blob: 792340a8001bdcd2875823bd57e6de77065b9956 [file] [log] [blame]
danielk1977fa256a32005-05-25 04:11:56 +00001/*
2** 2005 May 25
3**
4** The author disclaims copyright to this source code. In place of
5** a legal notice, here is a blessing:
6**
7** May you do good and not evil.
8** May you find forgiveness for yourself and forgive others.
9** May you share freely, never taking more than you give.
10**
11*************************************************************************
12** This file contains the implementation of the sqlite3_prepare()
13** interface, and routines that contribute to loading the database schema
14** from disk.
15**
danielk1977602b4662009-07-02 07:47:33 +000016** $Id: prepare.c,v 1.126 2009/07/02 07:47:33 danielk1977 Exp $
danielk1977fa256a32005-05-25 04:11:56 +000017*/
18#include "sqliteInt.h"
danielk1977fa256a32005-05-25 04:11:56 +000019
20/*
21** Fill the InitData structure with an error message that indicates
22** that the database is corrupt.
23*/
drh34533152008-03-19 13:03:33 +000024static void corruptSchema(
25 InitData *pData, /* Initialization context */
26 const char *zObj, /* Object being parsed at the point of error */
27 const char *zExtra /* Error information */
28){
drhc456e572008-08-11 18:44:58 +000029 sqlite3 *db = pData->db;
30 if( !db->mallocFailed && (db->flags & SQLITE_RecoveryMode)==0 ){
drh34533152008-03-19 13:03:33 +000031 if( zObj==0 ) zObj = "?";
drhf089aa42008-07-08 19:34:06 +000032 sqlite3SetString(pData->pzErrMsg, pData->db,
33 "malformed database schema (%s)", zObj);
drh9da742f2009-06-16 17:49:36 +000034 if( zExtra ){
drh633e6d52008-07-28 19:34:53 +000035 *pData->pzErrMsg = sqlite3MAppendf(pData->db, *pData->pzErrMsg, "%s - %s",
drhf089aa42008-07-08 19:34:06 +000036 *pData->pzErrMsg, zExtra);
37 }
danielk1977fa256a32005-05-25 04:11:56 +000038 }
drh9da742f2009-06-16 17:49:36 +000039 pData->rc = db->mallocFailed ? SQLITE_NOMEM : SQLITE_CORRUPT;
danielk1977fa256a32005-05-25 04:11:56 +000040}
41
42/*
43** This is the callback routine for the code that initializes the
44** database. See sqlite3Init() below for additional information.
45** This routine is also called from the OP_ParseSchema opcode of the VDBE.
46**
47** Each callback contains the following information:
48**
49** argv[0] = name of thing being created
danielk197778efaba2006-06-12 06:09:17 +000050** argv[1] = root page number for table or index. 0 for trigger or view.
danielk1977fa256a32005-05-25 04:11:56 +000051** argv[2] = SQL text for the CREATE statement.
danielk1977fa256a32005-05-25 04:11:56 +000052**
53*/
danielk197762c14b32008-11-19 09:05:26 +000054int sqlite3InitCallback(void *pInit, int argc, char **argv, char **NotUsed){
danielk1977fa256a32005-05-25 04:11:56 +000055 InitData *pData = (InitData*)pInit;
56 sqlite3 *db = pData->db;
drhece3c722006-09-23 20:36:01 +000057 int iDb = pData->iDb;
danielk1977fa256a32005-05-25 04:11:56 +000058
danielk1977f3d3c272008-11-19 16:52:44 +000059 assert( argc==3 );
60 UNUSED_PARAMETER2(NotUsed, argc);
drhb1ab8ea2007-08-29 00:33:07 +000061 assert( sqlite3_mutex_held(db->mutex) );
drhece3c722006-09-23 20:36:01 +000062 DbClearProperty(db, iDb, DB_Empty);
drh17435752007-08-16 04:30:38 +000063 if( db->mallocFailed ){
drh34533152008-03-19 13:03:33 +000064 corruptSchema(pData, argv[0], 0);
drh9da742f2009-06-16 17:49:36 +000065 return 1;
danielk1977da184232006-01-05 11:34:32 +000066 }
67
danielk1977ff9b2e72008-09-08 09:06:18 +000068 assert( iDb>=0 && iDb<db->nDb );
danielk1977fa256a32005-05-25 04:11:56 +000069 if( argv==0 ) return 0; /* Might happen if EMPTY_RESULT_CALLBACKS are on */
drhece3c722006-09-23 20:36:01 +000070 if( argv[1]==0 ){
drh34533152008-03-19 13:03:33 +000071 corruptSchema(pData, argv[0], 0);
danielk1977ff9b2e72008-09-08 09:06:18 +000072 }else if( argv[2] && argv[2][0] ){
danielk1977fa256a32005-05-25 04:11:56 +000073 /* Call the parser to process a CREATE TABLE, INDEX or VIEW.
74 ** But because db->init.busy is set to 1, no VDBE code is generated
75 ** or executed. All the parser does is build the internal data
76 ** structures that describe the table, index, or view.
77 */
78 char *zErr;
79 int rc;
80 assert( db->init.busy );
81 db->init.iDb = iDb;
82 db->init.newTnum = atoi(argv[1]);
83 rc = sqlite3_exec(db, argv[2], 0, 0, &zErr);
84 db->init.iDb = 0;
drh43617e92006-03-06 20:55:46 +000085 assert( rc!=SQLITE_OK || zErr==0 );
danielk1977fa256a32005-05-25 04:11:56 +000086 if( SQLITE_OK!=rc ){
drh15ca1df2006-07-26 13:43:30 +000087 pData->rc = rc;
danielk1977261919c2005-12-06 12:52:59 +000088 if( rc==SQLITE_NOMEM ){
drh17435752007-08-16 04:30:38 +000089 db->mallocFailed = 1;
drh9635cc72009-06-25 11:50:21 +000090 }else if( rc!=SQLITE_INTERRUPT && rc!=SQLITE_LOCKED ){
drh34533152008-03-19 13:03:33 +000091 corruptSchema(pData, argv[0], zErr);
danielk1977261919c2005-12-06 12:52:59 +000092 }
drh633e6d52008-07-28 19:34:53 +000093 sqlite3DbFree(db, zErr);
danielk1977fa256a32005-05-25 04:11:56 +000094 }
drh02cd2b82008-01-22 19:34:27 +000095 }else if( argv[0]==0 ){
drh34533152008-03-19 13:03:33 +000096 corruptSchema(pData, 0, 0);
danielk1977fa256a32005-05-25 04:11:56 +000097 }else{
98 /* If the SQL column is blank it means this is an index that
99 ** was created to be the PRIMARY KEY or to fulfill a UNIQUE
100 ** constraint for a CREATE TABLE. The index should have already
101 ** been created when we processed the CREATE TABLE. All we have
102 ** to do here is record the root page number for that index.
103 */
104 Index *pIndex;
105 pIndex = sqlite3FindIndex(db, argv[0], db->aDb[iDb].zName);
drh9da742f2009-06-16 17:49:36 +0000106 if( pIndex==0 ){
danielk1977fa256a32005-05-25 04:11:56 +0000107 /* This can occur if there exists an index on a TEMP table which
108 ** has the same name as another index on a permanent index. Since
109 ** the permanent table is hidden by the TEMP table, we can also
110 ** safely ignore the index on the permanent table.
111 */
112 /* Do Nothing */;
drh9da742f2009-06-16 17:49:36 +0000113 }else if( sqlite3GetInt32(argv[1], &pIndex->tnum)==0 ){
114 corruptSchema(pData, argv[0], "invalid rootpage");
danielk1977fa256a32005-05-25 04:11:56 +0000115 }
116 }
117 return 0;
118}
119
120/*
121** Attempt to read the database schema and initialize internal
122** data structures for a single database file. The index of the
123** database file is given by iDb. iDb==0 is used for the main
124** database. iDb==1 should never be used. iDb>=2 is used for
125** auxiliary databases. Return one of the SQLITE_ error codes to
126** indicate success or failure.
127*/
128static int sqlite3InitOne(sqlite3 *db, int iDb, char **pzErrMsg){
129 int rc;
drh8a939192009-04-20 17:43:03 +0000130 int i;
danielk1977fa256a32005-05-25 04:11:56 +0000131 int size;
132 Table *pTab;
drhfdd6e852005-12-16 01:06:16 +0000133 Db *pDb;
drhece3c722006-09-23 20:36:01 +0000134 char const *azArg[4];
danielk19770d19f7a2009-06-03 11:25:07 +0000135 int meta[5];
danielk1977fa256a32005-05-25 04:11:56 +0000136 InitData initData;
137 char const *zMasterSchema;
138 char const *zMasterName = SCHEMA_TABLE(iDb);
danielk1977602b4662009-07-02 07:47:33 +0000139 int openedTransaction;
danielk1977fa256a32005-05-25 04:11:56 +0000140
141 /*
142 ** The master database table has a structure like this
143 */
144 static const char master_schema[] =
145 "CREATE TABLE sqlite_master(\n"
146 " type text,\n"
147 " name text,\n"
148 " tbl_name text,\n"
149 " rootpage integer,\n"
150 " sql text\n"
151 ")"
152 ;
153#ifndef SQLITE_OMIT_TEMPDB
154 static const char temp_master_schema[] =
155 "CREATE TEMP TABLE sqlite_temp_master(\n"
156 " type text,\n"
157 " name text,\n"
158 " tbl_name text,\n"
159 " rootpage integer,\n"
160 " sql text\n"
161 ")"
162 ;
163#else
164 #define temp_master_schema 0
165#endif
166
167 assert( iDb>=0 && iDb<db->nDb );
danielk197714db2662006-01-09 16:12:04 +0000168 assert( db->aDb[iDb].pSchema );
drhb1ab8ea2007-08-29 00:33:07 +0000169 assert( sqlite3_mutex_held(db->mutex) );
danielk19774eab8b72007-12-27 15:12:16 +0000170 assert( iDb==1 || sqlite3BtreeHoldsMutex(db->aDb[iDb].pBt) );
danielk1977da184232006-01-05 11:34:32 +0000171
danielk1977fa256a32005-05-25 04:11:56 +0000172 /* zMasterSchema and zInitScript are set to point at the master schema
173 ** and initialisation script appropriate for the database being
174 ** initialised. zMasterName is the name of the master table.
175 */
176 if( !OMIT_TEMPDB && iDb==1 ){
177 zMasterSchema = temp_master_schema;
178 }else{
179 zMasterSchema = master_schema;
180 }
181 zMasterName = SCHEMA_TABLE(iDb);
182
183 /* Construct the schema tables. */
danielk1977fa256a32005-05-25 04:11:56 +0000184 azArg[0] = zMasterName;
185 azArg[1] = "1";
186 azArg[2] = zMasterSchema;
drhece3c722006-09-23 20:36:01 +0000187 azArg[3] = 0;
danielk1977fa256a32005-05-25 04:11:56 +0000188 initData.db = db;
drhece3c722006-09-23 20:36:01 +0000189 initData.iDb = iDb;
drhc456e572008-08-11 18:44:58 +0000190 initData.rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000191 initData.pzErrMsg = pzErrMsg;
drh7e8b8482008-01-23 03:03:05 +0000192 (void)sqlite3SafetyOff(db);
drhc456e572008-08-11 18:44:58 +0000193 sqlite3InitCallback(&initData, 3, (char **)azArg, 0);
drh7e8b8482008-01-23 03:03:05 +0000194 (void)sqlite3SafetyOn(db);
drhc456e572008-08-11 18:44:58 +0000195 if( initData.rc ){
danielk1977a1644fd2007-08-29 12:31:25 +0000196 rc = initData.rc;
197 goto error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000198 }
199 pTab = sqlite3FindTable(db, zMasterName, db->aDb[iDb].zName);
drh9da742f2009-06-16 17:49:36 +0000200 if( ALWAYS(pTab) ){
drh7d10d5a2008-08-20 16:35:10 +0000201 pTab->tabFlags |= TF_Readonly;
danielk1977fa256a32005-05-25 04:11:56 +0000202 }
danielk1977fa256a32005-05-25 04:11:56 +0000203
204 /* Create a cursor to hold the database open
205 */
drhfdd6e852005-12-16 01:06:16 +0000206 pDb = &db->aDb[iDb];
207 if( pDb->pBt==0 ){
drh9da742f2009-06-16 17:49:36 +0000208 if( !OMIT_TEMPDB && ALWAYS(iDb==1) ){
danielk1977b82e7ed2006-01-11 14:09:31 +0000209 DbSetProperty(db, 1, DB_SchemaLoaded);
210 }
danielk1977fa256a32005-05-25 04:11:56 +0000211 return SQLITE_OK;
212 }
danielk1977602b4662009-07-02 07:47:33 +0000213
214 /* If there is not already a read-only (or read-write) transaction opened
215 ** on the b-tree database, open one now. If a transaction is opened, it
216 ** will be closed before this function returns. */
drhb1ab8ea2007-08-29 00:33:07 +0000217 sqlite3BtreeEnter(pDb->pBt);
danielk1977602b4662009-07-02 07:47:33 +0000218 if( !sqlite3BtreeIsInReadTrans(pDb->pBt) ){
219 rc = sqlite3BtreeBeginTrans(pDb->pBt, 0);
220 if( rc!=SQLITE_OK ){
221 sqlite3SetString(pzErrMsg, db, "%s", sqlite3ErrStr(rc));
222 goto initone_error_out;
223 }
224 openedTransaction = 1;
225 }else{
226 openedTransaction = 0;
227 }
danielk1977fa256a32005-05-25 04:11:56 +0000228
229 /* Get the database meta information.
230 **
231 ** Meta values are as follows:
232 ** meta[0] Schema cookie. Changes with each schema change.
233 ** meta[1] File format of schema layer.
234 ** meta[2] Size of the page cache.
drh27731d72009-06-22 12:05:10 +0000235 ** meta[3] Largest rootpage (auto/incr_vacuum mode)
drh8159a352006-05-23 23:22:29 +0000236 ** meta[4] Db text encoding. 1:UTF-8 2:UTF-16LE 3:UTF-16BE
drh27731d72009-06-22 12:05:10 +0000237 ** meta[5] User version
238 ** meta[6] Incremental vacuum mode
239 ** meta[7] unused
240 ** meta[8] unused
241 ** meta[9] unused
danielk1977fa256a32005-05-25 04:11:56 +0000242 **
drhf248e212006-01-25 22:50:38 +0000243 ** Note: The #defined SQLITE_UTF* symbols in sqliteInt.h correspond to
danielk1977fa256a32005-05-25 04:11:56 +0000244 ** the possible values of meta[4].
245 */
danielk1977602b4662009-07-02 07:47:33 +0000246 for(i=0; i<ArraySize(meta); i++){
247 sqlite3BtreeGetMeta(pDb->pBt, i+1, (u32 *)&meta[i]);
danielk19770d19f7a2009-06-03 11:25:07 +0000248 }
249 pDb->pSchema->schema_cookie = meta[BTREE_SCHEMA_VERSION-1];
danielk1977fa256a32005-05-25 04:11:56 +0000250
251 /* If opening a non-empty database, check the text encoding. For the
252 ** main database, set sqlite3.enc to the encoding of the main database.
253 ** For an attached db, it is an error if the encoding is not the same
254 ** as sqlite3.enc.
255 */
danielk19770d19f7a2009-06-03 11:25:07 +0000256 if( meta[BTREE_TEXT_ENCODING-1] ){ /* text encoding */
danielk1977fa256a32005-05-25 04:11:56 +0000257 if( iDb==0 ){
drhc5e47ac2009-06-04 00:11:56 +0000258 u8 encoding;
danielk197714db2662006-01-09 16:12:04 +0000259 /* If opening the main database, set ENC(db). */
drhc5e47ac2009-06-04 00:11:56 +0000260 encoding = (u8)meta[BTREE_TEXT_ENCODING-1] & 3;
261 if( encoding==0 ) encoding = SQLITE_UTF8;
262 ENC(db) = encoding;
drhc4a64fa2009-05-11 20:53:28 +0000263 db->pDfltColl = sqlite3FindCollSeq(db, SQLITE_UTF8, "BINARY", 0);
danielk1977fa256a32005-05-25 04:11:56 +0000264 }else{
danielk197714db2662006-01-09 16:12:04 +0000265 /* If opening an attached database, the encoding much match ENC(db) */
danielk19770d19f7a2009-06-03 11:25:07 +0000266 if( meta[BTREE_TEXT_ENCODING-1]!=ENC(db) ){
drhf089aa42008-07-08 19:34:06 +0000267 sqlite3SetString(pzErrMsg, db, "attached databases must use the same"
268 " text encoding as main database");
danielk1977cd3e8f72008-03-25 09:47:35 +0000269 rc = SQLITE_ERROR;
drh701bb3b2008-08-02 03:50:39 +0000270 goto initone_error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000271 }
272 }
danielk1977b82e7ed2006-01-11 14:09:31 +0000273 }else{
274 DbSetProperty(db, iDb, DB_Empty);
danielk1977fa256a32005-05-25 04:11:56 +0000275 }
danielk197714db2662006-01-09 16:12:04 +0000276 pDb->pSchema->enc = ENC(db);
danielk1977fa256a32005-05-25 04:11:56 +0000277
danielk19778cf6c552008-06-23 16:53:46 +0000278 if( pDb->pSchema->cache_size==0 ){
danielk19770d19f7a2009-06-03 11:25:07 +0000279 size = meta[BTREE_DEFAULT_CACHE_SIZE-1];
danielk19778cf6c552008-06-23 16:53:46 +0000280 if( size==0 ){ size = SQLITE_DEFAULT_CACHE_SIZE; }
281 if( size<0 ) size = -size;
282 pDb->pSchema->cache_size = size;
283 sqlite3BtreeSetCacheSize(pDb->pBt, pDb->pSchema->cache_size);
284 }
danielk1977fa256a32005-05-25 04:11:56 +0000285
286 /*
287 ** file_format==1 Version 3.0.0.
drhfdd6e852005-12-16 01:06:16 +0000288 ** file_format==2 Version 3.1.3. // ALTER TABLE ADD COLUMN
289 ** file_format==3 Version 3.1.4. // ditto but with non-NULL defaults
drhd946db02005-12-29 19:23:06 +0000290 ** file_format==4 Version 3.3.0. // DESC indices. Boolean constants
danielk1977fa256a32005-05-25 04:11:56 +0000291 */
danielk19770d19f7a2009-06-03 11:25:07 +0000292 pDb->pSchema->file_format = (u8)meta[BTREE_FILE_FORMAT-1];
danielk1977da184232006-01-05 11:34:32 +0000293 if( pDb->pSchema->file_format==0 ){
294 pDb->pSchema->file_format = 1;
drhfdd6e852005-12-16 01:06:16 +0000295 }
danielk1977da184232006-01-05 11:34:32 +0000296 if( pDb->pSchema->file_format>SQLITE_MAX_FILE_FORMAT ){
drhf089aa42008-07-08 19:34:06 +0000297 sqlite3SetString(pzErrMsg, db, "unsupported file format");
danielk1977cd3e8f72008-03-25 09:47:35 +0000298 rc = SQLITE_ERROR;
drh701bb3b2008-08-02 03:50:39 +0000299 goto initone_error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000300 }
301
drh4aa2bfe2007-11-28 13:43:16 +0000302 /* Ticket #2804: When we open a database in the newer file format,
303 ** clear the legacy_file_format pragma flag so that a VACUUM will
304 ** not downgrade the database and thus invalidate any descending
305 ** indices that the user might have created.
306 */
danielk19770d19f7a2009-06-03 11:25:07 +0000307 if( iDb==0 && meta[BTREE_FILE_FORMAT-1]>=4 ){
drh4aa2bfe2007-11-28 13:43:16 +0000308 db->flags &= ~SQLITE_LegacyFileFmt;
309 }
danielk1977fa256a32005-05-25 04:11:56 +0000310
311 /* Read the schema information out of the schema tables
312 */
313 assert( db->init.busy );
drh9da742f2009-06-16 17:49:36 +0000314 {
danielk1977fa256a32005-05-25 04:11:56 +0000315 char *zSql;
danielk19771e536952007-08-16 10:09:01 +0000316 zSql = sqlite3MPrintf(db,
drhece3c722006-09-23 20:36:01 +0000317 "SELECT name, rootpage, sql FROM '%q'.%s",
318 db->aDb[iDb].zName, zMasterName);
drh7e8b8482008-01-23 03:03:05 +0000319 (void)sqlite3SafetyOff(db);
drha6d0ffc2007-10-12 20:42:28 +0000320#ifndef SQLITE_OMIT_AUTHORIZATION
321 {
322 int (*xAuth)(void*,int,const char*,const char*,const char*,const char*);
323 xAuth = db->xAuth;
324 db->xAuth = 0;
325#endif
326 rc = sqlite3_exec(db, zSql, sqlite3InitCallback, &initData, 0);
327#ifndef SQLITE_OMIT_AUTHORIZATION
328 db->xAuth = xAuth;
329 }
330#endif
drhc456e572008-08-11 18:44:58 +0000331 if( rc==SQLITE_OK ) rc = initData.rc;
drh7e8b8482008-01-23 03:03:05 +0000332 (void)sqlite3SafetyOn(db);
drh633e6d52008-07-28 19:34:53 +0000333 sqlite3DbFree(db, zSql);
drh497e4462005-07-23 03:18:40 +0000334#ifndef SQLITE_OMIT_ANALYZE
335 if( rc==SQLITE_OK ){
336 sqlite3AnalysisLoad(db, iDb);
337 }
338#endif
danielk1977fa256a32005-05-25 04:11:56 +0000339 }
drh17435752007-08-16 04:30:38 +0000340 if( db->mallocFailed ){
danielk1977fa256a32005-05-25 04:11:56 +0000341 rc = SQLITE_NOMEM;
342 sqlite3ResetInternalSchema(db, 0);
343 }
danielk197734c68fb2007-03-14 15:37:04 +0000344 if( rc==SQLITE_OK || (db->flags&SQLITE_RecoveryMode)){
345 /* Black magic: If the SQLITE_RecoveryMode flag is set, then consider
shanebe217792009-03-05 04:20:31 +0000346 ** the schema loaded, even if errors occurred. In this situation the
danielk197734c68fb2007-03-14 15:37:04 +0000347 ** current sqlite3_prepare() operation will fail, but the following one
348 ** will attempt to compile the supplied statement against whatever subset
shanebe217792009-03-05 04:20:31 +0000349 ** of the schema was loaded before the error occurred. The primary
danielk197734c68fb2007-03-14 15:37:04 +0000350 ** purpose of this is to allow access to the sqlite_master table
drh85b623f2007-12-13 21:54:09 +0000351 ** even when its contents have been corrupted.
danielk197734c68fb2007-03-14 15:37:04 +0000352 */
danielk1977fa256a32005-05-25 04:11:56 +0000353 DbSetProperty(db, iDb, DB_SchemaLoaded);
danielk197734c68fb2007-03-14 15:37:04 +0000354 rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000355 }
danielk1977cd3e8f72008-03-25 09:47:35 +0000356
357 /* Jump here for an error that occurs after successfully allocating
358 ** curMain and calling sqlite3BtreeEnter(). For an error that occurs
359 ** before that point, jump to error_out.
360 */
drh701bb3b2008-08-02 03:50:39 +0000361initone_error_out:
danielk1977602b4662009-07-02 07:47:33 +0000362 if( openedTransaction ){
363 sqlite3BtreeCommit(pDb->pBt);
364 }
drhb1ab8ea2007-08-29 00:33:07 +0000365 sqlite3BtreeLeave(pDb->pBt);
danielk1977a1644fd2007-08-29 12:31:25 +0000366
367error_out:
danielk1977ae72d982007-10-03 08:46:44 +0000368 if( rc==SQLITE_NOMEM || rc==SQLITE_IOERR_NOMEM ){
danielk1977a1644fd2007-08-29 12:31:25 +0000369 db->mallocFailed = 1;
370 }
danielk1977fa256a32005-05-25 04:11:56 +0000371 return rc;
372}
373
374/*
375** Initialize all database files - the main database file, the file
376** used to store temporary tables, and any additional database files
377** created using ATTACH statements. Return a success code. If an
378** error occurs, write an error message into *pzErrMsg.
379**
danielk1977e7259292006-01-13 06:33:23 +0000380** After a database is initialized, the DB_SchemaLoaded bit is set
381** bit is set in the flags field of the Db structure. If the database
382** file was of zero-length, then the DB_Empty flag is also set.
danielk1977fa256a32005-05-25 04:11:56 +0000383*/
384int sqlite3Init(sqlite3 *db, char **pzErrMsg){
385 int i, rc;
danielk19775814c1a2007-08-13 14:41:19 +0000386 int commit_internal = !(db->flags&SQLITE_InternChanges);
danielk1977fa256a32005-05-25 04:11:56 +0000387
drhb1ab8ea2007-08-29 00:33:07 +0000388 assert( sqlite3_mutex_held(db->mutex) );
danielk1977fa256a32005-05-25 04:11:56 +0000389 rc = SQLITE_OK;
390 db->init.busy = 1;
391 for(i=0; rc==SQLITE_OK && i<db->nDb; i++){
392 if( DbHasProperty(db, i, DB_SchemaLoaded) || i==1 ) continue;
393 rc = sqlite3InitOne(db, i, pzErrMsg);
394 if( rc ){
395 sqlite3ResetInternalSchema(db, i);
396 }
397 }
398
399 /* Once all the other databases have been initialised, load the schema
400 ** for the TEMP database. This is loaded last, as the TEMP database
401 ** schema may contain references to objects in other databases.
402 */
403#ifndef SQLITE_OMIT_TEMPDB
drh9da742f2009-06-16 17:49:36 +0000404 if( rc==SQLITE_OK && ALWAYS(db->nDb>1)
405 && !DbHasProperty(db, 1, DB_SchemaLoaded) ){
danielk1977fa256a32005-05-25 04:11:56 +0000406 rc = sqlite3InitOne(db, 1, pzErrMsg);
407 if( rc ){
408 sqlite3ResetInternalSchema(db, 1);
409 }
410 }
411#endif
412
413 db->init.busy = 0;
danielk19775814c1a2007-08-13 14:41:19 +0000414 if( rc==SQLITE_OK && commit_internal ){
danielk1977fa256a32005-05-25 04:11:56 +0000415 sqlite3CommitInternalChanges(db);
416 }
417
danielk1977b82e7ed2006-01-11 14:09:31 +0000418 return rc;
danielk1977fa256a32005-05-25 04:11:56 +0000419}
420
421/*
422** This routine is a no-op if the database schema is already initialised.
423** Otherwise, the schema is loaded. An error code is returned.
424*/
425int sqlite3ReadSchema(Parse *pParse){
426 int rc = SQLITE_OK;
427 sqlite3 *db = pParse->db;
drhb1ab8ea2007-08-29 00:33:07 +0000428 assert( sqlite3_mutex_held(db->mutex) );
danielk1977fa256a32005-05-25 04:11:56 +0000429 if( !db->init.busy ){
danielk1977b82e7ed2006-01-11 14:09:31 +0000430 rc = sqlite3Init(db, &pParse->zErrMsg);
danielk1977fa256a32005-05-25 04:11:56 +0000431 }
danielk1977fa256a32005-05-25 04:11:56 +0000432 if( rc!=SQLITE_OK ){
433 pParse->rc = rc;
434 pParse->nErr++;
435 }
436 return rc;
437}
438
439
440/*
441** Check schema cookies in all databases. If any cookie is out
442** of date, return 0. If all schema cookies are current, return 1.
443*/
danielk1977602b4662009-07-02 07:47:33 +0000444static void schemaIsValid(Parse *pParse){
445 sqlite3 *db = pParse->db;
danielk1977fa256a32005-05-25 04:11:56 +0000446 int iDb;
447 int rc;
danielk1977fa256a32005-05-25 04:11:56 +0000448 int cookie;
danielk1977fa256a32005-05-25 04:11:56 +0000449
danielk1977602b4662009-07-02 07:47:33 +0000450 assert( pParse->checkSchema );
451 assert( sqlite3_mutex_held(db->mutex) );
452 for(iDb=0; iDb<db->nDb; iDb++){
453 int openedTransaction = 0; /* True if a transaction is opened */
454 Btree *pBt = db->aDb[iDb].pBt; /* Btree database to read cookie from */
455 if( pBt==0 ) continue;
456
457 /* If there is not already a read-only (or read-write) transaction opened
458 ** on the b-tree database, open one now. If a transaction is opened, it
459 ** will be closed immediately after reading the meta-value. */
460 if( !sqlite3BtreeIsInReadTrans(pBt) ){
461 rc = sqlite3BtreeBeginTrans(pBt, 0);
462 if( NEVER(rc==SQLITE_NOMEM) || rc==SQLITE_IOERR_NOMEM ){
463 db->mallocFailed = 1;
464 }
465 if( rc!=SQLITE_OK ) return;
466 openedTransaction = 1;
467 }
468
469 /* Read the schema cookie from the database. If it does not match the
470 ** value stored as part of the in the in-memory schema representation,
471 ** set Parse.rc to SQLITE_SCHEMA. */
472 sqlite3BtreeGetMeta(pBt, BTREE_SCHEMA_VERSION, (u32 *)&cookie);
473 if( cookie!=db->aDb[iDb].pSchema->schema_cookie ){
474 pParse->rc = SQLITE_SCHEMA;
475 }
476
477 /* Close the transaction, if one was opened. */
478 if( openedTransaction ){
479 sqlite3BtreeCommit(pBt);
480 }
481 }
482
483#if 0
drhe5ae5732008-06-15 02:51:47 +0000484 curTemp = (BtCursor *)sqlite3Malloc(sqlite3BtreeCursorSize());
danielk1977cd3e8f72008-03-25 09:47:35 +0000485 if( curTemp ){
486 assert( sqlite3_mutex_held(db->mutex) );
487 for(iDb=0; allOk && iDb<db->nDb; iDb++){
488 Btree *pBt;
489 pBt = db->aDb[iDb].pBt;
490 if( pBt==0 ) continue;
491 memset(curTemp, 0, sqlite3BtreeCursorSize());
492 rc = sqlite3BtreeCursor(pBt, MASTER_ROOT, 0, 0, curTemp);
493 if( rc==SQLITE_OK ){
danielk19770d19f7a2009-06-03 11:25:07 +0000494 rc = sqlite3BtreeGetMeta(pBt, BTREE_SCHEMA_VERSION, (u32 *)&cookie);
drh58fbb312009-06-17 00:35:30 +0000495 if( ALWAYS(rc==SQLITE_OK)
496 && cookie!=db->aDb[iDb].pSchema->schema_cookie ){
danielk1977cd3e8f72008-03-25 09:47:35 +0000497 allOk = 0;
498 }
499 sqlite3BtreeCloseCursor(curTemp);
danielk1977fa256a32005-05-25 04:11:56 +0000500 }
drh58fbb312009-06-17 00:35:30 +0000501 if( NEVER(rc==SQLITE_NOMEM) || rc==SQLITE_IOERR_NOMEM ){
danielk1977cd3e8f72008-03-25 09:47:35 +0000502 db->mallocFailed = 1;
503 }
danielk1977fa256a32005-05-25 04:11:56 +0000504 }
danielk1977cd3e8f72008-03-25 09:47:35 +0000505 sqlite3_free(curTemp);
506 }else{
507 allOk = 0;
508 db->mallocFailed = 1;
danielk1977fa256a32005-05-25 04:11:56 +0000509 }
510 return allOk;
danielk1977602b4662009-07-02 07:47:33 +0000511#endif
danielk1977fa256a32005-05-25 04:11:56 +0000512}
513
514/*
drhf248e212006-01-25 22:50:38 +0000515** Convert a schema pointer into the iDb index that indicates
516** which database file in db->aDb[] the schema refers to.
517**
518** If the same database is attached more than once, the first
519** attached database is returned.
520*/
danielk1977e501b892006-01-09 06:29:47 +0000521int sqlite3SchemaToIndex(sqlite3 *db, Schema *pSchema){
drh198bf392006-01-06 21:52:49 +0000522 int i = -1000000;
523
524 /* If pSchema is NULL, then return -1000000. This happens when code in
525 ** expr.c is trying to resolve a reference to a transient table (i.e. one
526 ** created by a sub-select). In this case the return value of this
527 ** function should never be used.
528 **
529 ** We return -1000000 instead of the more usual -1 simply because using
drh1c767f02009-01-09 02:49:31 +0000530 ** -1000000 as the incorrect index into db->aDb[] is much
drh198bf392006-01-06 21:52:49 +0000531 ** more likely to cause a segfault than -1 (of course there are assert()
532 ** statements too, but it never hurts to play the odds).
533 */
drhb1ab8ea2007-08-29 00:33:07 +0000534 assert( sqlite3_mutex_held(db->mutex) );
drh198bf392006-01-06 21:52:49 +0000535 if( pSchema ){
drh1c767f02009-01-09 02:49:31 +0000536 for(i=0; ALWAYS(i<db->nDb); i++){
drh198bf392006-01-06 21:52:49 +0000537 if( db->aDb[i].pSchema==pSchema ){
538 break;
539 }
540 }
drh1c767f02009-01-09 02:49:31 +0000541 assert( i>=0 && i<db->nDb );
drh198bf392006-01-06 21:52:49 +0000542 }
543 return i;
544}
545
546/*
danielk1977fa256a32005-05-25 04:11:56 +0000547** Compile the UTF-8 encoded SQL statement zSql into a statement handle.
548*/
mlcreech3a00f902008-03-04 17:45:01 +0000549static int sqlite3Prepare(
danielk1977fa256a32005-05-25 04:11:56 +0000550 sqlite3 *db, /* Database handle. */
551 const char *zSql, /* UTF-8 encoded SQL statement. */
552 int nBytes, /* Length of zSql in bytes. */
drhb900aaf2006-11-09 00:24:53 +0000553 int saveSqlFlag, /* True to copy SQL text into the sqlite3_stmt */
danielk1977fa256a32005-05-25 04:11:56 +0000554 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
drhb900aaf2006-11-09 00:24:53 +0000555 const char **pzTail /* OUT: End of parsed string */
danielk1977fa256a32005-05-25 04:11:56 +0000556){
drhe7b347072009-06-01 18:18:20 +0000557 Parse *pParse; /* Parsing context */
558 char *zErrMsg = 0; /* Error message */
559 int rc = SQLITE_OK; /* Result code */
560 int i; /* Loop counter */
danielk1977fa256a32005-05-25 04:11:56 +0000561
drhe7b347072009-06-01 18:18:20 +0000562 /* Allocate the parsing context */
563 pParse = sqlite3StackAllocZero(db, sizeof(*pParse));
564 if( pParse==0 ){
565 rc = SQLITE_NOMEM;
566 goto end_prepare;
567 }
568
569 if( sqlite3SafetyOn(db) ){
570 rc = SQLITE_MISUSE;
571 goto end_prepare;
572 }
drh860e0772009-04-02 18:32:26 +0000573 assert( ppStmt && *ppStmt==0 );
drh86f8c192007-08-22 00:39:19 +0000574 assert( !db->mallocFailed );
drhb21c8cd2007-08-21 19:33:56 +0000575 assert( sqlite3_mutex_held(db->mutex) );
danielk1977fa256a32005-05-25 04:11:56 +0000576
drhc74d0b1d2009-02-24 16:18:05 +0000577 /* Check to verify that it is possible to get a read lock on all
578 ** database schemas. The inability to get a read lock indicates that
579 ** some other database connection is holding a write-lock, which in
580 ** turn means that the other connection has made uncommitted changes
581 ** to the schema.
582 **
583 ** Were we to proceed and prepare the statement against the uncommitted
584 ** schema changes and if those schema changes are subsequently rolled
585 ** back and different changes are made in their place, then when this
586 ** prepared statement goes to run the schema cookie would fail to detect
587 ** the schema change. Disaster would follow.
588 **
589 ** This thread is currently holding mutexes on all Btrees (because
590 ** of the sqlite3BtreeEnterAll() in sqlite3LockAndPrepare()) so it
591 ** is not possible for another thread to start a new schema change
592 ** while this routine is running. Hence, we do not need to hold
593 ** locks on the schema, we just need to make sure nobody else is
594 ** holding them.
595 **
596 ** Note that setting READ_UNCOMMITTED overrides most lock detection,
597 ** but it does *not* override schema lock detection, so this all still
598 ** works even if READ_UNCOMMITTED is set.
danielk1977c87d34d2006-01-06 13:00:28 +0000599 */
600 for(i=0; i<db->nDb; i++) {
601 Btree *pBt = db->aDb[i].pBt;
drhb1ab8ea2007-08-29 00:33:07 +0000602 if( pBt ){
drhc74d0b1d2009-02-24 16:18:05 +0000603 assert( sqlite3BtreeHoldsMutex(pBt) );
drhb1ab8ea2007-08-29 00:33:07 +0000604 rc = sqlite3BtreeSchemaLocked(pBt);
605 if( rc ){
606 const char *zDb = db->aDb[i].zName;
danielk1977404ca072009-03-16 13:19:36 +0000607 sqlite3Error(db, rc, "database schema is locked: %s", zDb);
drh7e8b8482008-01-23 03:03:05 +0000608 (void)sqlite3SafetyOff(db);
drhc74d0b1d2009-02-24 16:18:05 +0000609 testcase( db->flags & SQLITE_ReadUncommitted );
drhe7b347072009-06-01 18:18:20 +0000610 goto end_prepare;
drhb1ab8ea2007-08-29 00:33:07 +0000611 }
danielk1977c87d34d2006-01-06 13:00:28 +0000612 }
613 }
drhe7b347072009-06-01 18:18:20 +0000614
615
616 pParse->db = db;
drhd2d88bb2008-05-23 14:32:18 +0000617 if( nBytes>=0 && (nBytes==0 || zSql[nBytes-1]!=0) ){
drhe5c941b2007-05-08 13:58:26 +0000618 char *zSqlCopy;
drhbb4957f2008-03-20 14:03:29 +0000619 int mxLen = db->aLimit[SQLITE_LIMIT_SQL_LENGTH];
drh58fbb312009-06-17 00:35:30 +0000620 testcase( nBytes==mxLen );
621 testcase( nBytes==mxLen+1 );
drhbb4957f2008-03-20 14:03:29 +0000622 if( nBytes>mxLen ){
drhbe69bf62007-12-18 17:50:33 +0000623 sqlite3Error(db, SQLITE_TOOBIG, "statement too long");
drh7e8b8482008-01-23 03:03:05 +0000624 (void)sqlite3SafetyOff(db);
drhe7b347072009-06-01 18:18:20 +0000625 rc = sqlite3ApiExit(db, SQLITE_TOOBIG);
626 goto end_prepare;
drhe5c941b2007-05-08 13:58:26 +0000627 }
drh17435752007-08-16 04:30:38 +0000628 zSqlCopy = sqlite3DbStrNDup(db, zSql, nBytes);
drh276fdbf2007-04-30 21:39:16 +0000629 if( zSqlCopy ){
drhe7b347072009-06-01 18:18:20 +0000630 sqlite3RunParser(pParse, zSqlCopy, &zErrMsg);
drh633e6d52008-07-28 19:34:53 +0000631 sqlite3DbFree(db, zSqlCopy);
drhe7b347072009-06-01 18:18:20 +0000632 pParse->zTail = &zSql[pParse->zTail-zSqlCopy];
danielk19773a2c8c82008-04-03 14:36:25 +0000633 }else{
drhe7b347072009-06-01 18:18:20 +0000634 pParse->zTail = &zSql[nBytes];
drh276fdbf2007-04-30 21:39:16 +0000635 }
drh9051a422006-01-30 22:35:43 +0000636 }else{
drhe7b347072009-06-01 18:18:20 +0000637 sqlite3RunParser(pParse, zSql, &zErrMsg);
drh9051a422006-01-30 22:35:43 +0000638 }
danielk1977fa256a32005-05-25 04:11:56 +0000639
drh17435752007-08-16 04:30:38 +0000640 if( db->mallocFailed ){
drhe7b347072009-06-01 18:18:20 +0000641 pParse->rc = SQLITE_NOMEM;
danielk1977fa256a32005-05-25 04:11:56 +0000642 }
drhe7b347072009-06-01 18:18:20 +0000643 if( pParse->rc==SQLITE_DONE ) pParse->rc = SQLITE_OK;
danielk1977602b4662009-07-02 07:47:33 +0000644 if( pParse->checkSchema ){
645 schemaIsValid(pParse);
danielk1977fa256a32005-05-25 04:11:56 +0000646 }
drhe7b347072009-06-01 18:18:20 +0000647 if( pParse->rc==SQLITE_SCHEMA ){
danielk1977fa256a32005-05-25 04:11:56 +0000648 sqlite3ResetInternalSchema(db, 0);
649 }
drh17435752007-08-16 04:30:38 +0000650 if( db->mallocFailed ){
drhe7b347072009-06-01 18:18:20 +0000651 pParse->rc = SQLITE_NOMEM;
drh344a6272006-06-26 12:50:09 +0000652 }
drhb900aaf2006-11-09 00:24:53 +0000653 if( pzTail ){
drhe7b347072009-06-01 18:18:20 +0000654 *pzTail = pParse->zTail;
drhb900aaf2006-11-09 00:24:53 +0000655 }
drhe7b347072009-06-01 18:18:20 +0000656 rc = pParse->rc;
danielk1977fa256a32005-05-25 04:11:56 +0000657
658#ifndef SQLITE_OMIT_EXPLAIN
drhe7b347072009-06-01 18:18:20 +0000659 if( rc==SQLITE_OK && pParse->pVdbe && pParse->explain ){
660 static const char * const azColName[] = {
661 "addr", "opcode", "p1", "p2", "p3", "p4", "p5", "comment",
662 "order", "from", "detail"
663 };
664 int iFirst, mx;
665 if( pParse->explain==2 ){
666 sqlite3VdbeSetNumCols(pParse->pVdbe, 3);
667 iFirst = 8;
668 mx = 11;
drhecc92422005-09-10 16:46:12 +0000669 }else{
drhe7b347072009-06-01 18:18:20 +0000670 sqlite3VdbeSetNumCols(pParse->pVdbe, 8);
671 iFirst = 0;
672 mx = 8;
673 }
674 for(i=iFirst; i<mx; i++){
675 sqlite3VdbeSetColName(pParse->pVdbe, i-iFirst, COLNAME_NAME,
676 azColName[i], SQLITE_STATIC);
drhecc92422005-09-10 16:46:12 +0000677 }
drhb900aaf2006-11-09 00:24:53 +0000678 }
danielk1977fa256a32005-05-25 04:11:56 +0000679#endif
680
danielk1977fa256a32005-05-25 04:11:56 +0000681 if( sqlite3SafetyOff(db) ){
682 rc = SQLITE_MISUSE;
683 }
danielk19777e29e952007-04-19 11:09:01 +0000684
danielk19776ab3a2e2009-02-19 14:39:25 +0000685 assert( db->init.busy==0 || saveSqlFlag==0 );
686 if( db->init.busy==0 ){
drhe7b347072009-06-01 18:18:20 +0000687 Vdbe *pVdbe = pParse->pVdbe;
688 sqlite3VdbeSetSql(pVdbe, zSql, (int)(pParse->zTail-zSql), saveSqlFlag);
danielk19777e29e952007-04-19 11:09:01 +0000689 }
drhe7b347072009-06-01 18:18:20 +0000690 if( pParse->pVdbe && (rc!=SQLITE_OK || db->mallocFailed) ){
691 sqlite3VdbeFinalize(pParse->pVdbe);
danielk19777e29e952007-04-19 11:09:01 +0000692 assert(!(*ppStmt));
693 }else{
drhe7b347072009-06-01 18:18:20 +0000694 *ppStmt = (sqlite3_stmt*)pParse->pVdbe;
danielk1977fa256a32005-05-25 04:11:56 +0000695 }
696
697 if( zErrMsg ){
698 sqlite3Error(db, rc, "%s", zErrMsg);
drh633e6d52008-07-28 19:34:53 +0000699 sqlite3DbFree(db, zErrMsg);
danielk1977fa256a32005-05-25 04:11:56 +0000700 }else{
701 sqlite3Error(db, rc, 0);
702 }
danielk1977261919c2005-12-06 12:52:59 +0000703
drhe7b347072009-06-01 18:18:20 +0000704end_prepare:
705
706 sqlite3StackFree(db, pParse);
danielk197754f01982006-01-18 15:25:17 +0000707 rc = sqlite3ApiExit(db, rc);
drh4ac285a2006-09-15 07:28:50 +0000708 assert( (rc&db->errMask)==rc );
danielk1977fa256a32005-05-25 04:11:56 +0000709 return rc;
710}
drhb21c8cd2007-08-21 19:33:56 +0000711static int sqlite3LockAndPrepare(
712 sqlite3 *db, /* Database handle. */
713 const char *zSql, /* UTF-8 encoded SQL statement. */
714 int nBytes, /* Length of zSql in bytes. */
715 int saveSqlFlag, /* True to copy SQL text into the sqlite3_stmt */
716 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
717 const char **pzTail /* OUT: End of parsed string */
718){
719 int rc;
drh860e0772009-04-02 18:32:26 +0000720 assert( ppStmt!=0 );
721 *ppStmt = 0;
drh7e8b8482008-01-23 03:03:05 +0000722 if( !sqlite3SafetyCheckOk(db) ){
drh27641702007-08-22 02:56:42 +0000723 return SQLITE_MISUSE;
724 }
drhb21c8cd2007-08-21 19:33:56 +0000725 sqlite3_mutex_enter(db->mutex);
drhb1ab8ea2007-08-29 00:33:07 +0000726 sqlite3BtreeEnterAll(db);
drhb21c8cd2007-08-21 19:33:56 +0000727 rc = sqlite3Prepare(db, zSql, nBytes, saveSqlFlag, ppStmt, pzTail);
drh9da742f2009-06-16 17:49:36 +0000728 if( rc==SQLITE_SCHEMA ){
729 sqlite3_finalize(*ppStmt);
730 rc = sqlite3Prepare(db, zSql, nBytes, saveSqlFlag, ppStmt, pzTail);
731 }
drhb1ab8ea2007-08-29 00:33:07 +0000732 sqlite3BtreeLeaveAll(db);
drhb21c8cd2007-08-21 19:33:56 +0000733 sqlite3_mutex_leave(db->mutex);
734 return rc;
735}
danielk1977fa256a32005-05-25 04:11:56 +0000736
drhb900aaf2006-11-09 00:24:53 +0000737/*
738** Rerun the compilation of a statement after a schema change.
danielk197765a2ea12009-03-19 07:58:31 +0000739**
740** If the statement is successfully recompiled, return SQLITE_OK. Otherwise,
741** if the statement cannot be recompiled because another connection has
742** locked the sqlite3_master table, return SQLITE_LOCKED. If any other error
743** occurs, return SQLITE_SCHEMA.
drhb900aaf2006-11-09 00:24:53 +0000744*/
745int sqlite3Reprepare(Vdbe *p){
746 int rc;
drh4f0c5872007-03-26 22:05:01 +0000747 sqlite3_stmt *pNew;
drhb900aaf2006-11-09 00:24:53 +0000748 const char *zSql;
749 sqlite3 *db;
drhb21c8cd2007-08-21 19:33:56 +0000750
drhb1ab8ea2007-08-29 00:33:07 +0000751 assert( sqlite3_mutex_held(sqlite3VdbeDb(p)->mutex) );
danielk1977d0e2a852007-11-14 06:48:48 +0000752 zSql = sqlite3_sql((sqlite3_stmt *)p);
drhc4dd3fd2008-01-22 01:48:05 +0000753 assert( zSql!=0 ); /* Reprepare only called for prepare_v2() statements */
drhb900aaf2006-11-09 00:24:53 +0000754 db = sqlite3VdbeDb(p);
drhb21c8cd2007-08-21 19:33:56 +0000755 assert( sqlite3_mutex_held(db->mutex) );
drhb1ab8ea2007-08-29 00:33:07 +0000756 rc = sqlite3LockAndPrepare(db, zSql, -1, 0, &pNew, 0);
drhb900aaf2006-11-09 00:24:53 +0000757 if( rc ){
danielk19778e556522007-11-13 10:30:24 +0000758 if( rc==SQLITE_NOMEM ){
759 db->mallocFailed = 1;
760 }
drhb900aaf2006-11-09 00:24:53 +0000761 assert( pNew==0 );
danielk197765a2ea12009-03-19 07:58:31 +0000762 return (rc==SQLITE_LOCKED) ? SQLITE_LOCKED : SQLITE_SCHEMA;
drhb900aaf2006-11-09 00:24:53 +0000763 }else{
764 assert( pNew!=0 );
765 }
drh4f0c5872007-03-26 22:05:01 +0000766 sqlite3VdbeSwap((Vdbe*)pNew, p);
shane145834a2008-09-04 12:03:42 +0000767 sqlite3TransferBindings(pNew, (sqlite3_stmt*)p);
drh4f0c5872007-03-26 22:05:01 +0000768 sqlite3VdbeResetStepResult((Vdbe*)pNew);
769 sqlite3VdbeFinalize((Vdbe*)pNew);
danielk197765a2ea12009-03-19 07:58:31 +0000770 return SQLITE_OK;
drhb900aaf2006-11-09 00:24:53 +0000771}
772
773
774/*
775** Two versions of the official API. Legacy and new use. In the legacy
776** version, the original SQL text is not saved in the prepared statement
777** and so if a schema change occurs, SQLITE_SCHEMA is returned by
778** sqlite3_step(). In the new version, the original SQL text is retained
779** and the statement is automatically recompiled if an schema change
780** occurs.
781*/
782int sqlite3_prepare(
783 sqlite3 *db, /* Database handle. */
784 const char *zSql, /* UTF-8 encoded SQL statement. */
785 int nBytes, /* Length of zSql in bytes. */
786 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
787 const char **pzTail /* OUT: End of parsed string */
788){
drh17eaae72008-03-03 18:47:28 +0000789 int rc;
790 rc = sqlite3LockAndPrepare(db,zSql,nBytes,0,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +0000791 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +0000792 return rc;
drhb900aaf2006-11-09 00:24:53 +0000793}
794int sqlite3_prepare_v2(
795 sqlite3 *db, /* Database handle. */
796 const char *zSql, /* UTF-8 encoded SQL statement. */
797 int nBytes, /* Length of zSql in bytes. */
798 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
799 const char **pzTail /* OUT: End of parsed string */
800){
drh17eaae72008-03-03 18:47:28 +0000801 int rc;
802 rc = sqlite3LockAndPrepare(db,zSql,nBytes,1,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +0000803 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +0000804 return rc;
drhb900aaf2006-11-09 00:24:53 +0000805}
806
807
danielk1977fa256a32005-05-25 04:11:56 +0000808#ifndef SQLITE_OMIT_UTF16
809/*
810** Compile the UTF-16 encoded SQL statement zSql into a statement handle.
811*/
drhb900aaf2006-11-09 00:24:53 +0000812static int sqlite3Prepare16(
danielk1977fa256a32005-05-25 04:11:56 +0000813 sqlite3 *db, /* Database handle. */
814 const void *zSql, /* UTF-8 encoded SQL statement. */
815 int nBytes, /* Length of zSql in bytes. */
drhb900aaf2006-11-09 00:24:53 +0000816 int saveSqlFlag, /* True to save SQL text into the sqlite3_stmt */
danielk1977fa256a32005-05-25 04:11:56 +0000817 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
818 const void **pzTail /* OUT: End of parsed string */
819){
820 /* This function currently works by first transforming the UTF-16
821 ** encoded string to UTF-8, then invoking sqlite3_prepare(). The
822 ** tricky bit is figuring out the pointer to return in *pzTail.
823 */
danielk197754f01982006-01-18 15:25:17 +0000824 char *zSql8;
danielk1977c87d34d2006-01-06 13:00:28 +0000825 const char *zTail8 = 0;
danielk197754f01982006-01-18 15:25:17 +0000826 int rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000827
drh860e0772009-04-02 18:32:26 +0000828 assert( ppStmt );
drh769e97e2009-04-01 16:33:37 +0000829 *ppStmt = 0;
drh7e8b8482008-01-23 03:03:05 +0000830 if( !sqlite3SafetyCheckOk(db) ){
danielk1977fa256a32005-05-25 04:11:56 +0000831 return SQLITE_MISUSE;
832 }
drhb21c8cd2007-08-21 19:33:56 +0000833 sqlite3_mutex_enter(db->mutex);
danielk19771e536952007-08-16 10:09:01 +0000834 zSql8 = sqlite3Utf16to8(db, zSql, nBytes);
danielk197754f01982006-01-18 15:25:17 +0000835 if( zSql8 ){
drhb1ab8ea2007-08-29 00:33:07 +0000836 rc = sqlite3LockAndPrepare(db, zSql8, -1, saveSqlFlag, ppStmt, &zTail8);
danielk1977fa256a32005-05-25 04:11:56 +0000837 }
danielk1977fa256a32005-05-25 04:11:56 +0000838
839 if( zTail8 && pzTail ){
840 /* If sqlite3_prepare returns a tail pointer, we calculate the
841 ** equivalent pointer into the UTF-16 string by counting the unicode
842 ** characters between zSql8 and zTail8, and then returning a pointer
843 ** the same number of characters into the UTF-16 string.
844 */
drhea678832008-12-10 19:26:22 +0000845 int chars_parsed = sqlite3Utf8CharLen(zSql8, (int)(zTail8-zSql8));
drhee858132007-05-08 20:37:38 +0000846 *pzTail = (u8 *)zSql + sqlite3Utf16ByteLen(zSql, chars_parsed);
danielk1977fa256a32005-05-25 04:11:56 +0000847 }
drh633e6d52008-07-28 19:34:53 +0000848 sqlite3DbFree(db, zSql8);
drhb21c8cd2007-08-21 19:33:56 +0000849 rc = sqlite3ApiExit(db, rc);
850 sqlite3_mutex_leave(db->mutex);
851 return rc;
danielk1977fa256a32005-05-25 04:11:56 +0000852}
drhb900aaf2006-11-09 00:24:53 +0000853
854/*
855** Two versions of the official API. Legacy and new use. In the legacy
856** version, the original SQL text is not saved in the prepared statement
857** and so if a schema change occurs, SQLITE_SCHEMA is returned by
858** sqlite3_step(). In the new version, the original SQL text is retained
859** and the statement is automatically recompiled if an schema change
860** occurs.
861*/
862int sqlite3_prepare16(
863 sqlite3 *db, /* Database handle. */
864 const void *zSql, /* UTF-8 encoded SQL statement. */
865 int nBytes, /* Length of zSql in bytes. */
866 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
867 const void **pzTail /* OUT: End of parsed string */
868){
drh17eaae72008-03-03 18:47:28 +0000869 int rc;
870 rc = sqlite3Prepare16(db,zSql,nBytes,0,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +0000871 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +0000872 return rc;
drhb900aaf2006-11-09 00:24:53 +0000873}
874int sqlite3_prepare16_v2(
875 sqlite3 *db, /* Database handle. */
876 const void *zSql, /* UTF-8 encoded SQL statement. */
877 int nBytes, /* Length of zSql in bytes. */
878 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
879 const void **pzTail /* OUT: End of parsed string */
880){
drh17eaae72008-03-03 18:47:28 +0000881 int rc;
882 rc = sqlite3Prepare16(db,zSql,nBytes,1,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +0000883 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +0000884 return rc;
drhb900aaf2006-11-09 00:24:53 +0000885}
886
danielk1977fa256a32005-05-25 04:11:56 +0000887#endif /* SQLITE_OMIT_UTF16 */