3 # The author disclaims copyright to this source code. In place of
4 # a legal notice, here is a blessing:
6 # May you do good and not evil.
7 # May you find forgiveness for yourself and forgive others.
8 # May you share freely, never taking more than you give.
10 #***********************************************************************
12 # This file attempts to check the behavior of the SQLite library in
13 # an out-of-memory situation. When compiled with -DSQLITE_DEBUG=1,
14 # the SQLite library accepts a special command (sqlite3_memdebug_fail N C)
15 # which causes the N-th malloc to fail. This special feature is used
16 # to see what happens in the library if a malloc were to really fail
17 # due to an out-of-memory situation.
19 # $Id: malloc.test,v 1.81 2009/06/24 13:13:45 drh Exp $
21 set testdir [file dirname $argv0]
22 source $testdir/tester.tcl
23 set ::testprefix malloc
26 # Only run these tests if memory debugging is turned on.
28 source $testdir/malloc_common.tcl
30 puts "Skipping malloc tests: not compiled with -DSQLITE_MEMDEBUG..."
35 # Do a couple of memory dumps just to exercise the memory dump logic
36 # that that we can say that we have.
38 puts stderr "This is a test. Ignore the error that follows:"
39 sqlite3_memdebug_dump $testdir
40 puts "Memory dump to file memdump.txt..."
41 sqlite3_memdebug_dump memdump.txt
43 ifcapable bloblit&&subquery {
44 do_malloc_test 1 -tclprep {
47 if {[catch {sqlite3 db test.db}]} {
50 sqlite3_extended_result_codes db 1
52 DROP TABLE IF EXISTS t1;
54 a int, b float, c double, d text, e varchar(20),
57 CREATE INDEX i1 ON t1(a,b);
58 INSERT INTO t1 VALUES(1,2.3,4.5,'hi',x'746865726500');
59 INSERT INTO t1 VALUES(6,7.0,0.8,'hello','out yonder');
61 SELECT avg(b) FROM t1 GROUP BY a HAVING b>20.0;
62 DELETE FROM t1 WHERE a IN (SELECT min(a) FROM t1);
63 SELECT count(*), group_concat(e) FROM t1;
64 SELECT b FROM t1 ORDER BY 1 COLLATE nocase;
68 # Ensure that no file descriptors were leaked.
71 set sqlite_open_file_count
75 do_malloc_test 2 -sqlbody {
76 CREATE TABLE t1(a int, b int default 'abc', c int default 1);
77 CREATE INDEX i1 ON t1(a,b);
78 INSERT INTO t1 VALUES(1,1,'99 abcdefghijklmnopqrstuvwxyz');
79 INSERT INTO t1 VALUES(2,4,'98 abcdefghijklmnopqrstuvwxyz');
80 INSERT INTO t1 VALUES(3,9,'97 abcdefghijklmnopqrstuvwxyz');
81 INSERT INTO t1 VALUES(4,16,'96 abcdefghijklmnopqrstuvwxyz');
82 INSERT INTO t1 VALUES(5,25,'95 abcdefghijklmnopqrstuvwxyz');
83 INSERT INTO t1 VALUES(6,36,'94 abcdefghijklmnopqrstuvwxyz');
84 SELECT 'stuff', count(*) as 'other stuff', max(a+10) FROM t1;
85 UPDATE t1 SET b=b||b||b||b;
86 UPDATE t1 SET b=a WHERE a in (10,12,22);
87 INSERT INTO t1(c,b,a) VALUES(20,10,5);
88 INSERT INTO t1 SELECT * FROM t1
89 WHERE a IN (SELECT a FROM t1 WHERE a<10);
90 DELETE FROM t1 WHERE a>=10;
96 # Ensure that no file descriptors were leaked.
99 set sqlite_open_file_count
102 do_malloc_test 3 -sqlbody {
104 CREATE TABLE t1(a int, b int, c int);
105 CREATE INDEX i1 ON t1(a,b);
106 INSERT INTO t1 VALUES(1,1,99);
107 INSERT INTO t1 VALUES(2,4,98);
108 INSERT INTO t1 VALUES(3,9,97);
109 INSERT INTO t1 VALUES(4,16,96);
110 INSERT INTO t1 VALUES(5,25,95);
111 INSERT INTO t1 VALUES(6,36,94);
112 INSERT INTO t1(c,b,a) VALUES(20,10,5);
113 DELETE FROM t1 WHERE a>=10;
120 # Ensure that no file descriptors were leaked.
123 set sqlite_open_file_count
127 do_malloc_test 4 -sqlbody {
129 CREATE TABLE t1(a int, b int, c int);
130 CREATE INDEX i1 ON t1(a,b);
131 INSERT INTO t1 VALUES(1,1,99);
132 INSERT INTO t1 VALUES(2,4,98);
133 INSERT INTO t1 VALUES(3,9,97);
134 INSERT INTO t1 VALUES(4,16,96);
135 INSERT INTO t1 VALUES(5,25,95);
136 INSERT INTO t1 VALUES(6,36,94);
137 UPDATE t1 SET b=a WHERE a in (10,12,22);
138 INSERT INTO t1 SELECT * FROM t1
139 WHERE a IN (SELECT a FROM t1 WHERE a<10);
146 # Ensure that no file descriptors were leaked.
149 set sqlite_open_file_count
153 do_malloc_test 5 -sqlbody {
155 CREATE TABLE t1(a,b);
156 CREATE TABLE t2(x,y);
157 CREATE TRIGGER r1 AFTER INSERT ON t1 WHEN new.a = 2 BEGIN
158 INSERT INTO t2(x,y) VALUES(new.rowid,1);
159 INSERT INTO t2(x,y) SELECT * FROM t2;
160 INSERT INTO t2 SELECT * FROM t2;
161 UPDATE t2 SET y=y+1 WHERE x=new.rowid;
163 DELETE FROM t2 WHERE x=new.rowid;
165 INSERT INTO t1(a,b) VALUES(2,3);
170 # Ensure that no file descriptors were leaked.
173 set sqlite_open_file_count
177 do_malloc_test 6 -sqlprep {
180 INSERT INTO t1 VALUES(1);
181 INSERT INTO t1 SELECT a*2 FROM t1;
182 INSERT INTO t1 SELECT a*2 FROM t1;
183 INSERT INTO t1 SELECT a*2 FROM t1;
184 INSERT INTO t1 SELECT a*2 FROM t1;
185 INSERT INTO t1 SELECT a*2 FROM t1;
186 INSERT INTO t1 SELECT a*2 FROM t1;
187 INSERT INTO t1 SELECT a*2 FROM t1;
188 INSERT INTO t1 SELECT a*2 FROM t1;
189 INSERT INTO t1 SELECT a*2 FROM t1;
190 INSERT INTO t1 SELECT a*2 FROM t1;
191 DELETE FROM t1 where rowid%5 = 0;
198 autoinstall_test_functions
199 do_malloc_test 7 -sqlprep {
200 CREATE TABLE t1(a, b);
201 INSERT INTO t1 VALUES(1, 2);
202 INSERT INTO t1 VALUES(3, 4);
203 INSERT INTO t1 VALUES(5, 6);
204 INSERT INTO t1 VALUES(7, randstr(1200,1200));
206 SELECT min(a) FROM t1 WHERE a<6 GROUP BY b;
207 SELECT a FROM t1 WHERE a<6 ORDER BY a;
208 SELECT b FROM t1 WHERE a>6;
211 # This block is designed to test that some malloc failures that may
212 # occur in vdbeapi.c. Specifically, if a malloc failure that occurs
213 # when converting UTF-16 text to integers and real numbers is handled
216 # This is done by retrieving a string from the database engine and
217 # manipulating it using the sqlite3_column_*** APIs. This doesn't
218 # actually return an error to the user when a malloc() fails.. That
219 # could be viewed as a bug.
221 # These tests only run if UTF-16 support is compiled in.
225 do_malloc_test 8 -tclprep {
226 set sql "SELECT '[string repeat abc 20]', '[string repeat def 20]', ?"
227 set ::STMT [sqlite3_prepare db $sql -1 X]
229 if { $::tcl_platform(byteOrder)=="littleEndian" } {
230 set ::bomstr "\xFF\xFE"
232 set ::bomstr "\xFE\xFF"
234 append ::bomstr [encoding convertto unicode "123456789_123456789_123456789"]
236 sqlite3_column_text16 $::STMT 0
237 sqlite3_column_int $::STMT 0
238 sqlite3_column_text16 $::STMT 1
239 sqlite3_column_double $::STMT 1
240 set rc [sqlite3_reset $::STMT]
241 if {$rc eq "SQLITE_NOMEM"} {error "out of memory"}
242 sqlite3_bind_text16 $::STMT 1 $::bomstr 60
243 #catch {sqlite3_finalize $::STMT}
244 #if {[lindex [sqlite_malloc_stat] 2]<=0} {
245 # error "out of memory"
249 sqlite3_finalize $::STMT
255 # This block tests that malloc() failures that occur whilst commiting
256 # a multi-file transaction are handled correctly.
258 do_malloc_test 9 -sqlprep {
259 ATTACH 'test2.db' as test2;
260 CREATE TABLE abc1(a, b, c);
261 CREATE TABLE test2.abc2(a, b, c);
264 INSERT INTO abc1 VALUES(1, 2, 3);
265 INSERT INTO abc2 VALUES(1, 2, 3);
269 # This block tests malloc() failures that occur while opening a
270 # connection to a database.
271 do_malloc_test 10 -tclprep {
274 forcedelete test.db test.db-journal
276 sqlite3_extended_result_codes db 1
277 db eval {CREATE TABLE abc(a, b, c)}
281 sqlite3_extended_result_codes db2 1
282 db2 eval {SELECT * FROM sqlite_master}
286 # This block tests malloc() failures that occur within calls to
287 # sqlite3_create_function().
288 do_malloc_test 11 -tclbody {
289 set rc [sqlite3_create_function db]
290 if {[string match $rc SQLITE_OK]} {
291 set rc [sqlite3_create_aggregate db]
293 if {[string match $rc SQLITE_NOMEM]} {
294 error "out of memory"
298 do_malloc_test 12 -tclbody {
299 set sql16 [encoding convertto unicode "SELECT * FROM sqlite_master"]
300 append sql16 "\00\00"
301 set ::STMT [sqlite3_prepare16 db $sql16 -1 DUMMY]
302 sqlite3_finalize $::STMT
305 # Test malloc errors when replaying two hot journals from a 2-file
307 ifcapable crashtest&&attach {
308 do_malloc_test 13 -tclprep {
309 set rc [crashsql -delay 1 -file test2.db {
310 ATTACH 'test2.db' as aux;
311 PRAGMA cache_size = 10;
313 CREATE TABLE aux.t2(a, b, c);
314 CREATE TABLE t1(a, b, c);
317 if {$rc!="1 {child process exited abnormally}"} {
318 error "Wrong error message: $rc"
321 db eval {ATTACH 'test2.db' as aux;}
322 set rc [catch {db eval {
326 if {$rc && $err!="no such table: t1"} {
332 if {$tcl_platform(platform)!="windows" && [atomic_batch_write test.db]==0} {
333 do_malloc_test 14 -tclprep {
336 sqlite3_extended_result_codes db2 1
338 PRAGMA journal_mode = DELETE; /* For inmemory_journal permutation */
339 PRAGMA synchronous = 0;
340 CREATE TABLE t1(a, b);
341 INSERT INTO t1 VALUES(1, 2);
343 INSERT INTO t1 VALUES(3, 4);
345 forcecopy test2.db test.db
346 forcecopy test2.db-journal test.db-journal
350 sqlite3_extended_result_codes db 1
352 # If an out-of-memory occurs within a call to a VFS layer function during
353 # hot-journal rollback, sqlite will report SQLITE_CORRUPT. See commit
354 # [5668] for details.
355 set rc [catch {db eval { SELECT * FROM t1 }} msg]
356 if {$msg eq "database disk image is malformed"} { set msg "out of memory" }
357 if {$rc} { error $msg }
362 proc string_compare {a b} {
363 return [string compare $a $b]
366 # Test for malloc() failures in sqlite3_create_collation() and
367 # sqlite3_create_collation16().
370 do_malloc_test 15 -start 4 -tclbody {
371 db collate string_compare string_compare
372 if {[catch {add_test_collate db 1 1 1} msg]} {
373 if {$msg=="SQLITE_NOMEM"} {set msg "out of memory"}
377 db complete {SELECT "hello """||'world"' [microsoft], * FROM anicetable;}
378 db complete {-- Useful comment}
381 CREATE TABLE t1(a, b COLLATE string_compare);
382 INSERT INTO t1 VALUES(10, 'string');
383 INSERT INTO t1 VALUES(10, 'string2');
388 # Also test sqlite3_complete(). There are (currently) no malloc()
389 # calls in this function, but test anyway against future changes.
391 do_malloc_test 16 -tclbody {
392 db complete {SELECT "hello """||'world"' [microsoft], * FROM anicetable;}
393 db complete {-- Useful comment}
395 SELECT * FROM sqlite_master;
399 # Test handling of malloc() failures in sqlite3_open16().
402 do_malloc_test 17 -tclbody {
406 # open database using sqlite3_open16()
407 set filename [encoding convertto unicode test.db]
408 append filename "\x00\x00"
409 set DB2 [sqlite3_open16 $filename -unused]
411 error "out of memory"
413 sqlite3_extended_result_codes $DB2 1
416 set rc [catch {sqlite3_prepare $DB2 {SELECT * FROM sqlite_master} -1 X} msg]
417 if {[sqlite3_errcode $DB2] eq "SQLITE_IOERR+12"} {
418 error "out of memory"
420 if {[regexp ".*automatic extension loading.*" [sqlite3_errmsg $DB2]]} {
421 error "out of memory"
424 error [string range $msg 4 end]
429 set rc [sqlite3_finalize $STMT]
430 if {$rc!="SQLITE_OK"} {
431 error [sqlite3_errmsg $DB2]
436 set rc [sqlite3_close $DB2]
437 if {$rc!="SQLITE_OK"} {
438 error [sqlite3_errmsg $DB2]
443 sqlite3_finalize $STMT
446 set rc [sqlite3_close $DB2]
451 # Test handling of malloc() failures in sqlite3_errmsg16().
454 do_malloc_test 18 -tclprep {
456 db eval "SELECT [string repeat longcolumnname 10] FROM sqlite_master"
459 set utf16 [sqlite3_errmsg16 [sqlite3_connection_pointer db]]
460 binary scan $utf16 c* bytes
461 if {[llength $bytes]==0} {
462 error "out of memory"
467 # This test is aimed at coverage testing. Specificly, it is supposed to
468 # cause a malloc() only used when converting between the two utf-16
469 # encodings to fail (i.e. little-endian->big-endian). It only actually
470 # hits this malloc() on little-endian hosts.
472 set static_string "\x00h\x00e\x00l\x00l\x00o"
473 for {set l 0} {$l<10} {incr l} {
474 append static_string $static_string
476 append static_string "\x00\x00"
477 do_malloc_test 19 -tclprep {
479 PRAGMA encoding = "UTF16be";
480 CREATE TABLE abc(a, b, c);
483 unset -nocomplain ::STMT
485 set ::STMT [sqlite3_prepare db {SELECT ?} -1 DUMMY]
486 sqlite3_bind_text16 -static $::STMT 1 $static_string 112
488 if {$r} {error [string range $msg 4 end]}
491 if {[info exists ::STMT]} {
492 sqlite3_finalize $::STMT
497 # Make sure SQLITE_NOMEM is reported out on an ATTACH failure even
498 # when the malloc failure occurs within the nested parse.
501 do_malloc_test 20 -tclprep {
503 forcedelete test2.db test2.db-journal
505 sqlite3_extended_result_codes db 1
506 db eval {CREATE TABLE t1(x);}
509 if {[catch {sqlite3 db test.db}]} {
510 error "out of memory"
512 sqlite3_extended_result_codes db 1
514 ATTACH DATABASE 'test2.db' AS t2;
520 # Test malloc failure whilst installing a foreign key.
522 ifcapable foreignkey {
523 do_malloc_test 21 -sqlbody {
524 CREATE TABLE abc(a, b, c, FOREIGN KEY(a) REFERENCES abc(b))
528 # Test malloc failure in an sqlite3_prepare_v2() call.
530 do_malloc_test 22 -tclbody {
534 sqlite3_prepare_v2 db "SELECT * FROM sqlite_master" -1 DUMMY
537 if {$r} {error [string range $msg 4 end]}
540 sqlite3_finalize $::STMT
545 ifcapable {pager_pragmas} {
546 # This tests a special case - that an error that occurs while the pager
547 # is trying to recover from error-state in exclusive-access mode works.
549 do_malloc_test 23 -tclprep {
551 PRAGMA cache_size = 10;
552 PRAGMA locking_mode = exclusive;
554 CREATE TABLE abc(a, b, c);
555 CREATE INDEX abc_i ON abc(a, b, c);
557 VALUES(randstr(100,100), randstr(100,100), randstr(100,100));
559 SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc;
561 SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc;
563 SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc;
565 SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc;
567 SELECT randstr(100,100), randstr(100,100), randstr(100,100) FROM abc;
571 # This puts the pager into error state.
574 db eval {UPDATE abc SET a = 0 WHERE oid%2}
575 set ::sqlite_io_error_pending 10
576 catch {db eval {ROLLBACK}} msg
579 # If an out-of-memory occurs within a call to a VFS layer function during
580 # hot-journal rollback, sqlite will report SQLITE_CORRUPT. See commit
581 # [5668] for details.
582 set rc [catch {db eval { SELECT * FROM abc LIMIT 10 }} msg]
583 if {$msg eq "database disk image is malformed"} { set msg "out of memory" }
584 if {$rc} { error $msg }
587 set e [db eval {PRAGMA integrity_check}]
588 if {$e ne "ok"} {error $e}
593 do_malloc_test 24 -sqlprep {
594 CREATE TABLE t1(a, b, c)
596 SELECT 1 FROM t1 UNION SELECT 2 FROM t1 ORDER BY 1
600 ifcapable view&&trigger {
601 do_malloc_test 25 -sqlprep {
602 CREATE TABLE t1(a, b, c);
603 CREATE VIEW v1 AS SELECT * FROM t1;
604 CREATE TRIGGER v1t1 INSTEAD OF DELETE ON v1 BEGIN SELECT 1; END;
605 CREATE TRIGGER v1t2 INSTEAD OF INSERT ON v1 BEGIN SELECT 1; END;
606 CREATE TRIGGER v1t3 INSTEAD OF UPDATE ON v1 BEGIN SELECT 1; END;
608 DELETE FROM v1 WHERE a = 1;
609 INSERT INTO v1 VALUES(1, 2, 3);
610 UPDATE v1 SET a = 1 WHERE b = 2;
614 do_malloc_test 25 -sqlprep {
615 CREATE TABLE abc(a, b, c);
616 CREATE INDEX i1 ON abc(a, b);
617 INSERT INTO abc VALUES(1, 2, 3);
618 INSERT INTO abc VALUES(4, 5, 6);
620 # For each UPDATE executed, the cursor used for the SELECT statement
621 # must be "saved". Because the cursor is open on an index, this requires
622 # a malloc() to allocate space to save the index key. This test case is
623 # aimed at testing the response of the library to a failure in that
624 # particular malloc() call.
625 db eval {SELECT a FROM abc ORDER BY a} {
626 db eval {UPDATE abc SET b = b - 1 WHERE a = $a}
630 # This test is designed to test a specific juncture in the sqlite code.
631 # The database set up by -sqlprep script contains a single table B-Tree
632 # of height 2. In the -tclbody script, the existing database connection
633 # is closed and a new one opened and used to insert a new row into the
634 # table B-Tree. By using a new connection, the outcome of a malloc()
635 # failure while seeking to the right-hand side of the B-Tree to insert
636 # a new record can be tested.
638 do_malloc_test 26 -sqlprep {
640 CREATE TABLE t1(a, b);
641 INSERT INTO t1 VALUES(1, randomblob(210));
642 INSERT INTO t1 VALUES(1, randomblob(210));
643 INSERT INTO t1 VALUES(1, randomblob(210));
644 INSERT INTO t1 VALUES(1, randomblob(210));
645 INSERT INTO t1 VALUES(1, randomblob(210));
650 db eval { INSERT INTO t1 VALUES(1, randomblob(210)) }
653 # Test that no memory is leaked following a malloc() failure in
654 # sqlite3_initialize().
656 do_malloc_test 27 -tclprep {
660 set rc [sqlite3_initialize]
661 if {$rc == "SQLITE_NOMEM"} {
662 error "out of memory"
665 autoinstall_test_functions
667 # Test that malloc failures that occur while processing INDEXED BY
668 # clauses are handled correctly.
669 do_malloc_test 28 -sqlprep {
670 CREATE TABLE t1(a, b);
671 CREATE INDEX i1 ON t1(a);
672 CREATE VIEW v1 AS SELECT * FROM t1 INDEXED BY i1 WHERE a = 10;
674 SELECT * FROM t1 INDEXED BY i1 ORDER BY a;
678 do_malloc_test 29 -sqlprep {
679 CREATE TABLE t1(a TEXT, b TEXT);
681 INSERT INTO t1 VALUES(1, -234);
682 INSERT INTO t1 SELECT * FROM t1 UNION ALL SELECT * FROM t1;
685 do_malloc_test 30 -tclprep {
687 CREATE TABLE t1(x PRIMARY KEY);
688 INSERT INTO t1 VALUES(randstr(500,500));
689 INSERT INTO t1 VALUES(randstr(500,500));
690 INSERT INTO t1 VALUES(randstr(500,500));
695 # The DELETE command in the following block moves the overflow pages that
696 # are part of the primary key index to the free-list. But it does not
697 # actually load the content of the pages. This leads to the peculiar
698 # situation where cache entries exist, but are not populated with data.
699 # They are populated next time they are requested by the b-tree layer.
707 -- This statement requires the 'no-content' pages loaded by the DELETE
708 -- statement above. When requesting the pages, the content is loaded
709 -- from the database file. The point of this test case is to test handling
710 -- of malloc errors (including SQLITE_IOERR_NOMEM errors) when loading
712 SELECT * FROM t1 ORDER BY x;
715 # After committing a transaction in persistent-journal mode, if a journal
716 # size limit is configured SQLite may attempt to truncate the journal file.
717 # This test verifies the libraries response to a malloc() failure during
720 do_malloc_test 31 -sqlprep {
721 PRAGMA journal_mode = persist;
722 PRAGMA journal_size_limit = 1024;
723 CREATE TABLE t1(a PRIMARY KEY, b);
725 INSERT INTO t1 VALUES(1, 2);
728 # When written, this test provoked an obscure change-counter bug.
730 # If, when running in exclusive mode, a malloc() failure occurs
731 # after the database file change-counter has been written but
732 # before the transaction has been committed, then the transaction
733 # is automatically rolled back. However, internally the
734 # Pager.changeCounterDone flag was being left set. This means
735 # that if the same connection attempts another transaction following
736 # the malloc failure and rollback, the change counter will not
737 # be updated. This could corrupt another processes cache.
739 do_malloc_test 32 -tclprep {
740 # Build a small database containing an indexed table.
743 PRAGMA locking_mode = normal;
745 CREATE TABLE t1(a PRIMARY KEY, b);
746 INSERT INTO t1 VALUES(1, 'one');
747 INSERT INTO t1 VALUES(2, 'two');
748 INSERT INTO t1 VALUES(3, 'three');
750 PRAGMA locking_mode = exclusive;
753 # Open a second database connection. Load the table (but not index)
754 # into the second connections pager cache.
758 PRAGMA locking_mode = normal;
763 # Running in exclusive mode, perform a database transaction that
764 # modifies both the database table and index. For iterations where
765 # the malloc failure occurs after updating the change counter but
766 # before committing the transaction, this should result in the
767 # transaction being rolled back but the changeCounterDone flag
770 db eval { UPDATE t1 SET a = a + 3 }
773 # Perform another transaction using the first connection. Unlock
774 # the database after doing so. If this is one of the right iterations,
775 # then this should result in the database contents being updated but
776 # the change-counter left as it is.
779 PRAGMA locking_mode = normal;
780 UPDATE t1 SET a = a + 3;
783 # Now do an integrity check with the second connection. The second
784 # connection still has the database table in its cache. If this is
785 # one of the magic iterations and the change counter was not modified,
786 # then it won't realize that the cached data is out of date. Since
787 # the cached data won't match the up to date index data read from
788 # the database file, the integrity check should fail.
790 set zRepeat "transient"
791 if {$::iRepeat} {set zRepeat "persistent"}
792 do_test malloc-32.$zRepeat.${::n}.integrity {
793 execsql {PRAGMA integrity_check} db2
798 # The following two OOM tests verify that OOM handling works in the
799 # code used to optimize "SELECT count(*) FROM <tbl>".
801 do_malloc_test 33 -tclprep {
802 db eval { PRAGMA cache_size = 10 }
804 db eval { CREATE TABLE abc(a, b) }
805 for {set i 0} {$i<500} {incr i} {
806 db eval {INSERT INTO abc VALUES(randstr(100,100), randstr(1000,1000))}
810 SELECT count(*) FROM abc;
812 do_malloc_test 34 -tclprep {
813 db eval { PRAGMA cache_size = 10 }
815 db eval { CREATE TABLE abc(a PRIMARY KEY, b) }
816 for {set i 0} {$i<500} {incr i} {
817 db eval {INSERT INTO abc VALUES(randstr(100,100), randstr(1000,1000))}
821 SELECT count(*) FROM abc;
824 proc f {args} { error "Quite a long error!" }
825 do_malloc_test 35 -tclprep {
827 set ::STMT [sqlite3_prepare db "SELECT f()" -1 DUMMY]
830 sqlite3_finalize $::STMT
832 # At one point an assert( !db->mallocFailed ) could fail in the following
833 # call to sqlite3_errmsg(). Because sqlite3_finalize() had failed to clear
834 # the flag before returning.
838 do_malloc_test 36 -sqlprep {
839 CREATE TABLE t1(a, b);
840 INSERT INTO t1 VALUES(1, 2);
841 INSERT INTO t1 VALUES(3, 4);
843 SELECT test_agg_errmsg16(), group_concat(a) FROM t1
846 # At one point, if an OOM occurred immediately after obtaining a shared lock
847 # on the database file, the file remained locked. This test case ensures
848 # that bug has been fixed.i
849 if {[db eval {PRAGMA locking_mode}]!="exclusive"} {
850 do_malloc_test 37 -tclprep {
853 CREATE TABLE t1(a, b);
854 INSERT INTO t1 VALUES(1, 2);
859 # Try to write to the database using connection [db2]. If connection [db]
860 # has correctly released the shared lock, this write attempt should
861 # succeed. If [db] has not released the lock, this should hit an
863 do_test malloc-36.$zRepeat.${::n}.unlocked {
864 execsql {INSERT INTO t1 VALUES(3, 4)} db2
872 # Test that if an OOM error occurs, aux-data is still correctly destroyed.
873 # This test case was causing either a memory-leak or an assert() failure
874 # at one point, depending on the configuration.
876 do_malloc_test 39 -tclprep {
879 SELECT test_auxdata('abc', 'def');
885 add_test_utf16bin_collate db
886 do_execsql_test 40.1 {
888 INSERT INTO t1 VALUES('fghij');
889 INSERT INTO t1 VALUES('pqrst');
890 INSERT INTO t1 VALUES('abcde');
891 INSERT INTO t1 VALUES('uvwxy');
892 INSERT INTO t1 VALUES('klmno');
894 do_execsql_test 40.2 {
895 SELECT * FROM t1 ORDER BY 1 COLLATE utf16bin;
896 } {abcde fghij klmno pqrst uvwxy}
897 do_faultsim_test 40.3 -faults oom-trans* -body {
899 SELECT * FROM t1 ORDER BY 1 COLLATE utf16bin;
902 faultsim_test_result {0 {abcde fghij klmno pqrst uvwxy}}
903 faultsim_integrity_check
907 add_test_utf16bin_collate db
908 set big [string repeat x 200]
909 do_execsql_test 41.1 {
910 DROP TABLE IF EXISTS t1;
911 CREATE TABLE t1(a COLLATE utf16bin);
912 INSERT INTO t1 VALUES('fghij' || $::big);
913 INSERT INTO t1 VALUES('pqrst' || $::big);
914 INSERT INTO t1 VALUES('abcde' || $::big);
915 INSERT INTO t1 VALUES('uvwxy' || $::big);
916 INSERT INTO t1 VALUES('klmno' || $::big);
917 CREATE INDEX i1 ON t1(a);
919 do_faultsim_test 41.2 -faults oom* -body {
920 execsql { SELECT * FROM t1 WHERE a = ('abcde' || $::big)}
922 faultsim_test_result [list 0 "abcde$::big"]
923 faultsim_integrity_check
927 do_execsql_test 42.0 {
928 CREATE TABLE t1(x INTEGER PRIMARY KEY, y, z);
929 CREATE TABLE t2(a, b);
930 CREATE VIEW a002 AS SELECT *, sum(b) AS m FROM t2 GROUP BY a;
932 faultsim_save_and_close
933 do_faultsim_test 42 -faults oom-tran* -prep {
934 faultsim_restore_and_reopen
935 execsql { SELECT * FROM sqlite_master }
939 FROM t1 JOIN a002 ON t1.y=a002.m
940 WHERE t1.x IN (1,2,3);
943 faultsim_test_result {0 {}}
947 # Ensure that no file descriptors were leaked.
948 do_test malloc-99.X {
950 set sqlite_open_file_count
953 puts open-file-count=$sqlite_open_file_count