 +1,904 @@ |
+# 2001 September 15 |
+# |
+# The author disclaims copyright to this source code. In place of |
+# a legal notice, here is a blessing: |
+# |
+# May you do good and not evil. |
+# May you find forgiveness for yourself and forgive others. |
+# May you share freely, never taking more than you give. |
+# |
+#*********************************************************************** |
+# |
+# This file attempts to check the behavior of the SQLite library in |
+# an out-of-memory situation. When compiled with -DSQLITE_DEBUG=1, |
+# the SQLite library accepts a special command (sqlite3_memdebug_fail N C) |
+# which causes the N-th malloc to fail. This special feature is used |
+# to see what happens in the library if a malloc were to really fail |
+# due to an out-of-memory situation. |
+# |
+# $Id: malloc.test,v 1.81 2009/06/24 13:13:45 drh Exp $ |
+ |
+set testdir [file dirname $argv0] |
+source $testdir/tester.tcl |
+ |
+ |
+# Only run these tests if memory debugging is turned on. |
+# |
+source $testdir/malloc_common.tcl |
+if {!$MEMDEBUG} { |
+ puts "Skipping malloc tests: not compiled with -DSQLITE_MEMDEBUG..." |
+ finish_test |
+ return |
+} |
+ |
+# Do a couple of memory dumps just to exercise the memory dump logic |
+# that that we can say that we have. |
+# |
+puts stderr "This is a test. Ignore the error that follows:" |
+sqlite3_memdebug_dump $testdir |
+puts "Memory dump to file memdump.txt..." |
+sqlite3_memdebug_dump memdump.txt |
+ |
+ifcapable bloblit&&subquery { |
+ do_malloc_test 1 -tclprep { |
+ db close |
+ } -tclbody { |
+ if {[catch {sqlite3 db test.db}]} { |
+ error "out of memory" |
+ } |
+ sqlite3_extended_result_codes db 1 |
+ } -sqlbody { |
+ DROP TABLE IF EXISTS t1; |
+ CREATE TABLE t1( |
+ a int, b float, c double, d text, e varchar(20), |
+ primary key(a,b,c) |
+ ); |
+ CREATE INDEX i1 ON t1(a,b); |
+ INSERT INTO t1 VALUES(1,2.3,4.5,'hi',x'746865726500'); |
+ INSERT INTO t1 VALUES(6,7.0,0.8,'hello','out yonder'); |
+ SELECT * FROM t1; |
+ SELECT avg(b) FROM t1 GROUP BY a HAVING b>20.0; |
+ DELETE FROM t1 WHERE a IN (SELECT min(a) FROM t1); |
+ SELECT count(*), group_concat(e) FROM t1; |
+ SELECT b FROM t1 ORDER BY 1 COLLATE nocase; |
+ } |
+} |
+ |
+# Ensure that no file descriptors were leaked. |
+do_test malloc-1.X { |
+ catch {db close} |
+ set sqlite_open_file_count |
+} {0} |
+ |
+ifcapable subquery { |
+ do_malloc_test 2 -sqlbody { |
+ CREATE TABLE t1(a int, b int default 'abc', c int default 1); |
+ CREATE INDEX i1 ON t1(a,b); |
+ INSERT INTO t1 VALUES(1,1,'99 abcdefghijklmnopqrstuvwxyz'); |
+ INSERT INTO t1 VALUES(2,4,'98 abcdefghijklmnopqrstuvwxyz'); |
+ INSERT INTO t1 VALUES(3,9,'97 abcdefghijklmnopqrstuvwxyz'); |
+ INSERT INTO t1 VALUES(4,16,'96 abcdefghijklmnopqrstuvwxyz'); |
+ INSERT INTO t1 VALUES(5,25,'95 abcdefghijklmnopqrstuvwxyz'); |
+ INSERT INTO t1 VALUES(6,36,'94 abcdefghijklmnopqrstuvwxyz'); |
+ SELECT 'stuff', count(*) as 'other stuff', max(a+10) FROM t1; |
+ UPDATE t1 SET b=b||b||b||b; |
+ UPDATE t1 SET b=a WHERE a in (10,12,22); |
+ INSERT INTO t1(c,b,a) VALUES(20,10,5); |
+ INSERT INTO t1 SELECT * FROM t1 |
+ WHERE a IN (SELECT a FROM t1 WHERE a<10); |
+ DELETE FROM t1 WHERE a>=10; |
+ DROP INDEX i1; |
+ DELETE FROM t1; |
+ } |
+} |
+ |
+# Ensure that no file descriptors were leaked. |
+do_test malloc-2.X { |
+ catch {db close} |
+ set sqlite_open_file_count |
+} {0} |
+ |
+do_malloc_test 3 -sqlbody { |
+ BEGIN TRANSACTION; |
+ CREATE TABLE t1(a int, b int, c int); |
+ CREATE INDEX i1 ON t1(a,b); |
+ INSERT INTO t1 VALUES(1,1,99); |
+ INSERT INTO t1 VALUES(2,4,98); |
+ INSERT INTO t1 VALUES(3,9,97); |
+ INSERT INTO t1 VALUES(4,16,96); |
+ INSERT INTO t1 VALUES(5,25,95); |
+ INSERT INTO t1 VALUES(6,36,94); |
+ INSERT INTO t1(c,b,a) VALUES(20,10,5); |
+ DELETE FROM t1 WHERE a>=10; |
+ DROP INDEX i1; |
+ DELETE FROM t1; |
+ ROLLBACK; |
+} |
+ |
+ |
+# Ensure that no file descriptors were leaked. |
+do_test malloc-3.X { |
+ catch {db close} |
+ set sqlite_open_file_count |
+} {0} |
+ |
+ifcapable subquery { |
+ do_malloc_test 4 -sqlbody { |
+ BEGIN TRANSACTION; |
+ CREATE TABLE t1(a int, b int, c int); |
+ CREATE INDEX i1 ON t1(a,b); |
+ INSERT INTO t1 VALUES(1,1,99); |
+ INSERT INTO t1 VALUES(2,4,98); |
+ INSERT INTO t1 VALUES(3,9,97); |
+ INSERT INTO t1 VALUES(4,16,96); |
+ INSERT INTO t1 VALUES(5,25,95); |
+ INSERT INTO t1 VALUES(6,36,94); |
+ UPDATE t1 SET b=a WHERE a in (10,12,22); |
+ INSERT INTO t1 SELECT * FROM t1 |
+ WHERE a IN (SELECT a FROM t1 WHERE a<10); |
+ DROP INDEX i1; |
+ DELETE FROM t1; |
+ COMMIT; |
+ } |
+} |
+ |
+# Ensure that no file descriptors were leaked. |
+do_test malloc-4.X { |
+ catch {db close} |
+ set sqlite_open_file_count |
+} {0} |
+ |
+ifcapable trigger { |
+ do_malloc_test 5 -sqlbody { |
+ BEGIN TRANSACTION; |
+ CREATE TABLE t1(a,b); |
+ CREATE TABLE t2(x,y); |
+ CREATE TRIGGER r1 AFTER INSERT ON t1 WHEN new.a = 2 BEGIN |
+ INSERT INTO t2(x,y) VALUES(new.rowid,1); |
+ INSERT INTO t2(x,y) SELECT * FROM t2; |
+ INSERT INTO t2 SELECT * FROM t2; |
+ UPDATE t2 SET y=y+1 WHERE x=new.rowid; |
+ SELECT 123; |
+ DELETE FROM t2 WHERE x=new.rowid; |
+ END; |
+ INSERT INTO t1(a,b) VALUES(2,3); |
+ COMMIT; |
+ } |
+} |
+ |
+# Ensure that no file descriptors were leaked. |
+do_test malloc-5.X { |
+ catch {db close} |
+ set sqlite_open_file_count |
+} {0} |
+ |
+ifcapable vacuum { |
+ do_malloc_test 6 -sqlprep { |
+ BEGIN TRANSACTION; |
+ CREATE TABLE t1(a); |
+ INSERT INTO t1 VALUES(1); |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ INSERT INTO t1 SELECT a*2 FROM t1; |
+ DELETE FROM t1 where rowid%5 = 0; |
+ COMMIT; |
+ } -sqlbody { |
+ VACUUM; |
+ } |
+} |
+ |
+autoinstall_test_functions |
+do_malloc_test 7 -sqlprep { |
+ CREATE TABLE t1(a, b); |
+ INSERT INTO t1 VALUES(1, 2); |
+ INSERT INTO t1 VALUES(3, 4); |
+ INSERT INTO t1 VALUES(5, 6); |
+ INSERT INTO t1 VALUES(7, randstr(1200,1200)); |
+} -sqlbody { |
+ SELECT min(a) FROM t1 WHERE a<6 GROUP BY b; |
+ SELECT a FROM t1 WHERE a<6 ORDER BY a; |
+ SELECT b FROM t1 WHERE a>6; |
+} |
+ |
+# This block is designed to test that some malloc failures that may |
+# occur in vdbeapi.c. Specifically, if a malloc failure that occurs |
+# when converting UTF-16 text to integers and real numbers is handled |
+# correctly. |
+# |
+# This is done by retrieving a string from the database engine and |
+# manipulating it using the sqlite3_column_*** APIs. This doesn't |
+# actually return an error to the user when a malloc() fails.. That |
+# could be viewed as a bug. |
+# |
+# These tests only run if UTF-16 support is compiled in. |
+# |
+ifcapable utf16 { |
+ set ::STMT {} |
+ do_malloc_test 8 -tclprep { |
+ set sql "SELECT '[string repeat abc 20]', '[string repeat def 20]', ?" |
+ set ::STMT [sqlite3_prepare db $sql -1 X] |
+ sqlite3_step $::STMT |
+ if { $::tcl_platform(byteOrder)=="littleEndian" } { |
+ set ::bomstr "\xFF\xFE" |
+ } else { |
+ set ::bomstr "\xFE\xFF" |
+ } |
+ append ::bomstr [encoding convertto unicode "123456789_123456789_123456789"] |
+ } -tclbody { |
+ sqlite3_column_text16 $::STMT 0 |
+ sqlite3_column_int $::STMT 0 |
+ sqlite3_column_text16 $::STMT 1 |
+ sqlite3_column_double $::STMT 1 |
+ set rc [sqlite3_reset $::STMT] |
+ if {$rc eq "SQLITE_NOMEM"} {error "out of memory"} |
+ sqlite3_bind_text16 $::STMT 1 $::bomstr 60 |
+ #catch {sqlite3_finalize $::STMT} |
+ #if {[lindex [sqlite_malloc_stat] 2]<=0} { |
+ # error "out of memory" |
+ #} |
+ } -cleanup { |
+ if {$::STMT!=""} { |
+ sqlite3_finalize $::STMT |
+ set ::STMT {} |
+ } |
+ } |
+} |
+ |
+# This block tests that malloc() failures that occur whilst commiting |
+# a multi-file transaction are handled correctly. |
+# |
+do_malloc_test 9 -sqlprep { |
+ ATTACH 'test2.db' as test2; |
+ CREATE TABLE abc1(a, b, c); |
+ CREATE TABLE test2.abc2(a, b, c); |
+} -sqlbody { |
+ BEGIN; |
+ INSERT INTO abc1 VALUES(1, 2, 3); |
+ INSERT INTO abc2 VALUES(1, 2, 3); |
+ COMMIT; |
+} |
+ |
+# This block tests malloc() failures that occur while opening a |
+# connection to a database. |
+do_malloc_test 10 -tclprep { |
+ catch {db2 close} |
+ db close |
+ file delete -force test.db test.db-journal |
+ sqlite3 db test.db |
+ sqlite3_extended_result_codes db 1 |
+ db eval {CREATE TABLE abc(a, b, c)} |
+} -tclbody { |
+ db close |
+ sqlite3 db2 test.db |
+ sqlite3_extended_result_codes db2 1 |
+ db2 eval {SELECT * FROM sqlite_master} |
+ db2 close |
+} |
+ |
+# This block tests malloc() failures that occur within calls to |
+# sqlite3_create_function(). |
+do_malloc_test 11 -tclbody { |
+ set rc [sqlite3_create_function db] |
+ if {[string match $rc SQLITE_OK]} { |
+ set rc [sqlite3_create_aggregate db] |
+ } |
+ if {[string match $rc SQLITE_NOMEM]} { |
+ error "out of memory" |
+ } |
+} |
+ |
+do_malloc_test 12 -tclbody { |
+ set sql16 [encoding convertto unicode "SELECT * FROM sqlite_master"] |
+ append sql16 "\00\00" |
+ set ::STMT [sqlite3_prepare16 db $sql16 -1 DUMMY] |
+ sqlite3_finalize $::STMT |
+} |
+ |
+# Test malloc errors when replaying two hot journals from a 2-file |
+# transaction. |
+ifcapable crashtest&&attach { |
+ do_malloc_test 13 -tclprep { |
+ set rc [crashsql -delay 1 -file test2.db { |
+ ATTACH 'test2.db' as aux; |
+ PRAGMA cache_size = 10; |
+ BEGIN; |
+ CREATE TABLE aux.t2(a, b, c); |
+ CREATE TABLE t1(a, b, c); |
+ COMMIT; |
+ }] |
+ if {$rc!="1 {child process exited abnormally}"} { |
+ error "Wrong error message: $rc" |
+ } |
+ } -tclbody { |
+ db eval {ATTACH 'test2.db' as aux;} |
+ set rc [catch {db eval { |
+ SELECT * FROM t1; |
+ SELECT * FROM t2; |
+ }} err] |
+ if {$rc && $err!="no such table: t1"} { |
+ error $err |
+ } |
+ } |
+} |
+ |
+if {$tcl_platform(platform)!="windows"} { |
+ do_malloc_test 14 -tclprep { |
+ catch {db close} |
+ sqlite3 db2 test2.db |
+ sqlite3_extended_result_codes db2 1 |
+ db2 eval { |
+ PRAGMA journal_mode = DELETE; /* For inmemory_journal permutation */ |
+ PRAGMA synchronous = 0; |
+ CREATE TABLE t1(a, b); |
+ INSERT INTO t1 VALUES(1, 2); |
+ BEGIN; |
+ INSERT INTO t1 VALUES(3, 4); |
+ } |
+ copy_file test2.db test.db |
+ copy_file test2.db-journal test.db-journal |
+ db2 close |
+ } -tclbody { |
+ sqlite3 db test.db |
+ sqlite3_extended_result_codes db 1 |
+ |
+ # If an out-of-memory occurs within a call to a VFS layer function during |
+ # hot-journal rollback, sqlite will report SQLITE_CORRUPT. See commit |
+ # [5668] for details. |
+ set rc [catch {db eval { SELECT * FROM t1 }} msg] |
+ if {$msg eq "database disk image is malformed"} { set msg "out of memory" } |
+ if {$rc} { error $msg } |
+ set msg |
+ } |
+} |
+ |
+proc string_compare {a b} { |
+ return [string compare $a $b] |
+} |
+ |
+# Test for malloc() failures in sqlite3_create_collation() and |
+# sqlite3_create_collation16(). |
+# |
+ifcapable utf16 { |
+ do_malloc_test 15 -start 4 -tclbody { |
+ db collate string_compare string_compare |
+ if {[catch {add_test_collate db 1 1 1} msg]} { |
+ if {$msg=="SQLITE_NOMEM"} {set msg "out of memory"} |
+ error $msg |
+ } |
+ |
+ db complete {SELECT "hello """||'world"' [microsoft], * FROM anicetable;} |
+ db complete {-- Useful comment} |
+ |
+ execsql { |
+ CREATE TABLE t1(a, b COLLATE string_compare); |
+ INSERT INTO t1 VALUES(10, 'string'); |
+ INSERT INTO t1 VALUES(10, 'string2'); |
+ } |
+ } |
+} |
+ |
+# Also test sqlite3_complete(). There are (currently) no malloc() |
+# calls in this function, but test anyway against future changes. |
+# |
+do_malloc_test 16 -tclbody { |
+ db complete {SELECT "hello """||'world"' [microsoft], * FROM anicetable;} |
+ db complete {-- Useful comment} |
+ db eval { |
+ SELECT * FROM sqlite_master; |
+ } |
+} |
+ |
+# Test handling of malloc() failures in sqlite3_open16(). |
+# |
+ifcapable utf16 { |
+ do_malloc_test 17 -tclbody { |
+ set DB2 0 |
+ set STMT 0 |
+ |
+ # open database using sqlite3_open16() |
+ set filename [encoding convertto unicode test.db] |
+ append filename "\x00\x00" |
+ set DB2 [sqlite3_open16 $filename -unused] |
+ if {0==$DB2} { |
+ error "out of memory" |
+ } |
+ sqlite3_extended_result_codes $DB2 1 |
+ |
+ # Prepare statement |
+ set rc [catch {sqlite3_prepare $DB2 {SELECT * FROM sqlite_master} -1 X} msg] |
+ if {[sqlite3_errcode $DB2] eq "SQLITE_IOERR+12"} { |
+ error "out of memory" |
+ } |
+ if {[regexp ".*automatic extension loading.*" [sqlite3_errmsg $DB2]]} { |
+ error "out of memory" |
+ } |
+ if {$rc} { |
+ error [string range $msg 4 end] |
+ } |
+ set STMT $msg |
+ |
+ # Finalize statement |
+ set rc [sqlite3_finalize $STMT] |
+ if {$rc!="SQLITE_OK"} { |
+ error [sqlite3_errmsg $DB2] |
+ } |
+ set STMT 0 |
+ |
+ # Close database |
+ set rc [sqlite3_close $DB2] |
+ if {$rc!="SQLITE_OK"} { |
+ error [sqlite3_errmsg $DB2] |
+ } |
+ set DB2 0 |
+ } -cleanup { |
+ if {$STMT!="0"} { |
+ sqlite3_finalize $STMT |
+ } |
+ if {$DB2!="0"} { |
+ set rc [sqlite3_close $DB2] |
+ } |
+ } |
+} |
+ |
+# Test handling of malloc() failures in sqlite3_errmsg16(). |
+# |
+ifcapable utf16 { |
+ do_malloc_test 18 -tclprep { |
+ catch { |
+ db eval "SELECT [string repeat longcolumnname 10] FROM sqlite_master" |
+ } |
+ } -tclbody { |
+ set utf16 [sqlite3_errmsg16 [sqlite3_connection_pointer db]] |
+ binary scan $utf16 c* bytes |
+ if {[llength $bytes]==0} { |
+ error "out of memory" |
+ } |
+ } |
+} |
+ |
+# This test is aimed at coverage testing. Specificly, it is supposed to |
+# cause a malloc() only used when converting between the two utf-16 |
+# encodings to fail (i.e. little-endian->big-endian). It only actually |
+# hits this malloc() on little-endian hosts. |
+# |
+set static_string "\x00h\x00e\x00l\x00l\x00o" |
+for {set l 0} {$l<10} {incr l} { |
+ append static_string $static_string |
+} |
+append static_string "\x00\x00" |
+do_malloc_test 19 -tclprep { |
+ execsql { |
+ PRAGMA encoding = "UTF16be"; |
+ CREATE TABLE abc(a, b, c); |
+ } |
+} -tclbody { |
+ unset -nocomplain ::STMT |
+ set r [catch { |
+ set ::STMT [sqlite3_prepare db {SELECT ?} -1 DUMMY] |
+ sqlite3_bind_text16 -static $::STMT 1 $static_string 112 |
+ } msg] |
+ if {$r} {error [string range $msg 4 end]} |
+ set msg |
+} -cleanup { |
+ if {[info exists ::STMT]} { |
+ sqlite3_finalize $::STMT |
+ } |
+} |
+unset static_string |
+ |
+# Make sure SQLITE_NOMEM is reported out on an ATTACH failure even |
+# when the malloc failure occurs within the nested parse. |
+# |
+ifcapable attach { |
+ do_malloc_test 20 -tclprep { |
+ db close |
+ file delete -force test2.db test2.db-journal |
+ sqlite3 db test2.db |
+ sqlite3_extended_result_codes db 1 |
+ db eval {CREATE TABLE t1(x);} |
+ db close |
+ } -tclbody { |
+ if {[catch {sqlite3 db test.db}]} { |
+ error "out of memory" |
+ } |
+ sqlite3_extended_result_codes db 1 |
+ } -sqlbody { |
+ ATTACH DATABASE 'test2.db' AS t2; |
+ SELECT * FROM t1; |
+ DETACH DATABASE t2; |
+ } |
+} |
+ |
+# Test malloc failure whilst installing a foreign key. |
+# |
+ifcapable foreignkey { |
+ do_malloc_test 21 -sqlbody { |
+ CREATE TABLE abc(a, b, c, FOREIGN KEY(a) REFERENCES abc(b)) |
+ } |
+} |
+ |
+# Test malloc failure in an sqlite3_prepare_v2() call. |
+# |
+do_malloc_test 22 -tclbody { |
+ set ::STMT "" |
+ set r [catch { |
+ set ::STMT [ |
+ sqlite3_prepare_v2 db "SELECT * FROM sqlite_master" -1 DUMMY |
+ ] |
+ } msg] |
+ if {$r} {error [string range $msg 4 end]} |
+} -cleanup { |
+ if {$::STMT ne ""} { |
+ sqlite3_finalize $::STMT |
+ set ::STMT "" |
+ } |
+} |
+ |
+ifcapable {pager_pragmas} { |
+ # This tests a special case - that an error that occurs while the pager |
+ # is trying to recover from error-state in exclusive-access mode works. |
+ # |
+ do_malloc_test 23 -tclprep { |
+ db eval { |
+ PRAGMA cache_size = 10; |
+ PRAGMA locking_mode = exclusive; |
+ BEGIN; |
+ CREATE TABLE abc(a, b, c); |
+ CREATE INDEX abc_i ON abc(a, b, c); |
+ INSERT INTO abc |
+ VALUES(randstr(100,100), randstr(100,100), randstr(100,100)); |
+ INSERT INTO abc |
+ SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc; |
+ INSERT INTO abc |
+ SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc; |
+ INSERT INTO abc |
+ SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc; |
+ INSERT INTO abc |
+ SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc; |
+ INSERT INTO abc |
+ SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc; |
+ COMMIT; |
+ } |
+ |
+ # This puts the pager into error state. |
+ # |
+ db eval BEGIN |
+ db eval {UPDATE abc SET a = 0 WHERE oid%2} |
+ set ::sqlite_io_error_pending 10 |
+ catch {db eval {ROLLBACK}} msg |
+ |
+ } -tclbody { |
+ # If an out-of-memory occurs within a call to a VFS layer function during |
+ # hot-journal rollback, sqlite will report SQLITE_CORRUPT. See commit |
+ # [5668] for details. |
+ set rc [catch {db eval { SELECT * FROM abc LIMIT 10 }} msg] |
+ if {$msg eq "database disk image is malformed"} { set msg "out of memory" } |
+ if {$rc} { error $msg } |
+ set msg |
+ } -cleanup { |
+ set e [db eval {PRAGMA integrity_check}] |
+ if {$e ne "ok"} {error $e} |
+ } |
+} |
+ |
+ifcapable compound { |
+ do_malloc_test 24 -sqlprep { |
+ CREATE TABLE t1(a, b, c) |
+ } -sqlbody { |
+ SELECT 1 FROM t1 UNION SELECT 2 FROM t1 ORDER BY 1 |
+ } |
+} |
+ |
+ifcapable view&&trigger { |
+ do_malloc_test 25 -sqlprep { |
+ CREATE TABLE t1(a, b, c); |
+ CREATE VIEW v1 AS SELECT * FROM t1; |
+ CREATE TRIGGER v1t1 INSTEAD OF DELETE ON v1 BEGIN SELECT 1; END; |
+ CREATE TRIGGER v1t2 INSTEAD OF INSERT ON v1 BEGIN SELECT 1; END; |
+ CREATE TRIGGER v1t3 INSTEAD OF UPDATE ON v1 BEGIN SELECT 1; END; |
+ } -sqlbody { |
+ DELETE FROM v1 WHERE a = 1; |
+ INSERT INTO v1 VALUES(1, 2, 3); |
+ UPDATE v1 SET a = 1 WHERE b = 2; |
+ } |
+} |
+ |
+do_malloc_test 25 -sqlprep { |
+ CREATE TABLE abc(a, b, c); |
+ CREATE INDEX i1 ON abc(a, b); |
+ INSERT INTO abc VALUES(1, 2, 3); |
+ INSERT INTO abc VALUES(4, 5, 6); |
+} -tclbody { |
+ # For each UPDATE executed, the cursor used for the SELECT statement |
+ # must be "saved". Because the cursor is open on an index, this requires |
+ # a malloc() to allocate space to save the index key. This test case is |
+ # aimed at testing the response of the library to a failure in that |
+ # particular malloc() call. |
+ db eval {SELECT a FROM abc ORDER BY a} { |
+ db eval {UPDATE abc SET b = b - 1 WHERE a = $a} |
+ } |
+} |
+ |
+# This test is designed to test a specific juncture in the sqlite code. |
+# The database set up by -sqlprep script contains a single table B-Tree |
+# of height 2. In the -tclbody script, the existing database connection |
+# is closed and a new one opened and used to insert a new row into the |
+# table B-Tree. By using a new connection, the outcome of a malloc() |
+# failure while seeking to the right-hand side of the B-Tree to insert |
+# a new record can be tested. |
+# |
+do_malloc_test 26 -sqlprep { |
+ BEGIN; |
+ CREATE TABLE t1(a, b); |
+ INSERT INTO t1 VALUES(1, randomblob(210)); |
+ INSERT INTO t1 VALUES(1, randomblob(210)); |
+ INSERT INTO t1 VALUES(1, randomblob(210)); |
+ INSERT INTO t1 VALUES(1, randomblob(210)); |
+ INSERT INTO t1 VALUES(1, randomblob(210)); |
+ COMMIT; |
+} -tclbody { |
+ db close |
+ sqlite3 db test.db |
+ db eval { INSERT INTO t1 VALUES(1, randomblob(210)) } |
+} |
+ |
+# Test that no memory is leaked following a malloc() failure in |
+# sqlite3_initialize(). |
+# |
+do_malloc_test 27 -tclprep { |
+ db close |
+ sqlite3_shutdown |
+} -tclbody { |
+ set rc [sqlite3_initialize] |
+ if {$rc == "SQLITE_NOMEM"} { |
+ error "out of memory" |
+ } |
+} |
+autoinstall_test_functions |
+ |
+# Test that malloc failures that occur while processing INDEXED BY |
+# clauses are handled correctly. |
+do_malloc_test 28 -sqlprep { |
+ CREATE TABLE t1(a, b); |
+ CREATE INDEX i1 ON t1(a); |
+ CREATE VIEW v1 AS SELECT * FROM t1 INDEXED BY i1 WHERE a = 10; |
+} -sqlbody { |
+ SELECT * FROM t1 INDEXED BY i1 ORDER BY a; |
+ SELECT * FROM v1; |
+} |
+ |
+do_malloc_test 29 -sqlprep { |
+ CREATE TABLE t1(a TEXT, b TEXT); |
+} -sqlbody { |
+ INSERT INTO t1 VALUES(1, -234); |
+ INSERT INTO t1 SELECT * FROM t1 UNION ALL SELECT * FROM t1; |
+} |
+ |
+do_malloc_test 30 -tclprep { |
+ db eval { |
+ CREATE TABLE t1(x PRIMARY KEY); |
+ INSERT INTO t1 VALUES(randstr(500,500)); |
+ INSERT INTO t1 VALUES(randstr(500,500)); |
+ INSERT INTO t1 VALUES(randstr(500,500)); |
+ } |
+ db close |
+ sqlite3 db test.db |
+ |
+ # The DELETE command in the following block moves the overflow pages that |
+ # are part of the primary key index to the free-list. But it does not |
+ # actually load the content of the pages. This leads to the peculiar |
+ # situation where cache entries exist, but are not populated with data. |
+ # They are populated next time they are requested by the b-tree layer. |
+ # |
+ db eval { |
+ BEGIN; |
+ DELETE FROM t1; |
+ ROLLBACK; |
+ } |
+} -sqlbody { |
+ -- This statement requires the 'no-content' pages loaded by the DELETE |
+ -- statement above. When requesting the pages, the content is loaded |
+ -- from the database file. The point of this test case is to test handling |
+ -- of malloc errors (including SQLITE_IOERR_NOMEM errors) when loading |
+ -- the content. |
+ SELECT * FROM t1 ORDER BY x; |
+} |
+ |
+# After committing a transaction in persistent-journal mode, if a journal |
+# size limit is configured SQLite may attempt to truncate the journal file. |
+# This test verifies the libraries response to a malloc() failure during |
+# this operation. |
+# |
+do_malloc_test 31 -sqlprep { |
+ PRAGMA journal_mode = persist; |
+ PRAGMA journal_size_limit = 1024; |
+ CREATE TABLE t1(a PRIMARY KEY, b); |
+} -sqlbody { |
+ INSERT INTO t1 VALUES(1, 2); |
+} |
+ |
+# When written, this test provoked an obscure change-counter bug. |
+# |
+# If, when running in exclusive mode, a malloc() failure occurs |
+# after the database file change-counter has been written but |
+# before the transaction has been committed, then the transaction |
+# is automatically rolled back. However, internally the |
+# Pager.changeCounterDone flag was being left set. This means |
+# that if the same connection attempts another transaction following |
+# the malloc failure and rollback, the change counter will not |
+# be updated. This could corrupt another processes cache. |
+# |
+do_malloc_test 32 -tclprep { |
+ # Build a small database containing an indexed table. |
+ # |
+ db eval { |
+ PRAGMA locking_mode = normal; |
+ BEGIN; |
+ CREATE TABLE t1(a PRIMARY KEY, b); |
+ INSERT INTO t1 VALUES(1, 'one'); |
+ INSERT INTO t1 VALUES(2, 'two'); |
+ INSERT INTO t1 VALUES(3, 'three'); |
+ COMMIT; |
+ PRAGMA locking_mode = exclusive; |
+ } |
+ |
+ # Open a second database connection. Load the table (but not index) |
+ # into the second connections pager cache. |
+ # |
+ sqlite3 db2 test.db |
+ db2 eval { |
+ PRAGMA locking_mode = normal; |
+ SELECT b FROM t1; |
+ } |
+ |
+} -tclbody { |
+ # Running in exclusive mode, perform a database transaction that |
+ # modifies both the database table and index. For iterations where |
+ # the malloc failure occurs after updating the change counter but |
+ # before committing the transaction, this should result in the |
+ # transaction being rolled back but the changeCounterDone flag |
+ # left set. |
+ # |
+ db eval { UPDATE t1 SET a = a + 3 } |
+} -cleanup { |
+ |
+ # Perform another transaction using the first connection. Unlock |
+ # the database after doing so. If this is one of the right iterations, |
+ # then this should result in the database contents being updated but |
+ # the change-counter left as it is. |
+ # |
+ db eval { |
+ PRAGMA locking_mode = normal; |
+ UPDATE t1 SET a = a + 3; |
+ } |
+ |
+ # Now do an integrity check with the second connection. The second |
+ # connection still has the database table in its cache. If this is |
+ # one of the magic iterations and the change counter was not modified, |
+ # then it won't realize that the cached data is out of date. Since |
+ # the cached data won't match the up to date index data read from |
+ # the database file, the integrity check should fail. |
+ # |
+ set zRepeat "transient" |
+ if {$::iRepeat} {set zRepeat "persistent"} |
+ do_test malloc-32.$zRepeat.${::n}.integrity { |
+ execsql {PRAGMA integrity_check} db2 |
+ } {ok} |
+ db2 close |
+} |
+ |
+# The following two OOM tests verify that OOM handling works in the |
+# code used to optimize "SELECT count(*) FROM <tbl>". |
+# |
+do_malloc_test 33 -tclprep { |
+ db eval { PRAGMA cache_size = 10 } |
+ db transaction { |
+ db eval { CREATE TABLE abc(a, b) } |
+ for {set i 0} {$i<500} {incr i} { |
+ db eval {INSERT INTO abc VALUES(randstr(100,100), randstr(1000,1000))} |
+ } |
+ } |
+} -sqlbody { |
+ SELECT count(*) FROM abc; |
+} |
+do_malloc_test 34 -tclprep { |
+ db eval { PRAGMA cache_size = 10 } |
+ db transaction { |
+ db eval { CREATE TABLE abc(a PRIMARY KEY, b) } |
+ for {set i 0} {$i<500} {incr i} { |
+ db eval {INSERT INTO abc VALUES(randstr(100,100), randstr(1000,1000))} |
+ } |
+ } |
+} -sqlbody { |
+ SELECT count(*) FROM abc; |
+} |
+ |
+proc f {args} { error "Quite a long error!" } |
+do_malloc_test 35 -tclprep { |
+ db func f f |
+ set ::STMT [sqlite3_prepare db "SELECT f()" -1 DUMMY] |
+ sqlite3_step $::STMT |
+} -tclbody { |
+ sqlite3_finalize $::STMT |
+} -cleanup { |
+ # At one point an assert( !db->mallocFailed ) could fail in the following |
+ # call to sqlite3_errmsg(). Because sqlite3_finalize() had failed to clear |
+ # the flag before returning. |
+ sqlite3_errmsg16 db |
+} |
+ |
+do_malloc_test 36 -sqlprep { |
+ CREATE TABLE t1(a, b); |
+ INSERT INTO t1 VALUES(1, 2); |
+ INSERT INTO t1 VALUES(3, 4); |
+} -sqlbody { |
+ SELECT test_agg_errmsg16(), group_concat(a) FROM t1 |
+} |
+ |
+# At one point, if an OOM occured immediately after obtaining a shared lock |
+# on the database file, the file remained locked. This test case ensures |
+# that bug has been fixed.i |
+if {[db eval {PRAGMA locking_mode}]!="exclusive"} { |
+ do_malloc_test 37 -tclprep { |
+ sqlite3 db2 test.db |
+ execsql { |
+ CREATE TABLE t1(a, b); |
+ INSERT INTO t1 VALUES(1, 2); |
+ } db2 |
+ } -sqlbody { |
+ SELECT * FROM t1; |
+ } -cleanup { |
+ # Try to write to the database using connection [db2]. If connection [db] |
+ # has correctly released the shared lock, this write attempt should |
+ # succeed. If [db] has not released the lock, this should hit an |
+ # SQLITE_BUSY error. |
+ do_test malloc-36.$zRepeat.${::n}.unlocked { |
+ execsql {INSERT INTO t1 VALUES(3, 4)} db2 |
+ } {} |
+ db2 close |
+ } |
+ catch { db2 close } |
+} |
+ |
+ifcapable stat2&&utf16 { |
+ do_malloc_test 38 -tclprep { |
+ add_test_collate db 0 0 1 |
+ execsql { |
+ ANALYZE; |
+ CREATE TABLE t4(x COLLATE test_collate); |
+ CREATE INDEX t4x ON t4(x); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 0, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 1, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 2, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 3, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 4, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 5, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 6, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 7, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 8, 'aaa'); |
+ INSERT INTO sqlite_stat2 VALUES('t4', 't4x', 9, 'aaa'); |
+ } |
+ db close |
+ sqlite3 db test.db |
+ sqlite3_db_config_lookaside db 0 0 0 |
+ add_test_collate db 0 0 1 |
+ } -sqlbody { |
+ SELECT * FROM t4 AS t41, t4 AS t42 WHERE t41.x>'ddd' AND t42.x>'ccc' |
+ } |
+} |
+ |
+# Ensure that no file descriptors were leaked. |
+do_test malloc-99.X { |
+ catch {db close} |
+ set sqlite_open_file_count |
+} {0} |
+ |
+puts open-file-count=$sqlite_open_file_count |
+finish_test |