Home | History | Annotate | Download | only in test
      1 # 2004 August 30 {}
      2 #
      3 # The author disclaims copyright to this source code.  In place of
      4 # a legal notice, here is a blessing:
      5 #
      6 #    May you do good and not evil.
      7 #    May you find forgiveness for yourself and forgive others.
      8 #    May you share freely, never taking more than you give.
      9 #
     10 #***********************************************************************
     11 # This file implements regression tests for SQLite library.
     12 #
     13 # This file implements tests to make sure SQLite does not crash or
     14 # segfault if it sees a corrupt database file.
     15 #
     16 # $Id: corrupt.test,v 1.12 2009/07/13 09:41:45 danielk1977 Exp $
     17 
     18 catch {file delete -force test.db test.db-journal test.bu}
     19 
     20 set testdir [file dirname $argv0]
     21 source $testdir/tester.tcl
     22 
     23 # Do not use a codec for tests in this file, as the database file is
     24 # manipulated directly using tcl scripts (using the [hexio_write] command).
     25 #
     26 do_not_use_codec
     27 
     28 # Construct a large database for testing.
     29 #
     30 do_test corrupt-1.1 {
     31   execsql {
     32     BEGIN;
     33     CREATE TABLE t1(x);
     34     INSERT INTO t1 VALUES(randstr(100,100));
     35     INSERT INTO t1 VALUES(randstr(90,90));
     36     INSERT INTO t1 VALUES(randstr(80,80));
     37     INSERT INTO t1 SELECT x || randstr(5,5) FROM t1;
     38     INSERT INTO t1 SELECT x || randstr(6,6) FROM t1;
     39     INSERT INTO t1 SELECT x || randstr(7,7) FROM t1;
     40     INSERT INTO t1 SELECT x || randstr(8,8) FROM t1;
     41     INSERT INTO t1 VALUES(randstr(3000,3000));
     42     INSERT INTO t1 SELECT x || randstr(9,9) FROM t1;
     43     INSERT INTO t1 SELECT x || randstr(10,10) FROM t1;
     44     INSERT INTO t1 SELECT x || randstr(11,11) FROM t1;
     45     INSERT INTO t1 SELECT x || randstr(12,12) FROM t1;
     46     CREATE INDEX t1i1 ON t1(x);
     47     CREATE TABLE t2 AS SELECT * FROM t1;
     48     DELETE FROM t2 WHERE rowid%5!=0;
     49     COMMIT;
     50   }
     51 } {}
     52 integrity_check corrupt-1.2
     53 
     54 # Copy file $from into $to
     55 #
     56 proc copy_file {from to} {
     57   set f [open $from]
     58   fconfigure $f -translation binary
     59   set t [open $to w]
     60   fconfigure $t -translation binary
     61   puts -nonewline $t [read $f [file size $from]]
     62   close $t
     63   close $f
     64 }
     65 
     66 # Setup for the tests.  Make a backup copy of the good database in test.bu.
     67 # Create a string of garbage data that is 256 bytes long.
     68 #
     69 copy_file test.db test.bu
     70 set fsize [file size test.db]
     71 set junk "abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
     72 while {[string length $junk]<256} {append junk $junk}
     73 set junk [string range $junk 0 255]
     74 
     75 # Go through the database and write garbage data into each 256 segment
     76 # of the file.  Then do various operations on the file to make sure that
     77 # the database engine can recover gracefully from the corruption.
     78 #
     79 for {set i [expr {1*256}]} {$i<$fsize-256} {incr i 256} {
     80   set tn [expr {$i/256}]
     81   db close
     82   copy_file test.bu test.db
     83   set fd [open test.db r+]
     84   fconfigure $fd -translation binary
     85   seek $fd $i
     86   puts -nonewline $fd $junk
     87   close $fd
     88   do_test corrupt-2.$tn.1 {
     89     sqlite3 db test.db
     90     catchsql {SELECT count(*) FROM sqlite_master}
     91     set x {}
     92   } {}
     93   do_test corrupt-2.$tn.2 {
     94     catchsql {SELECT count(*) FROM t1}
     95     set x {}
     96   } {}
     97   do_test corrupt-2.$tn.3 {
     98     catchsql {SELECT count(*) FROM t1 WHERE x>'abcdef'}
     99     set x {}
    100   } {}
    101   do_test corrupt-2.$tn.4 {
    102     catchsql {SELECT count(*) FROM t2}
    103     set x {}
    104   } {}
    105   do_test corrupt-2.$tn.5 {
    106     catchsql {CREATE TABLE t3 AS SELECT * FROM t1}
    107     set x {}
    108   } {}
    109   do_test corrupt-2.$tn.6 {
    110     catchsql {DROP TABLE t1}
    111     set x {}
    112   } {}
    113   do_test corrupt-2.$tn.7 {
    114     catchsql {PRAGMA integrity_check}
    115     set x {}
    116   } {}
    117 
    118   # Check that no page references were leaked.
    119   do_test corrupt-2.$tn.8 {
    120     set bt [btree_from_db db]
    121     db_enter db
    122     array set stats [btree_pager_stats $bt]
    123     db_leave db
    124     set stats(ref)
    125   } {0}
    126 }  
    127 
    128 #------------------------------------------------------------------------
    129 # For these tests, swap the rootpage entries of t1 (a table) and t1i1 (an
    130 # index on t1) in sqlite_master. Then perform a few different queries
    131 # and make sure this is detected as corruption.
    132 #
    133 do_test corrupt-3.1 {
    134   db close
    135   copy_file test.bu test.db
    136   sqlite3 db test.db
    137   list
    138 } {}
    139 do_test corrupt-3.2 {
    140   set t1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1i1'}]
    141   set t1i1_r [execsql {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
    142   set cookie [expr [execsql {PRAGMA schema_version}] + 1]
    143   execsql "
    144     PRAGMA writable_schema = 1;
    145     UPDATE sqlite_master SET rootpage = $t1_r WHERE name = 't1';
    146     UPDATE sqlite_master SET rootpage = $t1i1_r WHERE name = 't1i1';
    147     PRAGMA writable_schema = 0;
    148     PRAGMA schema_version = $cookie;
    149   "
    150 } {}
    151 
    152 # This one tests the case caught by code in checkin [2313].
    153 do_test corrupt-3.3 {
    154   db close
    155   sqlite3 db test.db
    156   catchsql {
    157     INSERT INTO t1 VALUES('abc');
    158   }
    159 } {1 {database disk image is malformed}}
    160 do_test corrupt-3.4 {
    161   db close
    162   sqlite3 db test.db
    163   catchsql {
    164     SELECT * FROM t1;
    165   }
    166 } {1 {database disk image is malformed}}
    167 do_test corrupt-3.5 {
    168   db close
    169   sqlite3 db test.db
    170   catchsql {
    171     SELECT * FROM t1 WHERE oid = 10;
    172   }
    173 } {1 {database disk image is malformed}}
    174 do_test corrupt-3.6 {
    175   db close
    176   sqlite3 db test.db
    177   catchsql {
    178     SELECT * FROM t1 WHERE x = 'abcde';
    179   }
    180 } {1 {database disk image is malformed}}
    181 
    182 do_test corrupt-4.1 {
    183   db close
    184   file delete -force test.db test.db-journal
    185   sqlite3 db test.db
    186   execsql {
    187     PRAGMA page_size = 1024;
    188     CREATE TABLE t1(a INTEGER PRIMARY KEY, b TEXT);
    189   }
    190   for {set i 0} {$i < 10} {incr i} {
    191     set text [string repeat $i 220]
    192     execsql { INSERT INTO t1 VALUES($i, $text) }
    193   }
    194   execsql { CREATE INDEX i1 ON t1(b) }
    195 } {}
    196 do_test corrupt-4.2 {
    197   set iRoot [db one {SELECT rootpage FROM sqlite_master WHERE name = 'i1'}]
    198   set iOffset [hexio_get_int [hexio_read test.db [expr 12+($iRoot-1)*1024] 2]]
    199   set data [hexio_render_int32 [expr $iRoot - 1]]
    200   hexio_write test.db [expr ($iRoot-1)*1024 + $iOffset] $data
    201   db close
    202   sqlite3 db test.db
    203 
    204   # The following DELETE statement attempts to delete a cell stored on the
    205   # root page of index i1. After this cell is deleted it must be replaced
    206   # by a cell retrieved from the child page (a leaf) of the deleted cell.
    207   # This will fail, as the block modified the database image so that the
    208   # child page of the deleted cell is from a table (intkey) b-tree, not an
    209   # index b-tree as expected. At one point this was causing an assert()
    210   # to fail.
    211   catchsql { DELETE FROM t1 WHERE rowid = 3 }
    212 } {1 {database disk image is malformed}}
    213 
    214 do_test corrupt-5.1 {
    215   db close
    216   file delete -force test.db test.db-journal
    217   sqlite3 db test.db
    218 
    219   execsql { PRAGMA page_size = 1024 }
    220   set ct "CREATE TABLE t1(c0 "
    221   set i 0
    222   while {[string length $ct] < 950} { append ct ", c[incr i]" }
    223   append ct ")"
    224   execsql $ct
    225 } {}
    226 
    227 do_test corrupt-5.2 {
    228   db close
    229   hexio_write test.db 108 00000000 
    230   sqlite3 db test.db
    231   catchsql { SELECT * FROM sqlite_master }
    232 } {1 {database disk image is malformed}}
    233 
    234 # At one point, the specific corruption caused by this test case was
    235 # causing a buffer overwrite. Although a crash was never demonstrated,
    236 # running this testcase under valgrind revealed the problem.
    237 do_test corrupt-6.1 {
    238   db close
    239   file delete -force test.db test.db-journal
    240   sqlite3 db test.db
    241   execsql { 
    242     PRAGMA page_size = 1024; CREATE TABLE t1(x);
    243   }
    244 
    245   # The root page of t1 is 1024 bytes in size. The header is 8 bytes, and
    246   # each of the cells inserted by the following INSERT statements consume
    247   # 16 bytes (including the 2 byte cell-offset array entry). So the page
    248   # can contain up to 63 cells.
    249   for {set i 0} {$i < 63} {incr i} {
    250     execsql { INSERT INTO t1 VALUES( randomblob(10) ) }
    251   }
    252 
    253   # Free the cell stored right at the end of the page (at offset pgsz-14).
    254   execsql { DELETE FROM t1 WHERE rowid=1 }
    255   set rootpage [db one {SELECT rootpage FROM sqlite_master WHERE name = 't1'}]
    256   db close
    257 
    258   set offset [expr ($rootpage * 1024)-14+2]
    259   hexio_write test.db $offset 00FF
    260   sqlite3 db test.db 
    261 
    262   catchsql { INSERT INTO t1 VALUES( randomblob(10) ) }
    263 } {1 {database disk image is malformed}}
    264 
    265 ifcapable oversize_cell_check {
    266   db close
    267   file delete -force test.db test.db-journal
    268   sqlite3 db test.db
    269   execsql { 
    270     PRAGMA page_size = 1024; CREATE TABLE t1(x);
    271   }
    272 
    273   do_test corrupt-7.1 {
    274     for {set i 0} {$i < 39} {incr i} {
    275       execsql {
    276         INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
    277       }
    278     }
    279   } {}
    280   db close
    281   
    282   # Corrupt the root page of table t1 so that the first offset in the 
    283   # cell-offset array points to the data for the SQL blob associated with
    284   # record (rowid=10). The root page still passes the checks in btreeInitPage(),
    285   # because the start of said blob looks like the start of a legitimate 
    286   # page cell.
    287   #
    288   # Test case cc-2 overwrites the blob so that it no longer looks like a
    289   # real cell. But, by the time it is overwritten, btreeInitPage() has already
    290   # initialized the root page, so no corruption is detected.
    291   #
    292   # Test case cc-3 inserts an extra record into t1, forcing balance-deeper
    293   # to run. After copying the contents of the root page to the new child,
    294   # btreeInitPage() is called on the child. This time, it detects corruption
    295   # (because the start of the blob associated with the (rowid=10) record
    296   # no longer looks like a real cell). At one point the code assumed that 
    297   # detecting corruption was not possible at that point, and an assert() failed.
    298   #
    299   set fd [open test.db r+]
    300   fconfigure $fd -translation binary -encoding binary
    301   seek $fd [expr 1024+8]
    302   puts -nonewline $fd "\x03\x14"
    303   close $fd
    304   
    305   sqlite3 db test.db
    306   do_test corrupt-7.2 {
    307     execsql { 
    308       UPDATE t1 SET x = X'870400020003000400050006000700080009000A' 
    309       WHERE rowid = 10;
    310     }
    311   } {}
    312   do_test corrupt-7.3 {
    313     catchsql {
    314       INSERT INTO t1 VALUES(X'000100020003000400050006000700080009000A');
    315     }
    316   } {1 {database disk image is malformed}}
    317 }
    318 
    319 db close
    320 file delete -force test.db test.db-journal
    321 do_test corrupt-8.1 {
    322   sqlite3 db test.db
    323   execsql {
    324     PRAGMA page_size = 1024;
    325     PRAGMA secure_delete = on;
    326     PRAGMA auto_vacuum = 0;
    327     CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
    328     INSERT INTO t1 VALUES(5, randomblob(1900));
    329   }
    330 
    331   hexio_write test.db 2044 [hexio_render_int32 2]
    332   hexio_write test.db 24   [hexio_render_int32 45]
    333 
    334   catchsql { INSERT OR REPLACE INTO t1 VALUES(5, randomblob(1900)) }
    335 } {1 {database disk image is malformed}}
    336 
    337 db close
    338 file delete -force test.db test.db-journal
    339 do_test corrupt-8.2 {
    340   sqlite3 db test.db
    341   execsql {
    342     PRAGMA page_size = 1024;
    343     PRAGMA secure_delete = on;
    344     PRAGMA auto_vacuum = 0;
    345     CREATE TABLE t1(x INTEGER PRIMARY KEY, y);
    346     INSERT INTO t1 VALUES(5, randomblob(900));
    347     INSERT INTO t1 VALUES(6, randomblob(900));
    348   }
    349 
    350   hexio_write test.db 2047 FF
    351   hexio_write test.db 24   [hexio_render_int32 45]
    352 
    353   catchsql { INSERT INTO t1 VALUES(4, randomblob(1900)) }
    354 } {1 {database disk image is malformed}}
    355 
    356 finish_test
    357