Annotation of embedaddon/sqlite3/test/corrupt.test, revision 1.1.1.1
1.1 misho 1: # 2004 August 30 {}
2: #
3: # The author disclaims copyright to this source code. In place of
4: # a legal notice, here is a blessing:
5: #
6: # May you do good and not evil.
7: # May you find forgiveness for yourself and forgive others.
8: # May you share freely, never taking more than you give.
9: #
10: #***********************************************************************
11: # This file implements regression tests for SQLite library.
12: #
13: # This file implements tests to make sure SQLite does not crash or
14: # segfault if it sees a corrupt database file.
15: #
16: # $Id: corrupt.test,v 1.12 2009/07/13 09:41:45 danielk1977 Exp $
17:
18: catch {forcedelete test.db test.db-journal test.bu}
19:
20: set testdir [file dirname $argv0]
21: source $testdir/tester.tcl
22:
23: # Do not use a codec for tests in this file, as the database file is
24: # manipulated directly using tcl scripts (using the [hexio_write] command).
25: #
26: do_not_use_codec
27:
28: # Construct a large database for testing.
29: #
30: do_test corrupt-1.1 {
31: execsql {
32: BEGIN;
33: CREATE TABLE t1(x);
34: INSERT INTO t1 VALUES(randstr(100,100));
35: INSERT INTO t1 VALUES(randstr(90,90));
36: INSERT INTO t1 VALUES(randstr(80,80));
37: INSERT INTO t1 SELECT x || randstr(5,5) FROM t1;
38: INSERT INTO t1 SELECT x || randstr(6,6) FROM t1;
39: INSERT INTO t1 SELECT x || randstr(7,7) FROM t1;
40: INSERT INTO t1 SELECT x || randstr(8,8) FROM t1;
41: INSERT INTO t1 VALUES(randstr(3000,3000));
42: INSERT INTO t1 SELECT x || randstr(9,9) FROM t1;
43: INSERT INTO t1 SELECT x || randstr(10,10) FROM t1;
44: INSERT INTO t1 SELECT x || randstr(11,11) FROM t1;
45: INSERT INTO t1 SELECT x || randstr(12,12) FROM t1;
46: CREATE INDEX t1i1 ON t1(x);
47: CREATE TABLE t2 AS SELECT * FROM t1;
48: DELETE FROM t2 WHERE rowid%5!=0;
49: COMMIT;
50: }
51: } {}
52: integrity_check corrupt-1.2
53:
54: # Setup for the tests. Make a backup copy of the good database in test.bu.
55: # Create a string of garbage data that is 256 bytes long.
56: #
57: forcecopy test.db test.bu
58: set fsize [file size test.db]
59: set junk "abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
60: while {[string length $junk]<256} {append junk $junk}
61: set junk [string range $junk 0 255]
62:
63: # Go through the database and write garbage data into each 256 segment
64: # of the file. Then do various operations on the file to make sure that
65: # the database engine can recover gracefully from the corruption.
66: #
67: for {set i [expr {1*256}]} {$i<$fsize-256} {incr i 256} {
68: set tn [expr {$i/256}]
69: db close
70: forcecopy test.bu test.db
71: set fd [open test.db r+]
72: fconfigure $fd -translation binary
73: seek $fd $i
74: puts -nonewline $fd $junk
75: close $fd
76: do_test corrupt-2.$tn.1 {
77: sqlite3 db test.db
78: catchsql {SELECT count(*) FROM sqlite_master}
79: set x {}
80: } {}
81: do_test corrupt-2.$tn.2 {
82: catchsql {SELECT count(*) FROM t1}
83: set x {}
84: } {}
85: do_test corrupt-2.$tn.3 {
86: catchsql {SELECT count(*) FROM t1 WHERE x>'abcdef'}
87: set x {}
88: } {}
89: do_test corrupt-2.$tn.4 {
90: catchsql {SELECT count(*) FROM t2}
91: set x {}
92: } {}
93: do_test corrupt-2.$tn.5 {
94: catchsql {CREATE TABLE t3 AS SELECT * FROM t1}
95: set x {}
96: } {}
97: do_test corrupt-2.$tn.6 {
98: catchsql {DROP TABLE t1}
99: set x {}
100: } {}
101: do_test corrupt-2.$tn.7 {
102: catchsql {PRAGMA integrity_check}
103: set x {}
104: } {}
105:
106: # Check that no page references were leaked.
107: do_test corrupt-2.$tn.8 {
108: set bt [btree_from_db db]
109: db_enter db
110: array set stats [btree_pager_stats $bt]
111: db_leave db
112: set stats(ref)
113: } {0}
114: }
115:
116: #------------------------------------------------------------------------
117: # For these tests, swap the rootpage entries of t1 (a table) and t1i1 (an
118: # index on t1) in sqlite_master. Then perform a few different queries
119: # and make sure this is detected as corruption.
120: #
121: do_test corrupt-3.1 {
122: db close
123: forcecopy test.bu test.db
124: sqlite3 db test.db
125: list
126: } {}
127: do_test corrupt-3.2 {
128: set t1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1i1'}]
129: set t1i1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
130: set cookie [expr [execsql {PRAGMA schema_version}] + 1]
131: execsql "
132: PRAGMA writable_schema = 1;
133: UPDATE sqlite_master SET rootpage = $t1_r WHERE name = 't1';
134: UPDATE sqlite_master SET rootpage = $t1i1_r WHERE name = 't1i1';
135: PRAGMA writable_schema = 0;
136: PRAGMA schema_version = $cookie;
137: "
138: } {}
139:
140: # This one tests the case caught by code in checkin [2313].
141: do_test corrupt-3.3 {
142: db close
143: sqlite3 db test.db
144: catchsql {
145: INSERT INTO t1 VALUES('abc');
146: }
147: } {1 {database disk image is malformed}}
148: do_test corrupt-3.4 {
149: db close
150: sqlite3 db test.db
151: catchsql {
152: SELECT * FROM t1;
153: }
154: } {1 {database disk image is malformed}}
155: do_test corrupt-3.5 {
156: db close
157: sqlite3 db test.db
158: catchsql {
159: SELECT * FROM t1 WHERE oid = 10;
160: }
161: } {1 {database disk image is malformed}}
162: do_test corrupt-3.6 {
163: db close
164: sqlite3 db test.db
165: catchsql {
166: SELECT * FROM t1 WHERE x = 'abcde';
167: }
168: } {1 {database disk image is malformed}}
169:
170: do_test corrupt-4.1 {
171: db close
172: forcedelete test.db test.db-journal
173: sqlite3 db test.db
174: execsql {
175: PRAGMA page_size = 1024;
176: CREATE TABLE t1(a INTEGER PRIMARY KEY, b TEXT);
177: }
178: for {set i 0} {$i < 10} {incr i} {
179: set text [string repeat $i 220]
180: execsql { INSERT INTO t1 VALUES($i, $text) }
181: }
182: execsql { CREATE INDEX i1 ON t1(b) }
183: } {}
184: do_test corrupt-4.2 {
185: set iRoot [db one {SELECT rootpage FROM sqlite_master WHERE name = 'i1'}]
186: set iOffset [hexio_get_int [hexio_read test.db [expr 12+($iRoot-1)*1024] 2]]
187: set data [hexio_render_int32 [expr $iRoot - 1]]
188: hexio_write test.db [expr ($iRoot-1)*1024 + $iOffset] $data
189: db close
190: sqlite3 db test.db
191:
192: # The following DELETE statement attempts to delete a cell stored on the
193: # root page of index i1. After this cell is deleted it must be replaced
194: # by a cell retrieved from the child page (a leaf) of the deleted cell.
195: # This will fail, as the block modified the database image so that the
196: # child page of the deleted cell is from a table (intkey) b-tree, not an
197: # index b-tree as expected. At one point this was causing an assert()
198: # to fail.
199: catchsql { DELETE FROM t1 WHERE rowid = 3 }
200: } {1 {database disk image is malformed}}
201:
202: do_test corrupt-5.1 {
203: db close
204: forcedelete test.db test.db-journal
205: sqlite3 db test.db
206:
207: execsql { PRAGMA page_size = 1024 }
208: set ct "CREATE TABLE t1(c0 "
209: set i 0
210: while {[string length $ct] < 950} { append ct ", c[incr i]" }
211: append ct ")"
212: execsql $ct
213: } {}
214:
215: do_test corrupt-5.2 {
216: db close
217: hexio_write test.db 108 00000000
218: sqlite3 db test.db
219: catchsql { SELECT * FROM sqlite_master }
220: } {1 {database disk image is malformed}}
221:
222: # At one point, the specific corruption caused by this test case was
223: # causing a buffer overwrite. Although a crash was never demonstrated,
224: # running this testcase under valgrind revealed the problem.
225: do_test corrupt-6.1 {
226: db close
227: forcedelete test.db test.db-journal
228: sqlite3 db test.db
229: execsql {
230: PRAGMA page_size = 1024; CREATE TABLE t1(x);
231: }
232:
233: # The root page of t1 is 1024 bytes in size. The header is 8 bytes, and
234: # each of the cells inserted by the following INSERT statements consume
235: # 16 bytes (including the 2 byte cell-offset array entry). So the page
236: # can contain up to 63 cells.
237: for {set i 0} {$i < 63} {incr i} {
238: execsql { INSERT INTO t1 VALUES( randomblob(10) ) }
239: }
240:
241: # Free the cell stored right at the end of the page (at offset pgsz-14).
242: execsql { DELETE FROM t1 WHERE rowid=1 }
243: set rootpage [db one {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
244: db close
245:
246: set offset [expr ($rootpage * 1024)-14+2]
247: hexio_write test.db $offset 00FF
248: sqlite3 db test.db
249:
250: catchsql { INSERT INTO t1 VALUES( randomblob(10) ) }
251: } {1 {database disk image is malformed}}
252:
253: ifcapable oversize_cell_check {
254: db close
255: forcedelete test.db test.db-journal
256: sqlite3 db test.db
257: execsql {
258: PRAGMA page_size = 1024; CREATE TABLE t1(x);
259: }
260:
261: do_test corrupt-7.1 {
262: for {set i 0} {$i < 39} {incr i} {
263: execsql {
264: INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
265: }
266: }
267: } {}
268: db close
269:
270: # Corrupt the root page of table t1 so that the first offset in the
271: # cell-offset array points to the data for the SQL blob associated with
272: # record (rowid=10). The root page still passes the checks in btreeInitPage(),
273: # because the start of said blob looks like the start of a legitimate
274: # page cell.
275: #
276: # Test case cc-2 overwrites the blob so that it no longer looks like a
277: # real cell. But, by the time it is overwritten, btreeInitPage() has already
278: # initialized the root page, so no corruption is detected.
279: #
280: # Test case cc-3 inserts an extra record into t1, forcing balance-deeper
281: # to run. After copying the contents of the root page to the new child,
282: # btreeInitPage() is called on the child. This time, it detects corruption
283: # (because the start of the blob associated with the (rowid=10) record
284: # no longer looks like a real cell). At one point the code assumed that
285: # detecting corruption was not possible at that point, and an assert() failed.
286: #
287: set fd [open test.db r+]
288: fconfigure $fd -translation binary -encoding binary
289: seek $fd [expr 1024+8]
290: puts -nonewline $fd "\x03\x14"
291: close $fd
292:
293: sqlite3 db test.db
294: do_test corrupt-7.2 {
295: execsql {
296: UPDATE t1 SET x = X'870400020003000400050006000700080009000A'
297: WHERE rowid = 10;
298: }
299: } {}
300: do_test corrupt-7.3 {
301: catchsql {
302: INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
303: }
304: } {1 {database disk image is malformed}}
305: }
306:
307: db close
308: forcedelete test.db test.db-journal
309: do_test corrupt-8.1 {
310: sqlite3 db test.db
311: execsql {
312: PRAGMA page_size = 1024;
313: PRAGMA secure_delete = on;
314: PRAGMA auto_vacuum = 0;
315: CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
316: INSERT INTO t1 VALUES(5, randomblob(1900));
317: }
318:
319: hexio_write test.db 2044 [hexio_render_int32 2]
320: hexio_write test.db 24 [hexio_render_int32 45]
321:
322: catchsql { INSERT OR REPLACE INTO t1 VALUES(5, randomblob(1900)) }
323: } {1 {database disk image is malformed}}
324:
325: db close
326: forcedelete test.db test.db-journal
327: do_test corrupt-8.2 {
328: sqlite3 db test.db
329: execsql {
330: PRAGMA page_size = 1024;
331: PRAGMA secure_delete = on;
332: PRAGMA auto_vacuum = 0;
333: CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
334: INSERT INTO t1 VALUES(5, randomblob(900));
335: INSERT INTO t1 VALUES(6, randomblob(900));
336: }
337:
338: hexio_write test.db 2047 FF
339: hexio_write test.db 24 [hexio_render_int32 45]
340:
341: catchsql { INSERT INTO t1 VALUES(4, randomblob(1900)) }
342: } {1 {database disk image is malformed}}
343:
344: finish_test
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>