Annotation of embedaddon/sqlite3/test/corrupt.test, revision 1.1

1.1     ! misho       1: # 2004 August 30 {}
        !             2: #
        !             3: # The author disclaims copyright to this source code.  In place of
        !             4: # a legal notice, here is a blessing:
        !             5: #
        !             6: #    May you do good and not evil.
        !             7: #    May you find forgiveness for yourself and forgive others.
        !             8: #    May you share freely, never taking more than you give.
        !             9: #
        !            10: #***********************************************************************
        !            11: # This file implements regression tests for SQLite library.
        !            12: #
        !            13: # This file implements tests to make sure SQLite does not crash or
        !            14: # segfault if it sees a corrupt database file.
        !            15: #
        !            16: # $Id: corrupt.test,v 1.12 2009/07/13 09:41:45 danielk1977 Exp $
        !            17: 
        !            18: catch {forcedelete test.db test.db-journal test.bu}
        !            19: 
        !            20: set testdir [file dirname $argv0]
        !            21: source $testdir/tester.tcl
        !            22: 
        !            23: # Do not use a codec for tests in this file, as the database file is
        !            24: # manipulated directly using tcl scripts (using the [hexio_write] command).
        !            25: #
        !            26: do_not_use_codec
        !            27: 
        !            28: # Construct a large database for testing.
        !            29: #
        !            30: do_test corrupt-1.1 {
        !            31:   execsql {
        !            32:     BEGIN;
        !            33:     CREATE TABLE t1(x);
        !            34:     INSERT INTO t1 VALUES(randstr(100,100));
        !            35:     INSERT INTO t1 VALUES(randstr(90,90));
        !            36:     INSERT INTO t1 VALUES(randstr(80,80));
        !            37:     INSERT INTO t1 SELECT x || randstr(5,5) FROM t1;
        !            38:     INSERT INTO t1 SELECT x || randstr(6,6) FROM t1;
        !            39:     INSERT INTO t1 SELECT x || randstr(7,7) FROM t1;
        !            40:     INSERT INTO t1 SELECT x || randstr(8,8) FROM t1;
        !            41:     INSERT INTO t1 VALUES(randstr(3000,3000));
        !            42:     INSERT INTO t1 SELECT x || randstr(9,9) FROM t1;
        !            43:     INSERT INTO t1 SELECT x || randstr(10,10) FROM t1;
        !            44:     INSERT INTO t1 SELECT x || randstr(11,11) FROM t1;
        !            45:     INSERT INTO t1 SELECT x || randstr(12,12) FROM t1;
        !            46:     CREATE INDEX t1i1 ON t1(x);
        !            47:     CREATE TABLE t2 AS SELECT * FROM t1;
        !            48:     DELETE FROM t2 WHERE rowid%5!=0;
        !            49:     COMMIT;
        !            50:   }
        !            51: } {}
        !            52: integrity_check corrupt-1.2
        !            53: 
        !            54: # Setup for the tests.  Make a backup copy of the good database in test.bu.
        !            55: # Create a string of garbage data that is 256 bytes long.
        !            56: #
        !            57: forcecopy test.db test.bu
        !            58: set fsize [file size test.db]
        !            59: set junk "abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
        !            60: while {[string length $junk]<256} {append junk $junk}
        !            61: set junk [string range $junk 0 255]
        !            62: 
        !            63: # Go through the database and write garbage data into each 256 segment
        !            64: # of the file.  Then do various operations on the file to make sure that
        !            65: # the database engine can recover gracefully from the corruption.
        !            66: #
        !            67: for {set i [expr {1*256}]} {$i<$fsize-256} {incr i 256} {
        !            68:   set tn [expr {$i/256}]
        !            69:   db close
        !            70:   forcecopy test.bu test.db
        !            71:   set fd [open test.db r+]
        !            72:   fconfigure $fd -translation binary
        !            73:   seek $fd $i
        !            74:   puts -nonewline $fd $junk
        !            75:   close $fd
        !            76:   do_test corrupt-2.$tn.1 {
        !            77:     sqlite3 db test.db
        !            78:     catchsql {SELECT count(*) FROM sqlite_master}
        !            79:     set x {}
        !            80:   } {}
        !            81:   do_test corrupt-2.$tn.2 {
        !            82:     catchsql {SELECT count(*) FROM t1}
        !            83:     set x {}
        !            84:   } {}
        !            85:   do_test corrupt-2.$tn.3 {
        !            86:     catchsql {SELECT count(*) FROM t1 WHERE x>'abcdef'}
        !            87:     set x {}
        !            88:   } {}
        !            89:   do_test corrupt-2.$tn.4 {
        !            90:     catchsql {SELECT count(*) FROM t2}
        !            91:     set x {}
        !            92:   } {}
        !            93:   do_test corrupt-2.$tn.5 {
        !            94:     catchsql {CREATE TABLE t3 AS SELECT * FROM t1}
        !            95:     set x {}
        !            96:   } {}
        !            97:   do_test corrupt-2.$tn.6 {
        !            98:     catchsql {DROP TABLE t1}
        !            99:     set x {}
        !           100:   } {}
        !           101:   do_test corrupt-2.$tn.7 {
        !           102:     catchsql {PRAGMA integrity_check}
        !           103:     set x {}
        !           104:   } {}
        !           105: 
        !           106:   # Check that no page references were leaked.
        !           107:   do_test corrupt-2.$tn.8 {
        !           108:     set bt [btree_from_db db]
        !           109:     db_enter db
        !           110:     array set stats [btree_pager_stats $bt]
        !           111:     db_leave db
        !           112:     set stats(ref)
        !           113:   } {0}
        !           114: }  
        !           115: 
        !           116: #------------------------------------------------------------------------
        !           117: # For these tests, swap the rootpage entries of t1 (a table) and t1i1 (an
        !           118: # index on t1) in sqlite_master. Then perform a few different queries
        !           119: # and make sure this is detected as corruption.
        !           120: #
        !           121: do_test corrupt-3.1 {
        !           122:   db close
        !           123:   forcecopy test.bu test.db
        !           124:   sqlite3 db test.db
        !           125:   list
        !           126: } {}
        !           127: do_test corrupt-3.2 {
        !           128:   set t1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1i1'}]
        !           129:   set t1i1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
        !           130:   set cookie [expr [execsql {PRAGMA schema_version}] + 1]
        !           131:   execsql "
        !           132:     PRAGMA writable_schema = 1;
        !           133:     UPDATE sqlite_master SET rootpage = $t1_r WHERE name = 't1';
        !           134:     UPDATE sqlite_master SET rootpage = $t1i1_r WHERE name = 't1i1';
        !           135:     PRAGMA writable_schema = 0;
        !           136:     PRAGMA schema_version = $cookie;
        !           137:   "
        !           138: } {}
        !           139: 
        !           140: # This one tests the case caught by code in checkin [2313].
        !           141: do_test corrupt-3.3 {
        !           142:   db close
        !           143:   sqlite3 db test.db
        !           144:   catchsql {
        !           145:     INSERT INTO t1 VALUES('abc');
        !           146:   }
        !           147: } {1 {database disk image is malformed}}
        !           148: do_test corrupt-3.4 {
        !           149:   db close
        !           150:   sqlite3 db test.db
        !           151:   catchsql {
        !           152:     SELECT * FROM t1;
        !           153:   }
        !           154: } {1 {database disk image is malformed}}
        !           155: do_test corrupt-3.5 {
        !           156:   db close
        !           157:   sqlite3 db test.db
        !           158:   catchsql {
        !           159:     SELECT * FROM t1 WHERE oid = 10;
        !           160:   }
        !           161: } {1 {database disk image is malformed}}
        !           162: do_test corrupt-3.6 {
        !           163:   db close
        !           164:   sqlite3 db test.db
        !           165:   catchsql {
        !           166:     SELECT * FROM t1 WHERE x = 'abcde';
        !           167:   }
        !           168: } {1 {database disk image is malformed}}
        !           169: 
        !           170: do_test corrupt-4.1 {
        !           171:   db close
        !           172:   forcedelete test.db test.db-journal
        !           173:   sqlite3 db test.db
        !           174:   execsql {
        !           175:     PRAGMA page_size = 1024;
        !           176:     CREATE TABLE t1(a INTEGER PRIMARY KEY, b TEXT);
        !           177:   }
        !           178:   for {set i 0} {$i < 10} {incr i} {
        !           179:     set text [string repeat $i 220]
        !           180:     execsql { INSERT INTO t1 VALUES($i, $text) }
        !           181:   }
        !           182:   execsql { CREATE INDEX i1 ON t1(b) }
        !           183: } {}
        !           184: do_test corrupt-4.2 {
        !           185:   set iRoot [db one {SELECT rootpage FROM sqlite_master WHERE name = 'i1'}]
        !           186:   set iOffset [hexio_get_int [hexio_read test.db [expr 12+($iRoot-1)*1024] 2]]
        !           187:   set data [hexio_render_int32 [expr $iRoot - 1]]
        !           188:   hexio_write test.db [expr ($iRoot-1)*1024 + $iOffset] $data
        !           189:   db close
        !           190:   sqlite3 db test.db
        !           191: 
        !           192:   # The following DELETE statement attempts to delete a cell stored on the
        !           193:   # root page of index i1. After this cell is deleted it must be replaced
        !           194:   # by a cell retrieved from the child page (a leaf) of the deleted cell.
        !           195:   # This will fail, as the block modified the database image so that the
        !           196:   # child page of the deleted cell is from a table (intkey) b-tree, not an
        !           197:   # index b-tree as expected. At one point this was causing an assert()
        !           198:   # to fail.
        !           199:   catchsql { DELETE FROM t1 WHERE rowid = 3 }
        !           200: } {1 {database disk image is malformed}}
        !           201: 
        !           202: do_test corrupt-5.1 {
        !           203:   db close
        !           204:   forcedelete test.db test.db-journal
        !           205:   sqlite3 db test.db
        !           206: 
        !           207:   execsql { PRAGMA page_size = 1024 }
        !           208:   set ct "CREATE TABLE t1(c0 "
        !           209:   set i 0
        !           210:   while {[string length $ct] < 950} { append ct ", c[incr i]" }
        !           211:   append ct ")"
        !           212:   execsql $ct
        !           213: } {}
        !           214: 
        !           215: do_test corrupt-5.2 {
        !           216:   db close
        !           217:   hexio_write test.db 108 00000000 
        !           218:   sqlite3 db test.db
        !           219:   catchsql { SELECT * FROM sqlite_master }
        !           220: } {1 {database disk image is malformed}}
        !           221: 
        !           222: # At one point, the specific corruption caused by this test case was
        !           223: # causing a buffer overwrite. Although a crash was never demonstrated,
        !           224: # running this testcase under valgrind revealed the problem.
        !           225: do_test corrupt-6.1 {
        !           226:   db close
        !           227:   forcedelete test.db test.db-journal
        !           228:   sqlite3 db test.db
        !           229:   execsql { 
        !           230:     PRAGMA page_size = 1024; CREATE TABLE t1(x);
        !           231:   }
        !           232: 
        !           233:   # The root page of t1 is 1024 bytes in size. The header is 8 bytes, and
        !           234:   # each of the cells inserted by the following INSERT statements consume
        !           235:   # 16 bytes (including the 2 byte cell-offset array entry). So the page
        !           236:   # can contain up to 63 cells.
        !           237:   for {set i 0} {$i < 63} {incr i} {
        !           238:     execsql { INSERT INTO t1 VALUES( randomblob(10) ) }
        !           239:   }
        !           240: 
        !           241:   # Free the cell stored right at the end of the page (at offset pgsz-14).
        !           242:   execsql { DELETE FROM t1 WHERE rowid=1 }
        !           243:   set rootpage [db one {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
        !           244:   db close
        !           245: 
        !           246:   set offset [expr ($rootpage * 1024)-14+2]
        !           247:   hexio_write test.db $offset 00FF
        !           248:   sqlite3 db test.db 
        !           249: 
        !           250:   catchsql { INSERT INTO t1 VALUES( randomblob(10) ) }
        !           251: } {1 {database disk image is malformed}}
        !           252: 
        !           253: ifcapable oversize_cell_check {
        !           254:   db close
        !           255:   forcedelete test.db test.db-journal
        !           256:   sqlite3 db test.db
        !           257:   execsql { 
        !           258:     PRAGMA page_size = 1024; CREATE TABLE t1(x);
        !           259:   }
        !           260: 
        !           261:   do_test corrupt-7.1 {
        !           262:     for {set i 0} {$i < 39} {incr i} {
        !           263:       execsql {
        !           264:         INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
        !           265:       }
        !           266:     }
        !           267:   } {}
        !           268:   db close
        !           269:   
        !           270:   # Corrupt the root page of table t1 so that the first offset in the 
        !           271:   # cell-offset array points to the data for the SQL blob associated with
        !           272:   # record (rowid=10). The root page still passes the checks in btreeInitPage(),
        !           273:   # because the start of said blob looks like the start of a legitimate 
        !           274:   # page cell.
        !           275:   #
        !           276:   # Test case cc-2 overwrites the blob so that it no longer looks like a
        !           277:   # real cell. But, by the time it is overwritten, btreeInitPage() has already
        !           278:   # initialized the root page, so no corruption is detected.
        !           279:   #
        !           280:   # Test case cc-3 inserts an extra record into t1, forcing balance-deeper
        !           281:   # to run. After copying the contents of the root page to the new child,
        !           282:   # btreeInitPage() is called on the child. This time, it detects corruption
        !           283:   # (because the start of the blob associated with the (rowid=10) record
        !           284:   # no longer looks like a real cell). At one point the code assumed that 
        !           285:   # detecting corruption was not possible at that point, and an assert() failed.
        !           286:   #
        !           287:   set fd [open test.db r+]
        !           288:   fconfigure $fd -translation binary -encoding binary
        !           289:   seek $fd [expr 1024+8]
        !           290:   puts -nonewline $fd "\x03\x14"
        !           291:   close $fd
        !           292:   
        !           293:   sqlite3 db test.db
        !           294:   do_test corrupt-7.2 {
        !           295:     execsql { 
        !           296:       UPDATE t1 SET x = X'870400020003000400050006000700080009000A' 
        !           297:       WHERE rowid = 10;
        !           298:     }
        !           299:   } {}
        !           300:   do_test corrupt-7.3 {
        !           301:     catchsql {
        !           302:       INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
        !           303:     }
        !           304:   } {1 {database disk image is malformed}}
        !           305: }
        !           306: 
        !           307: db close
        !           308: forcedelete test.db test.db-journal
        !           309: do_test corrupt-8.1 {
        !           310:   sqlite3 db test.db
        !           311:   execsql {
        !           312:     PRAGMA page_size = 1024;
        !           313:     PRAGMA secure_delete = on;
        !           314:     PRAGMA auto_vacuum = 0;
        !           315:     CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
        !           316:     INSERT INTO t1 VALUES(5, randomblob(1900));
        !           317:   }
        !           318: 
        !           319:   hexio_write test.db 2044 [hexio_render_int32 2]
        !           320:   hexio_write test.db 24   [hexio_render_int32 45]
        !           321: 
        !           322:   catchsql { INSERT OR REPLACE INTO t1 VALUES(5, randomblob(1900)) }
        !           323: } {1 {database disk image is malformed}}
        !           324: 
        !           325: db close
        !           326: forcedelete test.db test.db-journal
        !           327: do_test corrupt-8.2 {
        !           328:   sqlite3 db test.db
        !           329:   execsql {
        !           330:     PRAGMA page_size = 1024;
        !           331:     PRAGMA secure_delete = on;
        !           332:     PRAGMA auto_vacuum = 0;
        !           333:     CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
        !           334:     INSERT INTO t1 VALUES(5, randomblob(900));
        !           335:     INSERT INTO t1 VALUES(6, randomblob(900));
        !           336:   }
        !           337: 
        !           338:   hexio_write test.db 2047 FF
        !           339:   hexio_write test.db 24   [hexio_render_int32 45]
        !           340: 
        !           341:   catchsql { INSERT INTO t1 VALUES(4, randomblob(1900)) }
        !           342: } {1 {database disk image is malformed}}
        !           343: 
        !           344: finish_test

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>