blob: 7e08a5a674247e10bc0a12d6d091b745ec661eb6 [file] [log] [blame]
danielk1977fa256a32005-05-25 04:11:56 +00001/*
2** 2005 May 25
3**
4** The author disclaims copyright to this source code. In place of
5** a legal notice, here is a blessing:
6**
7** May you do good and not evil.
8** May you find forgiveness for yourself and forgive others.
9** May you share freely, never taking more than you give.
10**
11*************************************************************************
12** This file contains the implementation of the sqlite3_prepare()
13** interface, and routines that contribute to loading the database schema
14** from disk.
danielk1977fa256a32005-05-25 04:11:56 +000015*/
16#include "sqliteInt.h"
danielk1977fa256a32005-05-25 04:11:56 +000017
18/*
19** Fill the InitData structure with an error message that indicates
20** that the database is corrupt.
21*/
drh34533152008-03-19 13:03:33 +000022static void corruptSchema(
23 InitData *pData, /* Initialization context */
dan6a5a13d2021-02-17 20:08:22 +000024 char **azObj, /* Type and name of object being parsed */
drh34533152008-03-19 13:03:33 +000025 const char *zExtra /* Error information */
26){
drhc456e572008-08-11 18:44:58 +000027 sqlite3 *db = pData->db;
drh1595abc2018-08-14 19:27:51 +000028 if( db->mallocFailed ){
29 pData->rc = SQLITE_NOMEM_BKPT;
30 }else if( pData->pzErrMsg[0]!=0 ){
31 /* A error message has already been generated. Do not overwrite it */
drhac894af2021-11-03 15:59:17 +000032 }else if( pData->mInitFlags & (INITFLAG_AlterMask) ){
33 static const char *azAlterType[] = {
34 "rename",
35 "drop column",
36 "add column"
37 };
dan6a5a13d2021-02-17 20:08:22 +000038 *pData->pzErrMsg = sqlite3MPrintf(db,
39 "error in %s %s after %s: %s", azObj[0], azObj[1],
drhac894af2021-11-03 15:59:17 +000040 azAlterType[(pData->mInitFlags&INITFLAG_AlterMask)-1],
dan6a5a13d2021-02-17 20:08:22 +000041 zExtra
42 );
drh1595abc2018-08-14 19:27:51 +000043 pData->rc = SQLITE_ERROR;
44 }else if( db->flags & SQLITE_WriteSchema ){
45 pData->rc = SQLITE_CORRUPT_BKPT;
46 }else{
drh22c17b82015-05-15 04:13:15 +000047 char *z;
dan6a5a13d2021-02-17 20:08:22 +000048 const char *zObj = azObj[1] ? azObj[1] : "?";
drh17a936f2016-02-05 02:50:11 +000049 z = sqlite3MPrintf(db, "malformed database schema (%s)", zObj);
drh1e9c47b2018-03-16 20:15:58 +000050 if( zExtra && zExtra[0] ) z = sqlite3MPrintf(db, "%z - %s", z, zExtra);
drh22c17b82015-05-15 04:13:15 +000051 *pData->pzErrMsg = z;
drh1595abc2018-08-14 19:27:51 +000052 pData->rc = SQLITE_CORRUPT_BKPT;
danielk1977fa256a32005-05-25 04:11:56 +000053 }
54}
55
56/*
drh8d406732019-01-30 18:33:33 +000057** Check to see if any sibling index (another index on the same table)
58** of pIndex has the same root page number, and if it does, return true.
59** This would indicate a corrupt schema.
60*/
61int sqlite3IndexHasDuplicateRootPage(Index *pIndex){
62 Index *p;
63 for(p=pIndex->pTable->pIndex; p; p=p->pNext){
64 if( p->tnum==pIndex->tnum && p!=pIndex ) return 1;
65 }
66 return 0;
67}
68
drha22d2fc2019-10-05 18:33:25 +000069/* forward declaration */
70static int sqlite3Prepare(
71 sqlite3 *db, /* Database handle. */
72 const char *zSql, /* UTF-8 encoded SQL statement. */
73 int nBytes, /* Length of zSql in bytes. */
74 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
75 Vdbe *pReprepare, /* VM being reprepared */
76 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
77 const char **pzTail /* OUT: End of parsed string */
78);
79
80
drh8d406732019-01-30 18:33:33 +000081/*
danielk1977fa256a32005-05-25 04:11:56 +000082** This is the callback routine for the code that initializes the
83** database. See sqlite3Init() below for additional information.
84** This routine is also called from the OP_ParseSchema opcode of the VDBE.
85**
86** Each callback contains the following information:
87**
drhc5a93d42019-08-12 00:08:07 +000088** argv[0] = type of object: "table", "index", "trigger", or "view".
89** argv[1] = name of thing being created
90** argv[2] = associated table if an index or trigger
91** argv[3] = root page number for table or index. 0 for trigger or view.
92** argv[4] = SQL text for the CREATE statement.
danielk1977fa256a32005-05-25 04:11:56 +000093**
94*/
danielk197762c14b32008-11-19 09:05:26 +000095int sqlite3InitCallback(void *pInit, int argc, char **argv, char **NotUsed){
danielk1977fa256a32005-05-25 04:11:56 +000096 InitData *pData = (InitData*)pInit;
97 sqlite3 *db = pData->db;
drhece3c722006-09-23 20:36:01 +000098 int iDb = pData->iDb;
danielk1977fa256a32005-05-25 04:11:56 +000099
drhc5a93d42019-08-12 00:08:07 +0000100 assert( argc==5 );
danielk1977f3d3c272008-11-19 16:52:44 +0000101 UNUSED_PARAMETER2(NotUsed, argc);
drhb1ab8ea2007-08-29 00:33:07 +0000102 assert( sqlite3_mutex_held(db->mutex) );
dan0ea2d422020-03-05 18:04:09 +0000103 db->mDbFlags |= DBFLAG_EncodingFixed;
drh6000e082021-04-13 13:01:07 +0000104 if( argv==0 ) return 0; /* Might happen if EMPTY_RESULT_CALLBACKS are on */
drh6b86e512019-01-05 21:09:37 +0000105 pData->nInitRow++;
drh17435752007-08-16 04:30:38 +0000106 if( db->mallocFailed ){
dan6a5a13d2021-02-17 20:08:22 +0000107 corruptSchema(pData, argv, 0);
drh9da742f2009-06-16 17:49:36 +0000108 return 1;
danielk1977da184232006-01-05 11:34:32 +0000109 }
110
danielk1977ff9b2e72008-09-08 09:06:18 +0000111 assert( iDb>=0 && iDb<db->nDb );
drhc5a93d42019-08-12 00:08:07 +0000112 if( argv[3]==0 ){
dan6a5a13d2021-02-17 20:08:22 +0000113 corruptSchema(pData, argv, 0);
drh630fc342021-01-01 21:02:37 +0000114 }else if( argv[4]
115 && 'c'==sqlite3UpperToLower[(unsigned char)argv[4][0]]
116 && 'r'==sqlite3UpperToLower[(unsigned char)argv[4][1]] ){
danielk1977fa256a32005-05-25 04:11:56 +0000117 /* Call the parser to process a CREATE TABLE, INDEX or VIEW.
118 ** But because db->init.busy is set to 1, no VDBE code is generated
119 ** or executed. All the parser does is build the internal data
120 ** structures that describe the table, index, or view.
drh630fc342021-01-01 21:02:37 +0000121 **
122 ** No other valid SQL statement, other than the variable CREATE statements,
123 ** can begin with the letters "C" and "R". Thus, it is not possible run
124 ** any other kind of statement while parsing the schema, even a corrupt
125 ** schema.
danielk1977fa256a32005-05-25 04:11:56 +0000126 */
danielk1977fa256a32005-05-25 04:11:56 +0000127 int rc;
drh9ef5e772016-08-19 14:20:56 +0000128 u8 saved_iDb = db->init.iDb;
drh6498f0b2010-04-09 09:14:05 +0000129 sqlite3_stmt *pStmt;
drh9e55d472010-07-06 09:29:01 +0000130 TESTONLY(int rcp); /* Return code from sqlite3_prepare() */
drh6498f0b2010-04-09 09:14:05 +0000131
danielk1977fa256a32005-05-25 04:11:56 +0000132 assert( db->init.busy );
133 db->init.iDb = iDb;
drh69306bf2020-07-22 20:12:10 +0000134 if( sqlite3GetUInt32(argv[3], &db->init.newTnum)==0
135 || (db->init.newTnum>pData->mxPage && pData->mxPage>0)
136 ){
drhca439a42020-07-22 21:05:23 +0000137 if( sqlite3Config.bExtraSchemaChecks ){
dan6a5a13d2021-02-17 20:08:22 +0000138 corruptSchema(pData, argv, "invalid rootpage");
drhca439a42020-07-22 21:05:23 +0000139 }
drh3b3ddba2020-07-22 18:03:56 +0000140 }
drh3d5f74b2009-08-06 17:43:31 +0000141 db->init.orphanTrigger = 0;
drh2a6a72a2021-09-24 02:14:35 +0000142 db->init.azInit = (const char**)argv;
drha22d2fc2019-10-05 18:33:25 +0000143 pStmt = 0;
144 TESTONLY(rcp = ) sqlite3Prepare(db, argv[4], -1, 0, 0, &pStmt, 0);
dan9859c422010-07-06 07:36:18 +0000145 rc = db->errCode;
146 assert( (rc&0xFF)==(rcp&0xFF) );
drh9ef5e772016-08-19 14:20:56 +0000147 db->init.iDb = saved_iDb;
danc9461ec2018-08-29 21:00:16 +0000148 /* assert( saved_iDb==0 || (db->mDbFlags & DBFLAG_Vacuum)!=0 ); */
danielk1977fa256a32005-05-25 04:11:56 +0000149 if( SQLITE_OK!=rc ){
drh3d5f74b2009-08-06 17:43:31 +0000150 if( db->init.orphanTrigger ){
151 assert( iDb==1 );
152 }else{
drhd4da4932019-08-15 13:46:39 +0000153 if( rc > pData->rc ) pData->rc = rc;
drh3d5f74b2009-08-06 17:43:31 +0000154 if( rc==SQLITE_NOMEM ){
drh4a642b62016-02-05 01:55:27 +0000155 sqlite3OomFault(db);
dan9859c422010-07-06 07:36:18 +0000156 }else if( rc!=SQLITE_INTERRUPT && (rc&0xFF)!=SQLITE_LOCKED ){
dan6a5a13d2021-02-17 20:08:22 +0000157 corruptSchema(pData, argv, sqlite3_errmsg(db));
drh3d5f74b2009-08-06 17:43:31 +0000158 }
danielk1977261919c2005-12-06 12:52:59 +0000159 }
danielk1977fa256a32005-05-25 04:11:56 +0000160 }
drh2a6a72a2021-09-24 02:14:35 +0000161 db->init.azInit = sqlite3StdType; /* Any array of string ptrs will do */
drh6498f0b2010-04-09 09:14:05 +0000162 sqlite3_finalize(pStmt);
drhc5a93d42019-08-12 00:08:07 +0000163 }else if( argv[1]==0 || (argv[4]!=0 && argv[4][0]!=0) ){
dan6a5a13d2021-02-17 20:08:22 +0000164 corruptSchema(pData, argv, 0);
danielk1977fa256a32005-05-25 04:11:56 +0000165 }else{
166 /* If the SQL column is blank it means this is an index that
167 ** was created to be the PRIMARY KEY or to fulfill a UNIQUE
168 ** constraint for a CREATE TABLE. The index should have already
169 ** been created when we processed the CREATE TABLE. All we have
170 ** to do here is record the root page number for that index.
171 */
172 Index *pIndex;
drhc5a93d42019-08-12 00:08:07 +0000173 pIndex = sqlite3FindIndex(db, argv[1], db->aDb[iDb].zDbSName);
drh69306bf2020-07-22 20:12:10 +0000174 if( pIndex==0 ){
dan6a5a13d2021-02-17 20:08:22 +0000175 corruptSchema(pData, argv, "orphan index");
drh69306bf2020-07-22 20:12:10 +0000176 }else
177 if( sqlite3GetUInt32(argv[3],&pIndex->tnum)==0
drh69ab18d2019-01-10 14:33:15 +0000178 || pIndex->tnum<2
drh48bf2d72020-07-30 17:14:55 +0000179 || pIndex->tnum>pData->mxPage
drh8d406732019-01-30 18:33:33 +0000180 || sqlite3IndexHasDuplicateRootPage(pIndex)
drh69ab18d2019-01-10 14:33:15 +0000181 ){
drhca439a42020-07-22 21:05:23 +0000182 if( sqlite3Config.bExtraSchemaChecks ){
dan6a5a13d2021-02-17 20:08:22 +0000183 corruptSchema(pData, argv, "invalid rootpage");
drhca439a42020-07-22 21:05:23 +0000184 }
danielk1977fa256a32005-05-25 04:11:56 +0000185 }
186 }
187 return 0;
188}
189
190/*
191** Attempt to read the database schema and initialize internal
192** data structures for a single database file. The index of the
193** database file is given by iDb. iDb==0 is used for the main
194** database. iDb==1 should never be used. iDb>=2 is used for
195** auxiliary databases. Return one of the SQLITE_ error codes to
196** indicate success or failure.
197*/
drh1595abc2018-08-14 19:27:51 +0000198int sqlite3InitOne(sqlite3 *db, int iDb, char **pzErrMsg, u32 mFlags){
danielk1977fa256a32005-05-25 04:11:56 +0000199 int rc;
drh8a939192009-04-20 17:43:03 +0000200 int i;
mistachkinba2bba32012-09-18 23:21:32 +0000201#ifndef SQLITE_OMIT_DEPRECATED
danielk1977fa256a32005-05-25 04:11:56 +0000202 int size;
mistachkinba2bba32012-09-18 23:21:32 +0000203#endif
drhfdd6e852005-12-16 01:06:16 +0000204 Db *pDb;
drhc5a93d42019-08-12 00:08:07 +0000205 char const *azArg[6];
danielk19770d19f7a2009-06-03 11:25:07 +0000206 int meta[5];
danielk1977fa256a32005-05-25 04:11:56 +0000207 InitData initData;
drh067b92b2020-06-19 15:24:12 +0000208 const char *zSchemaTabName;
danielk197794b30732009-07-02 17:21:57 +0000209 int openedTransaction = 0;
dan0ea2d422020-03-05 18:04:09 +0000210 int mask = ((db->mDbFlags & DBFLAG_EncodingFixed) | ~DBFLAG_EncodingFixed);
danielk1977fa256a32005-05-25 04:11:56 +0000211
drhb2c85592018-04-25 12:01:45 +0000212 assert( (db->mDbFlags & DBFLAG_SchemaKnownOk)==0 );
danielk1977fa256a32005-05-25 04:11:56 +0000213 assert( iDb>=0 && iDb<db->nDb );
danielk197714db2662006-01-09 16:12:04 +0000214 assert( db->aDb[iDb].pSchema );
drhb1ab8ea2007-08-29 00:33:07 +0000215 assert( sqlite3_mutex_held(db->mutex) );
danielk19774eab8b72007-12-27 15:12:16 +0000216 assert( iDb==1 || sqlite3BtreeHoldsMutex(db->aDb[iDb].pBt) );
danielk1977da184232006-01-05 11:34:32 +0000217
drh36494b82017-08-25 15:43:34 +0000218 db->init.busy = 1;
219
drh1e32bed2020-06-19 13:33:53 +0000220 /* Construct the in-memory representation schema tables (sqlite_schema or
221 ** sqlite_temp_schema) by invoking the parser directly. The appropriate
drh055f2982016-01-15 15:06:41 +0000222 ** table name will be inserted automatically by the parser so we can just
223 ** use the abbreviation "x" here. The parser will also automatically tag
224 ** the schema table as read-only. */
drhc5a93d42019-08-12 00:08:07 +0000225 azArg[0] = "table";
drh067b92b2020-06-19 15:24:12 +0000226 azArg[1] = zSchemaTabName = SCHEMA_TABLE(iDb);
drhc5a93d42019-08-12 00:08:07 +0000227 azArg[2] = azArg[1];
228 azArg[3] = "1";
229 azArg[4] = "CREATE TABLE x(type text,name text,tbl_name text,"
drh36494b82017-08-25 15:43:34 +0000230 "rootpage int,sql text)";
drhc5a93d42019-08-12 00:08:07 +0000231 azArg[5] = 0;
danielk1977fa256a32005-05-25 04:11:56 +0000232 initData.db = db;
drhece3c722006-09-23 20:36:01 +0000233 initData.iDb = iDb;
drhc456e572008-08-11 18:44:58 +0000234 initData.rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000235 initData.pzErrMsg = pzErrMsg;
drh1595abc2018-08-14 19:27:51 +0000236 initData.mInitFlags = mFlags;
drh6b86e512019-01-05 21:09:37 +0000237 initData.nInitRow = 0;
drh3b3ddba2020-07-22 18:03:56 +0000238 initData.mxPage = 0;
drhc5a93d42019-08-12 00:08:07 +0000239 sqlite3InitCallback(&initData, 5, (char **)azArg, 0);
dan0ea2d422020-03-05 18:04:09 +0000240 db->mDbFlags &= mask;
drhc456e572008-08-11 18:44:58 +0000241 if( initData.rc ){
danielk1977a1644fd2007-08-29 12:31:25 +0000242 rc = initData.rc;
243 goto error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000244 }
danielk1977fa256a32005-05-25 04:11:56 +0000245
246 /* Create a cursor to hold the database open
247 */
drhfdd6e852005-12-16 01:06:16 +0000248 pDb = &db->aDb[iDb];
249 if( pDb->pBt==0 ){
drh36494b82017-08-25 15:43:34 +0000250 assert( iDb==1 );
251 DbSetProperty(db, 1, DB_SchemaLoaded);
252 rc = SQLITE_OK;
253 goto error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000254 }
danielk1977602b4662009-07-02 07:47:33 +0000255
256 /* If there is not already a read-only (or read-write) transaction opened
257 ** on the b-tree database, open one now. If a transaction is opened, it
258 ** will be closed before this function returns. */
drhb1ab8ea2007-08-29 00:33:07 +0000259 sqlite3BtreeEnter(pDb->pBt);
drh99744fa2020-08-25 19:09:07 +0000260 if( sqlite3BtreeTxnState(pDb->pBt)==SQLITE_TXN_NONE ){
drhbb2d9b12018-06-06 16:28:40 +0000261 rc = sqlite3BtreeBeginTrans(pDb->pBt, 0, 0);
danielk1977602b4662009-07-02 07:47:33 +0000262 if( rc!=SQLITE_OK ){
drh22c17b82015-05-15 04:13:15 +0000263 sqlite3SetString(pzErrMsg, db, sqlite3ErrStr(rc));
danielk1977602b4662009-07-02 07:47:33 +0000264 goto initone_error_out;
265 }
266 openedTransaction = 1;
danielk1977602b4662009-07-02 07:47:33 +0000267 }
danielk1977fa256a32005-05-25 04:11:56 +0000268
269 /* Get the database meta information.
270 **
271 ** Meta values are as follows:
272 ** meta[0] Schema cookie. Changes with each schema change.
273 ** meta[1] File format of schema layer.
274 ** meta[2] Size of the page cache.
drh27731d72009-06-22 12:05:10 +0000275 ** meta[3] Largest rootpage (auto/incr_vacuum mode)
drh8159a352006-05-23 23:22:29 +0000276 ** meta[4] Db text encoding. 1:UTF-8 2:UTF-16LE 3:UTF-16BE
drh27731d72009-06-22 12:05:10 +0000277 ** meta[5] User version
278 ** meta[6] Incremental vacuum mode
279 ** meta[7] unused
280 ** meta[8] unused
281 ** meta[9] unused
danielk1977fa256a32005-05-25 04:11:56 +0000282 **
drhf248e212006-01-25 22:50:38 +0000283 ** Note: The #defined SQLITE_UTF* symbols in sqliteInt.h correspond to
danielk1977fa256a32005-05-25 04:11:56 +0000284 ** the possible values of meta[4].
285 */
danielk1977602b4662009-07-02 07:47:33 +0000286 for(i=0; i<ArraySize(meta); i++){
287 sqlite3BtreeGetMeta(pDb->pBt, i+1, (u32 *)&meta[i]);
danielk19770d19f7a2009-06-03 11:25:07 +0000288 }
drh0314cf32018-04-28 01:27:09 +0000289 if( (db->flags & SQLITE_ResetDatabase)!=0 ){
290 memset(meta, 0, sizeof(meta));
291 }
danielk19770d19f7a2009-06-03 11:25:07 +0000292 pDb->pSchema->schema_cookie = meta[BTREE_SCHEMA_VERSION-1];
danielk1977fa256a32005-05-25 04:11:56 +0000293
294 /* If opening a non-empty database, check the text encoding. For the
295 ** main database, set sqlite3.enc to the encoding of the main database.
296 ** For an attached db, it is an error if the encoding is not the same
297 ** as sqlite3.enc.
298 */
danielk19770d19f7a2009-06-03 11:25:07 +0000299 if( meta[BTREE_TEXT_ENCODING-1] ){ /* text encoding */
dan0ea2d422020-03-05 18:04:09 +0000300 if( iDb==0 && (db->mDbFlags & DBFLAG_EncodingFixed)==0 ){
drhc5e47ac2009-06-04 00:11:56 +0000301 u8 encoding;
drh42a630b2020-03-05 16:13:24 +0000302#ifndef SQLITE_OMIT_UTF16
danielk197714db2662006-01-09 16:12:04 +0000303 /* If opening the main database, set ENC(db). */
drhc5e47ac2009-06-04 00:11:56 +0000304 encoding = (u8)meta[BTREE_TEXT_ENCODING-1] & 3;
305 if( encoding==0 ) encoding = SQLITE_UTF8;
dandbd4d5f2013-03-08 07:10:37 +0000306#else
drh42a630b2020-03-05 16:13:24 +0000307 encoding = SQLITE_UTF8;
dandbd4d5f2013-03-08 07:10:37 +0000308#endif
drh42a630b2020-03-05 16:13:24 +0000309 sqlite3SetTextEncoding(db, encoding);
danielk1977fa256a32005-05-25 04:11:56 +0000310 }else{
danielk197714db2662006-01-09 16:12:04 +0000311 /* If opening an attached database, the encoding much match ENC(db) */
dan0ea2d422020-03-05 18:04:09 +0000312 if( (meta[BTREE_TEXT_ENCODING-1] & 3)!=ENC(db) ){
drhf089aa42008-07-08 19:34:06 +0000313 sqlite3SetString(pzErrMsg, db, "attached databases must use the same"
314 " text encoding as main database");
danielk1977cd3e8f72008-03-25 09:47:35 +0000315 rc = SQLITE_ERROR;
drh701bb3b2008-08-02 03:50:39 +0000316 goto initone_error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000317 }
318 }
319 }
danielk197714db2662006-01-09 16:12:04 +0000320 pDb->pSchema->enc = ENC(db);
danielk1977fa256a32005-05-25 04:11:56 +0000321
danielk19778cf6c552008-06-23 16:53:46 +0000322 if( pDb->pSchema->cache_size==0 ){
drhe73c9142011-11-09 16:12:24 +0000323#ifndef SQLITE_OMIT_DEPRECATED
drhd50ffc42011-03-08 02:38:28 +0000324 size = sqlite3AbsInt32(meta[BTREE_DEFAULT_CACHE_SIZE-1]);
danielk19778cf6c552008-06-23 16:53:46 +0000325 if( size==0 ){ size = SQLITE_DEFAULT_CACHE_SIZE; }
danielk19778cf6c552008-06-23 16:53:46 +0000326 pDb->pSchema->cache_size = size;
drhe73c9142011-11-09 16:12:24 +0000327#else
328 pDb->pSchema->cache_size = SQLITE_DEFAULT_CACHE_SIZE;
329#endif
danielk19778cf6c552008-06-23 16:53:46 +0000330 sqlite3BtreeSetCacheSize(pDb->pBt, pDb->pSchema->cache_size);
331 }
danielk1977fa256a32005-05-25 04:11:56 +0000332
333 /*
334 ** file_format==1 Version 3.0.0.
drhfdd6e852005-12-16 01:06:16 +0000335 ** file_format==2 Version 3.1.3. // ALTER TABLE ADD COLUMN
336 ** file_format==3 Version 3.1.4. // ditto but with non-NULL defaults
drhd946db02005-12-29 19:23:06 +0000337 ** file_format==4 Version 3.3.0. // DESC indices. Boolean constants
danielk1977fa256a32005-05-25 04:11:56 +0000338 */
danielk19770d19f7a2009-06-03 11:25:07 +0000339 pDb->pSchema->file_format = (u8)meta[BTREE_FILE_FORMAT-1];
danielk1977da184232006-01-05 11:34:32 +0000340 if( pDb->pSchema->file_format==0 ){
341 pDb->pSchema->file_format = 1;
drhfdd6e852005-12-16 01:06:16 +0000342 }
danielk1977da184232006-01-05 11:34:32 +0000343 if( pDb->pSchema->file_format>SQLITE_MAX_FILE_FORMAT ){
drhf089aa42008-07-08 19:34:06 +0000344 sqlite3SetString(pzErrMsg, db, "unsupported file format");
danielk1977cd3e8f72008-03-25 09:47:35 +0000345 rc = SQLITE_ERROR;
drh701bb3b2008-08-02 03:50:39 +0000346 goto initone_error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000347 }
348
drh4aa2bfe2007-11-28 13:43:16 +0000349 /* Ticket #2804: When we open a database in the newer file format,
350 ** clear the legacy_file_format pragma flag so that a VACUUM will
351 ** not downgrade the database and thus invalidate any descending
352 ** indices that the user might have created.
353 */
danielk19770d19f7a2009-06-03 11:25:07 +0000354 if( iDb==0 && meta[BTREE_FILE_FORMAT-1]>=4 ){
drhd5b44d62018-12-06 17:06:02 +0000355 db->flags &= ~(u64)SQLITE_LegacyFileFmt;
drh4aa2bfe2007-11-28 13:43:16 +0000356 }
danielk1977fa256a32005-05-25 04:11:56 +0000357
358 /* Read the schema information out of the schema tables
359 */
360 assert( db->init.busy );
drh3b3ddba2020-07-22 18:03:56 +0000361 initData.mxPage = sqlite3BtreeLastPage(pDb->pBt);
drh9da742f2009-06-16 17:49:36 +0000362 {
danielk1977fa256a32005-05-25 04:11:56 +0000363 char *zSql;
danielk19771e536952007-08-16 10:09:01 +0000364 zSql = sqlite3MPrintf(db,
drhc5a93d42019-08-12 00:08:07 +0000365 "SELECT*FROM\"%w\".%s ORDER BY rowid",
drh067b92b2020-06-19 15:24:12 +0000366 db->aDb[iDb].zDbSName, zSchemaTabName);
drha6d0ffc2007-10-12 20:42:28 +0000367#ifndef SQLITE_OMIT_AUTHORIZATION
368 {
drh32c6a482014-09-11 13:44:52 +0000369 sqlite3_xauth xAuth;
drha6d0ffc2007-10-12 20:42:28 +0000370 xAuth = db->xAuth;
371 db->xAuth = 0;
372#endif
373 rc = sqlite3_exec(db, zSql, sqlite3InitCallback, &initData, 0);
374#ifndef SQLITE_OMIT_AUTHORIZATION
375 db->xAuth = xAuth;
376 }
377#endif
drhc456e572008-08-11 18:44:58 +0000378 if( rc==SQLITE_OK ) rc = initData.rc;
drh633e6d52008-07-28 19:34:53 +0000379 sqlite3DbFree(db, zSql);
drh497e4462005-07-23 03:18:40 +0000380#ifndef SQLITE_OMIT_ANALYZE
381 if( rc==SQLITE_OK ){
382 sqlite3AnalysisLoad(db, iDb);
383 }
384#endif
danielk1977fa256a32005-05-25 04:11:56 +0000385 }
drh7a7cefa2021-06-13 17:55:58 +0000386 assert( pDb == &(db->aDb[iDb]) );
drh17435752007-08-16 04:30:38 +0000387 if( db->mallocFailed ){
mistachkinfad30392016-02-13 23:43:46 +0000388 rc = SQLITE_NOMEM_BKPT;
drh81028a42012-05-15 18:28:27 +0000389 sqlite3ResetAllSchemasOfConnection(db);
drh7a7cefa2021-06-13 17:55:58 +0000390 pDb = &db->aDb[iDb];
drh569143c2021-04-13 13:20:55 +0000391 }else
drhfd748c62018-10-30 16:25:35 +0000392 if( rc==SQLITE_OK || (db->flags&SQLITE_NoSchemaError)){
drh569143c2021-04-13 13:20:55 +0000393 /* Hack: If the SQLITE_NoSchemaError flag is set, then consider
394 ** the schema loaded, even if errors (other than OOM) occurred. In
395 ** this situation the current sqlite3_prepare() operation will fail,
396 ** but the following one will attempt to compile the supplied statement
397 ** against whatever subset of the schema was loaded before the error
398 ** occurred.
399 **
400 ** The primary purpose of this is to allow access to the sqlite_schema
401 ** table even when its contents have been corrupted.
danielk197734c68fb2007-03-14 15:37:04 +0000402 */
danielk1977fa256a32005-05-25 04:11:56 +0000403 DbSetProperty(db, iDb, DB_SchemaLoaded);
danielk197734c68fb2007-03-14 15:37:04 +0000404 rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000405 }
danielk1977cd3e8f72008-03-25 09:47:35 +0000406
407 /* Jump here for an error that occurs after successfully allocating
408 ** curMain and calling sqlite3BtreeEnter(). For an error that occurs
409 ** before that point, jump to error_out.
410 */
drh701bb3b2008-08-02 03:50:39 +0000411initone_error_out:
danielk1977602b4662009-07-02 07:47:33 +0000412 if( openedTransaction ){
413 sqlite3BtreeCommit(pDb->pBt);
414 }
drhb1ab8ea2007-08-29 00:33:07 +0000415 sqlite3BtreeLeave(pDb->pBt);
danielk1977a1644fd2007-08-29 12:31:25 +0000416
417error_out:
drh36494b82017-08-25 15:43:34 +0000418 if( rc ){
419 if( rc==SQLITE_NOMEM || rc==SQLITE_IOERR_NOMEM ){
420 sqlite3OomFault(db);
421 }
422 sqlite3ResetOneSchema(db, iDb);
danielk1977a1644fd2007-08-29 12:31:25 +0000423 }
drh36494b82017-08-25 15:43:34 +0000424 db->init.busy = 0;
danielk1977fa256a32005-05-25 04:11:56 +0000425 return rc;
426}
427
428/*
429** Initialize all database files - the main database file, the file
430** used to store temporary tables, and any additional database files
431** created using ATTACH statements. Return a success code. If an
432** error occurs, write an error message into *pzErrMsg.
433**
danielk1977e7259292006-01-13 06:33:23 +0000434** After a database is initialized, the DB_SchemaLoaded bit is set
dan0ea2d422020-03-05 18:04:09 +0000435** bit is set in the flags field of the Db structure.
danielk1977fa256a32005-05-25 04:11:56 +0000436*/
437int sqlite3Init(sqlite3 *db, char **pzErrMsg){
438 int i, rc;
drh8257aa82017-07-26 19:59:13 +0000439 int commit_internal = !(db->mDbFlags&DBFLAG_SchemaChange);
danielk1977fa256a32005-05-25 04:11:56 +0000440
drhb1ab8ea2007-08-29 00:33:07 +0000441 assert( sqlite3_mutex_held(db->mutex) );
drh9bd3cc42014-12-12 23:17:54 +0000442 assert( sqlite3BtreeHoldsMutex(db->aDb[0].pBt) );
drh09e60542014-09-10 22:46:46 +0000443 assert( db->init.busy==0 );
drh9bd3cc42014-12-12 23:17:54 +0000444 ENC(db) = SCHEMA_ENC(db);
drh36494b82017-08-25 15:43:34 +0000445 assert( db->nDb>0 );
446 /* Do the main schema first */
447 if( !DbHasProperty(db, 0, DB_SchemaLoaded) ){
drh1595abc2018-08-14 19:27:51 +0000448 rc = sqlite3InitOne(db, 0, pzErrMsg, 0);
drh36494b82017-08-25 15:43:34 +0000449 if( rc ) return rc;
450 }
451 /* All other schemas after the main schema. The "temp" schema must be last */
452 for(i=db->nDb-1; i>0; i--){
drh32158722018-04-25 10:30:46 +0000453 assert( i==1 || sqlite3BtreeHoldsMutex(db->aDb[i].pBt) );
drh36494b82017-08-25 15:43:34 +0000454 if( !DbHasProperty(db, i, DB_SchemaLoaded) ){
drh1595abc2018-08-14 19:27:51 +0000455 rc = sqlite3InitOne(db, i, pzErrMsg, 0);
drh36494b82017-08-25 15:43:34 +0000456 if( rc ) return rc;
danielk1977fa256a32005-05-25 04:11:56 +0000457 }
458 }
drh36494b82017-08-25 15:43:34 +0000459 if( commit_internal ){
danielk1977fa256a32005-05-25 04:11:56 +0000460 sqlite3CommitInternalChanges(db);
461 }
drh36494b82017-08-25 15:43:34 +0000462 return SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000463}
464
465/*
mistachkin48864df2013-03-21 21:20:32 +0000466** This routine is a no-op if the database schema is already initialized.
danielk1977fa256a32005-05-25 04:11:56 +0000467** Otherwise, the schema is loaded. An error code is returned.
468*/
469int sqlite3ReadSchema(Parse *pParse){
470 int rc = SQLITE_OK;
471 sqlite3 *db = pParse->db;
drhb1ab8ea2007-08-29 00:33:07 +0000472 assert( sqlite3_mutex_held(db->mutex) );
danielk1977fa256a32005-05-25 04:11:56 +0000473 if( !db->init.busy ){
danielk1977b82e7ed2006-01-11 14:09:31 +0000474 rc = sqlite3Init(db, &pParse->zErrMsg);
drhb2c85592018-04-25 12:01:45 +0000475 if( rc!=SQLITE_OK ){
476 pParse->rc = rc;
477 pParse->nErr++;
478 }else if( db->noSharedCache ){
479 db->mDbFlags |= DBFLAG_SchemaKnownOk;
480 }
danielk1977fa256a32005-05-25 04:11:56 +0000481 }
482 return rc;
483}
484
485
486/*
487** Check schema cookies in all databases. If any cookie is out
drh1adecdf2009-07-03 19:19:50 +0000488** of date set pParse->rc to SQLITE_SCHEMA. If all schema cookies
489** make no changes to pParse->rc.
danielk1977fa256a32005-05-25 04:11:56 +0000490*/
danielk1977602b4662009-07-02 07:47:33 +0000491static void schemaIsValid(Parse *pParse){
492 sqlite3 *db = pParse->db;
danielk1977fa256a32005-05-25 04:11:56 +0000493 int iDb;
494 int rc;
danielk1977fa256a32005-05-25 04:11:56 +0000495 int cookie;
danielk1977fa256a32005-05-25 04:11:56 +0000496
danielk1977602b4662009-07-02 07:47:33 +0000497 assert( pParse->checkSchema );
498 assert( sqlite3_mutex_held(db->mutex) );
499 for(iDb=0; iDb<db->nDb; iDb++){
500 int openedTransaction = 0; /* True if a transaction is opened */
501 Btree *pBt = db->aDb[iDb].pBt; /* Btree database to read cookie from */
502 if( pBt==0 ) continue;
503
504 /* If there is not already a read-only (or read-write) transaction opened
505 ** on the b-tree database, open one now. If a transaction is opened, it
506 ** will be closed immediately after reading the meta-value. */
drh99744fa2020-08-25 19:09:07 +0000507 if( sqlite3BtreeTxnState(pBt)==SQLITE_TXN_NONE ){
drhbb2d9b12018-06-06 16:28:40 +0000508 rc = sqlite3BtreeBeginTrans(pBt, 0, 0);
drh1adecdf2009-07-03 19:19:50 +0000509 if( rc==SQLITE_NOMEM || rc==SQLITE_IOERR_NOMEM ){
drh4a642b62016-02-05 01:55:27 +0000510 sqlite3OomFault(db);
drh23890482021-04-05 11:39:55 +0000511 pParse->rc = SQLITE_NOMEM;
danielk1977602b4662009-07-02 07:47:33 +0000512 }
513 if( rc!=SQLITE_OK ) return;
514 openedTransaction = 1;
515 }
516
517 /* Read the schema cookie from the database. If it does not match the
shanehd77f56e2009-12-17 21:05:42 +0000518 ** value stored as part of the in-memory schema representation,
danielk1977602b4662009-07-02 07:47:33 +0000519 ** set Parse.rc to SQLITE_SCHEMA. */
520 sqlite3BtreeGetMeta(pBt, BTREE_SCHEMA_VERSION, (u32 *)&cookie);
drh21206082011-04-04 18:22:02 +0000521 assert( sqlite3SchemaMutexHeld(db, iDb, 0) );
danielk1977602b4662009-07-02 07:47:33 +0000522 if( cookie!=db->aDb[iDb].pSchema->schema_cookie ){
drh81028a42012-05-15 18:28:27 +0000523 sqlite3ResetOneSchema(db, iDb);
danielk1977602b4662009-07-02 07:47:33 +0000524 pParse->rc = SQLITE_SCHEMA;
525 }
526
527 /* Close the transaction, if one was opened. */
528 if( openedTransaction ){
529 sqlite3BtreeCommit(pBt);
530 }
531 }
danielk1977fa256a32005-05-25 04:11:56 +0000532}
533
534/*
drhf248e212006-01-25 22:50:38 +0000535** Convert a schema pointer into the iDb index that indicates
536** which database file in db->aDb[] the schema refers to.
537**
538** If the same database is attached more than once, the first
539** attached database is returned.
540*/
danielk1977e501b892006-01-09 06:29:47 +0000541int sqlite3SchemaToIndex(sqlite3 *db, Schema *pSchema){
drhbdd4f7d2020-05-26 10:54:46 +0000542 int i = -32768;
drh198bf392006-01-06 21:52:49 +0000543
drhbdd4f7d2020-05-26 10:54:46 +0000544 /* If pSchema is NULL, then return -32768. This happens when code in
drh198bf392006-01-06 21:52:49 +0000545 ** expr.c is trying to resolve a reference to a transient table (i.e. one
546 ** created by a sub-select). In this case the return value of this
547 ** function should never be used.
548 **
drhbdd4f7d2020-05-26 10:54:46 +0000549 ** We return -32768 instead of the more usual -1 simply because using
550 ** -32768 as the incorrect index into db->aDb[] is much
drh198bf392006-01-06 21:52:49 +0000551 ** more likely to cause a segfault than -1 (of course there are assert()
drhbdd4f7d2020-05-26 10:54:46 +0000552 ** statements too, but it never hurts to play the odds) and
553 ** -32768 will still fit into a 16-bit signed integer.
drh198bf392006-01-06 21:52:49 +0000554 */
drhb1ab8ea2007-08-29 00:33:07 +0000555 assert( sqlite3_mutex_held(db->mutex) );
drh198bf392006-01-06 21:52:49 +0000556 if( pSchema ){
drh9d9c41e2017-10-31 03:40:15 +0000557 for(i=0; 1; i++){
558 assert( i<db->nDb );
drh198bf392006-01-06 21:52:49 +0000559 if( db->aDb[i].pSchema==pSchema ){
560 break;
561 }
562 }
drh1c767f02009-01-09 02:49:31 +0000563 assert( i>=0 && i<db->nDb );
drh198bf392006-01-06 21:52:49 +0000564 }
565 return i;
566}
567
568/*
drhf30a9692013-11-15 01:10:18 +0000569** Free all memory allocations in the pParse object
570*/
drhc692df22022-01-24 15:34:55 +0000571void sqlite3ParseObjectReset(Parse *pParse){
drh6903bf62017-08-01 20:59:41 +0000572 sqlite3 *db = pParse->db;
drh1da88b52022-01-24 19:38:56 +0000573 assert( db!=0 );
574 assert( db->pParse==pParse );
drh16118262021-12-31 17:54:48 +0000575 assert( pParse->nested==0 );
576#ifndef SQLITE_OMIT_SHARED_CACHE
577 sqlite3DbFree(db, pParse->aTableLock);
578#endif
drhcf3c0782021-01-11 20:37:02 +0000579 while( pParse->pCleanup ){
drh5e5683a2021-01-13 21:05:07 +0000580 ParseCleanup *pCleanup = pParse->pCleanup;
581 pParse->pCleanup = pCleanup->pNext;
582 pCleanup->xCleanup(db, pCleanup->pPtr);
drhc54246f2021-02-17 21:13:14 +0000583 sqlite3DbFreeNN(db, pCleanup);
drhcf3c0782021-01-11 20:37:02 +0000584 }
drh6903bf62017-08-01 20:59:41 +0000585 sqlite3DbFree(db, pParse->aLabel);
drhcf3c0782021-01-11 20:37:02 +0000586 if( pParse->pConstExpr ){
587 sqlite3ExprListDelete(db, pParse->pConstExpr);
588 }
drh1da88b52022-01-24 19:38:56 +0000589 assert( db->lookaside.bDisable >= pParse->disableLookaside );
590 db->lookaside.bDisable -= pParse->disableLookaside;
591 db->lookaside.sz = db->lookaside.bDisable ? 0 : db->lookaside.szTrue;
592 assert( pParse->db->pParse==pParse );
593 db->pParse = pParse->pOuterParse;
594 pParse->db = 0;
drh6903bf62017-08-01 20:59:41 +0000595 pParse->disableLookaside = 0;
drhf30a9692013-11-15 01:10:18 +0000596}
597
598/*
drhcf3c0782021-01-11 20:37:02 +0000599** Add a new cleanup operation to a Parser. The cleanup should happen when
drh21d4f5b2021-01-12 15:30:01 +0000600** the parser object is destroyed. But, beware: the cleanup might happen
601** immediately.
drhcf3c0782021-01-11 20:37:02 +0000602**
603** Use this mechanism for uncommon cleanups. There is a higher setup
drh21d4f5b2021-01-12 15:30:01 +0000604** cost for this mechansim (an extra malloc), so it should not be used
605** for common cleanups that happen on most calls. But for less
drhcf3c0782021-01-11 20:37:02 +0000606** common cleanups, we save a single NULL-pointer comparison in
drhc692df22022-01-24 15:34:55 +0000607** sqlite3ParseObjectReset(), which reduces the total CPU cycle count.
drhcf3c0782021-01-11 20:37:02 +0000608**
609** If a memory allocation error occurs, then the cleanup happens immediately.
drh6d0053c2021-03-09 19:32:37 +0000610** When either SQLITE_DEBUG or SQLITE_COVERAGE_TEST are defined, the
drh21d4f5b2021-01-12 15:30:01 +0000611** pParse->earlyCleanup flag is set in that case. Calling code show verify
612** that test cases exist for which this happens, to guard against possible
613** use-after-free errors following an OOM. The preferred way to do this is
614** to immediately follow the call to this routine with:
615**
616** testcase( pParse->earlyCleanup );
drh6d0053c2021-03-09 19:32:37 +0000617**
618** This routine returns a copy of its pPtr input (the third parameter)
619** except if an early cleanup occurs, in which case it returns NULL. So
620** another way to check for early cleanup is to check the return value.
621** Or, stop using the pPtr parameter with this call and use only its
622** return value thereafter. Something like this:
623**
624** pObj = sqlite3ParserAddCleanup(pParse, destructor, pObj);
drhcf3c0782021-01-11 20:37:02 +0000625*/
drha79e2a22021-02-21 23:44:14 +0000626void *sqlite3ParserAddCleanup(
drh21d4f5b2021-01-12 15:30:01 +0000627 Parse *pParse, /* Destroy when this Parser finishes */
628 void (*xCleanup)(sqlite3*,void*), /* The cleanup routine */
629 void *pPtr /* Pointer to object to be cleaned up */
drhcf3c0782021-01-11 20:37:02 +0000630){
631 ParseCleanup *pCleanup = sqlite3DbMallocRaw(pParse->db, sizeof(*pCleanup));
632 if( pCleanup ){
633 pCleanup->pNext = pParse->pCleanup;
634 pParse->pCleanup = pCleanup;
635 pCleanup->pPtr = pPtr;
636 pCleanup->xCleanup = xCleanup;
637 }else{
638 xCleanup(pParse->db, pPtr);
drha79e2a22021-02-21 23:44:14 +0000639 pPtr = 0;
drh21d4f5b2021-01-12 15:30:01 +0000640#if defined(SQLITE_DEBUG) || defined(SQLITE_COVERAGE_TEST)
641 pParse->earlyCleanup = 1;
642#endif
drhcf3c0782021-01-11 20:37:02 +0000643 }
drha79e2a22021-02-21 23:44:14 +0000644 return pPtr;
drhcf3c0782021-01-11 20:37:02 +0000645}
646
647/*
drhc692df22022-01-24 15:34:55 +0000648** Turn bulk memory into a valid Parse object and link that Parse object
649** into database connection db.
650**
651** Call sqlite3ParseObjectReset() to undo this operation.
652**
653** Caution: Do not confuse this routine with sqlite3ParseObjectInit() which
654** is generated by Lemon.
655*/
656void sqlite3ParseObjectInit(Parse *pParse, sqlite3 *db){
657 memset(PARSE_HDR(pParse), 0, PARSE_HDR_SZ);
658 memset(PARSE_TAIL(pParse), 0, PARSE_TAIL_SZ);
659 assert( db->pParse!=pParse );
660 pParse->pOuterParse = db->pParse;
661 db->pParse = pParse;
662 pParse->db = db;
drh75863ec2022-01-28 21:39:29 +0000663 if( db->mallocFailed ) sqlite3ErrorMsg(pParse, "out of memory");
drhc692df22022-01-24 15:34:55 +0000664}
665
666/*
danielk1977fa256a32005-05-25 04:11:56 +0000667** Compile the UTF-8 encoded SQL statement zSql into a statement handle.
668*/
mlcreech3a00f902008-03-04 17:45:01 +0000669static int sqlite3Prepare(
danielk1977fa256a32005-05-25 04:11:56 +0000670 sqlite3 *db, /* Database handle. */
671 const char *zSql, /* UTF-8 encoded SQL statement. */
672 int nBytes, /* Length of zSql in bytes. */
drh2c2f3922017-06-01 00:54:35 +0000673 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
dan937d0de2009-10-15 18:35:38 +0000674 Vdbe *pReprepare, /* VM being reprepared */
danielk1977fa256a32005-05-25 04:11:56 +0000675 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
drhb900aaf2006-11-09 00:24:53 +0000676 const char **pzTail /* OUT: End of parsed string */
danielk1977fa256a32005-05-25 04:11:56 +0000677){
drhe7b347072009-06-01 18:18:20 +0000678 int rc = SQLITE_OK; /* Result code */
679 int i; /* Loop counter */
drhcb43a932016-10-03 01:21:51 +0000680 Parse sParse; /* Parsing context */
danielk1977fa256a32005-05-25 04:11:56 +0000681
drhc692df22022-01-24 15:34:55 +0000682 /* sqlite3ParseObjectInit(&sParse, db); // inlined for performance */
683 memset(PARSE_HDR(&sParse), 0, PARSE_HDR_SZ);
drhcb43a932016-10-03 01:21:51 +0000684 memset(PARSE_TAIL(&sParse), 0, PARSE_TAIL_SZ);
drhc692df22022-01-24 15:34:55 +0000685 sParse.pOuterParse = db->pParse;
686 db->pParse = &sParse;
687 sParse.db = db;
drhcb43a932016-10-03 01:21:51 +0000688 sParse.pReprepare = pReprepare;
drh860e0772009-04-02 18:32:26 +0000689 assert( ppStmt && *ppStmt==0 );
drh75863ec2022-01-28 21:39:29 +0000690 if( db->mallocFailed ) sqlite3ErrorMsg(&sParse, "out of memory");
drhb21c8cd2007-08-21 19:33:56 +0000691 assert( sqlite3_mutex_held(db->mutex) );
danielk1977fa256a32005-05-25 04:11:56 +0000692
drh2c2f3922017-06-01 00:54:35 +0000693 /* For a long-term use prepared statement avoid the use of
694 ** lookaside memory.
695 */
696 if( prepFlags & SQLITE_PREPARE_PERSISTENT ){
697 sParse.disableLookaside++;
drh31f69622019-10-05 14:39:36 +0000698 DisableLookaside;
drh2c2f3922017-06-01 00:54:35 +0000699 }
dan1ea04432018-12-21 19:29:11 +0000700 sParse.disableVtab = (prepFlags & SQLITE_PREPARE_NO_VTAB)!=0;
drh2c2f3922017-06-01 00:54:35 +0000701
drhc74d0b1d2009-02-24 16:18:05 +0000702 /* Check to verify that it is possible to get a read lock on all
703 ** database schemas. The inability to get a read lock indicates that
704 ** some other database connection is holding a write-lock, which in
705 ** turn means that the other connection has made uncommitted changes
706 ** to the schema.
707 **
708 ** Were we to proceed and prepare the statement against the uncommitted
709 ** schema changes and if those schema changes are subsequently rolled
710 ** back and different changes are made in their place, then when this
711 ** prepared statement goes to run the schema cookie would fail to detect
712 ** the schema change. Disaster would follow.
713 **
714 ** This thread is currently holding mutexes on all Btrees (because
715 ** of the sqlite3BtreeEnterAll() in sqlite3LockAndPrepare()) so it
716 ** is not possible for another thread to start a new schema change
717 ** while this routine is running. Hence, we do not need to hold
718 ** locks on the schema, we just need to make sure nobody else is
719 ** holding them.
720 **
721 ** Note that setting READ_UNCOMMITTED overrides most lock detection,
722 ** but it does *not* override schema lock detection, so this all still
723 ** works even if READ_UNCOMMITTED is set.
danielk1977c87d34d2006-01-06 13:00:28 +0000724 */
drh705e7332019-10-05 19:53:21 +0000725 if( !db->noSharedCache ){
726 for(i=0; i<db->nDb; i++) {
727 Btree *pBt = db->aDb[i].pBt;
728 if( pBt ){
729 assert( sqlite3BtreeHoldsMutex(pBt) );
730 rc = sqlite3BtreeSchemaLocked(pBt);
731 if( rc ){
732 const char *zDb = db->aDb[i].zDbSName;
733 sqlite3ErrorWithMsg(db, rc, "database schema is locked: %s", zDb);
734 testcase( db->flags & SQLITE_ReadUncommit );
735 goto end_prepare;
736 }
drhb1ab8ea2007-08-29 00:33:07 +0000737 }
danielk1977c87d34d2006-01-06 13:00:28 +0000738 }
739 }
drhe7b347072009-06-01 18:18:20 +0000740
danielk1977595a5232009-07-24 17:58:53 +0000741 sqlite3VtabUnlockList(db);
drhe7b347072009-06-01 18:18:20 +0000742
drhd2d88bb2008-05-23 14:32:18 +0000743 if( nBytes>=0 && (nBytes==0 || zSql[nBytes-1]!=0) ){
drhe5c941b2007-05-08 13:58:26 +0000744 char *zSqlCopy;
drhbb4957f2008-03-20 14:03:29 +0000745 int mxLen = db->aLimit[SQLITE_LIMIT_SQL_LENGTH];
drh58fbb312009-06-17 00:35:30 +0000746 testcase( nBytes==mxLen );
747 testcase( nBytes==mxLen+1 );
drhbb4957f2008-03-20 14:03:29 +0000748 if( nBytes>mxLen ){
drh13f40da2014-08-22 18:00:11 +0000749 sqlite3ErrorWithMsg(db, SQLITE_TOOBIG, "statement too long");
drhe7b347072009-06-01 18:18:20 +0000750 rc = sqlite3ApiExit(db, SQLITE_TOOBIG);
751 goto end_prepare;
drhe5c941b2007-05-08 13:58:26 +0000752 }
drh17435752007-08-16 04:30:38 +0000753 zSqlCopy = sqlite3DbStrNDup(db, zSql, nBytes);
drh276fdbf2007-04-30 21:39:16 +0000754 if( zSqlCopy ){
drh54bc6382021-12-31 19:20:42 +0000755 sqlite3RunParser(&sParse, zSqlCopy);
drhcb43a932016-10-03 01:21:51 +0000756 sParse.zTail = &zSql[sParse.zTail-zSqlCopy];
dan98a4d5a2016-01-29 08:38:35 +0000757 sqlite3DbFree(db, zSqlCopy);
danielk19773a2c8c82008-04-03 14:36:25 +0000758 }else{
drhcb43a932016-10-03 01:21:51 +0000759 sParse.zTail = &zSql[nBytes];
drh276fdbf2007-04-30 21:39:16 +0000760 }
drh9051a422006-01-30 22:35:43 +0000761 }else{
drh54bc6382021-12-31 19:20:42 +0000762 sqlite3RunParser(&sParse, zSql);
drh9051a422006-01-30 22:35:43 +0000763 }
drhcb43a932016-10-03 01:21:51 +0000764 assert( 0==sParse.nQueryLoop );
danielk1977fa256a32005-05-25 04:11:56 +0000765
drhb900aaf2006-11-09 00:24:53 +0000766 if( pzTail ){
drhcb43a932016-10-03 01:21:51 +0000767 *pzTail = sParse.zTail;
drhb900aaf2006-11-09 00:24:53 +0000768 }
danielk1977fa256a32005-05-25 04:11:56 +0000769
danielk19776ab3a2e2009-02-19 14:39:25 +0000770 if( db->init.busy==0 ){
drh2c2f3922017-06-01 00:54:35 +0000771 sqlite3VdbeSetSql(sParse.pVdbe, zSql, (int)(sParse.zTail-zSql), prepFlags);
danielk19777e29e952007-04-19 11:09:01 +0000772 }
drhf3ce2482019-10-09 01:19:07 +0000773 if( db->mallocFailed ){
774 sParse.rc = SQLITE_NOMEM_BKPT;
drhad3930b2021-04-03 20:35:08 +0000775 sParse.checkSchema = 0;
drhf3ce2482019-10-09 01:19:07 +0000776 }
drh88efc792021-01-01 18:23:56 +0000777 if( sParse.rc!=SQLITE_OK && sParse.rc!=SQLITE_DONE ){
drh24a82ea2022-01-01 22:55:31 +0000778 if( sParse.checkSchema && db->init.busy==0 ){
drh88efc792021-01-01 18:23:56 +0000779 schemaIsValid(&sParse);
780 }
781 if( sParse.pVdbe ){
782 sqlite3VdbeFinalize(sParse.pVdbe);
783 }
784 assert( 0==(*ppStmt) );
785 rc = sParse.rc;
drh54bc6382021-12-31 19:20:42 +0000786 if( sParse.zErrMsg ){
787 sqlite3ErrorWithMsg(db, rc, "%s", sParse.zErrMsg);
788 sqlite3DbFree(db, sParse.zErrMsg);
drh88efc792021-01-01 18:23:56 +0000789 }else{
790 sqlite3Error(db, rc);
791 }
danielk19777e29e952007-04-19 11:09:01 +0000792 }else{
drh54bc6382021-12-31 19:20:42 +0000793 assert( sParse.zErrMsg==0 );
drhcb43a932016-10-03 01:21:51 +0000794 *ppStmt = (sqlite3_stmt*)sParse.pVdbe;
drh88efc792021-01-01 18:23:56 +0000795 rc = SQLITE_OK;
796 sqlite3ErrorClear(db);
danielk1977fa256a32005-05-25 04:11:56 +0000797 }
798
danielk1977261919c2005-12-06 12:52:59 +0000799
dan65a7cd12009-09-01 12:16:01 +0000800 /* Delete any TriggerPrg structures allocated while parsing this statement. */
drhcb43a932016-10-03 01:21:51 +0000801 while( sParse.pTriggerPrg ){
802 TriggerPrg *pT = sParse.pTriggerPrg;
803 sParse.pTriggerPrg = pT->pNext;
dan165921a2009-08-28 18:53:45 +0000804 sqlite3DbFree(db, pT);
805 }
806
drhe7b347072009-06-01 18:18:20 +0000807end_prepare:
808
drhc692df22022-01-24 15:34:55 +0000809 sqlite3ParseObjectReset(&sParse);
danielk1977fa256a32005-05-25 04:11:56 +0000810 return rc;
811}
drhb21c8cd2007-08-21 19:33:56 +0000812static int sqlite3LockAndPrepare(
813 sqlite3 *db, /* Database handle. */
814 const char *zSql, /* UTF-8 encoded SQL statement. */
815 int nBytes, /* Length of zSql in bytes. */
drh2c2f3922017-06-01 00:54:35 +0000816 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
dan937d0de2009-10-15 18:35:38 +0000817 Vdbe *pOld, /* VM being reprepared */
drhb21c8cd2007-08-21 19:33:56 +0000818 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
819 const char **pzTail /* OUT: End of parsed string */
820){
821 int rc;
drh7e8515d2017-12-08 19:37:04 +0000822 int cnt = 0;
drh9ca95732014-10-24 00:35:58 +0000823
824#ifdef SQLITE_ENABLE_API_ARMOR
825 if( ppStmt==0 ) return SQLITE_MISUSE_BKPT;
826#endif
drh860e0772009-04-02 18:32:26 +0000827 *ppStmt = 0;
drh9ca95732014-10-24 00:35:58 +0000828 if( !sqlite3SafetyCheckOk(db)||zSql==0 ){
drh413c3d32010-02-23 20:11:56 +0000829 return SQLITE_MISUSE_BKPT;
drh27641702007-08-22 02:56:42 +0000830 }
drhb21c8cd2007-08-21 19:33:56 +0000831 sqlite3_mutex_enter(db->mutex);
drhb1ab8ea2007-08-29 00:33:07 +0000832 sqlite3BtreeEnterAll(db);
drh7e8515d2017-12-08 19:37:04 +0000833 do{
834 /* Make multiple attempts to compile the SQL, until it either succeeds
835 ** or encounters a permanent error. A schema problem after one schema
836 ** reset is considered a permanent error. */
drh2c2f3922017-06-01 00:54:35 +0000837 rc = sqlite3Prepare(db, zSql, nBytes, prepFlags, pOld, ppStmt, pzTail);
drh7e8515d2017-12-08 19:37:04 +0000838 assert( rc==SQLITE_OK || *ppStmt==0 );
drh15561b92021-12-09 14:09:47 +0000839 if( rc==SQLITE_OK || db->mallocFailed ) break;
drh7e8515d2017-12-08 19:37:04 +0000840 }while( rc==SQLITE_ERROR_RETRY
841 || (rc==SQLITE_SCHEMA && (sqlite3ResetOneSchema(db,-1), cnt++)==0) );
drhb1ab8ea2007-08-29 00:33:07 +0000842 sqlite3BtreeLeaveAll(db);
drh7e8515d2017-12-08 19:37:04 +0000843 rc = sqlite3ApiExit(db, rc);
844 assert( (rc&db->errMask)==rc );
dan2b06b072020-09-04 17:30:59 +0000845 db->busyHandler.nBusy = 0;
drhb21c8cd2007-08-21 19:33:56 +0000846 sqlite3_mutex_leave(db->mutex);
847 return rc;
848}
danielk1977fa256a32005-05-25 04:11:56 +0000849
mistachkin8bee11a2018-10-29 17:53:23 +0000850
drhb900aaf2006-11-09 00:24:53 +0000851/*
852** Rerun the compilation of a statement after a schema change.
danielk197765a2ea12009-03-19 07:58:31 +0000853**
854** If the statement is successfully recompiled, return SQLITE_OK. Otherwise,
855** if the statement cannot be recompiled because another connection has
drh1e32bed2020-06-19 13:33:53 +0000856** locked the sqlite3_schema table, return SQLITE_LOCKED. If any other error
danielk197765a2ea12009-03-19 07:58:31 +0000857** occurs, return SQLITE_SCHEMA.
drhb900aaf2006-11-09 00:24:53 +0000858*/
859int sqlite3Reprepare(Vdbe *p){
860 int rc;
drh4f0c5872007-03-26 22:05:01 +0000861 sqlite3_stmt *pNew;
drhb900aaf2006-11-09 00:24:53 +0000862 const char *zSql;
863 sqlite3 *db;
drh2c2f3922017-06-01 00:54:35 +0000864 u8 prepFlags;
drhb21c8cd2007-08-21 19:33:56 +0000865
drhb1ab8ea2007-08-29 00:33:07 +0000866 assert( sqlite3_mutex_held(sqlite3VdbeDb(p)->mutex) );
danielk1977d0e2a852007-11-14 06:48:48 +0000867 zSql = sqlite3_sql((sqlite3_stmt *)p);
drhc4dd3fd2008-01-22 01:48:05 +0000868 assert( zSql!=0 ); /* Reprepare only called for prepare_v2() statements */
drhb900aaf2006-11-09 00:24:53 +0000869 db = sqlite3VdbeDb(p);
drhb21c8cd2007-08-21 19:33:56 +0000870 assert( sqlite3_mutex_held(db->mutex) );
drh2c2f3922017-06-01 00:54:35 +0000871 prepFlags = sqlite3VdbePrepareFlags(p);
872 rc = sqlite3LockAndPrepare(db, zSql, -1, prepFlags, p, &pNew, 0);
drhb900aaf2006-11-09 00:24:53 +0000873 if( rc ){
danielk19778e556522007-11-13 10:30:24 +0000874 if( rc==SQLITE_NOMEM ){
drh4a642b62016-02-05 01:55:27 +0000875 sqlite3OomFault(db);
danielk19778e556522007-11-13 10:30:24 +0000876 }
drhb900aaf2006-11-09 00:24:53 +0000877 assert( pNew==0 );
drha6129fa2010-02-24 17:15:19 +0000878 return rc;
drhb900aaf2006-11-09 00:24:53 +0000879 }else{
880 assert( pNew!=0 );
881 }
drh4f0c5872007-03-26 22:05:01 +0000882 sqlite3VdbeSwap((Vdbe*)pNew, p);
shane145834a2008-09-04 12:03:42 +0000883 sqlite3TransferBindings(pNew, (sqlite3_stmt*)p);
drh4f0c5872007-03-26 22:05:01 +0000884 sqlite3VdbeResetStepResult((Vdbe*)pNew);
885 sqlite3VdbeFinalize((Vdbe*)pNew);
danielk197765a2ea12009-03-19 07:58:31 +0000886 return SQLITE_OK;
drhb900aaf2006-11-09 00:24:53 +0000887}
888
889
890/*
891** Two versions of the official API. Legacy and new use. In the legacy
892** version, the original SQL text is not saved in the prepared statement
893** and so if a schema change occurs, SQLITE_SCHEMA is returned by
894** sqlite3_step(). In the new version, the original SQL text is retained
895** and the statement is automatically recompiled if an schema change
896** occurs.
897*/
898int sqlite3_prepare(
899 sqlite3 *db, /* Database handle. */
900 const char *zSql, /* UTF-8 encoded SQL statement. */
901 int nBytes, /* Length of zSql in bytes. */
902 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
903 const char **pzTail /* OUT: End of parsed string */
904){
drh17eaae72008-03-03 18:47:28 +0000905 int rc;
dan937d0de2009-10-15 18:35:38 +0000906 rc = sqlite3LockAndPrepare(db,zSql,nBytes,0,0,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +0000907 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +0000908 return rc;
drhb900aaf2006-11-09 00:24:53 +0000909}
910int sqlite3_prepare_v2(
911 sqlite3 *db, /* Database handle. */
912 const char *zSql, /* UTF-8 encoded SQL statement. */
913 int nBytes, /* Length of zSql in bytes. */
914 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
915 const char **pzTail /* OUT: End of parsed string */
916){
drh17eaae72008-03-03 18:47:28 +0000917 int rc;
drh3cef3642017-07-14 19:22:08 +0000918 /* EVIDENCE-OF: R-37923-12173 The sqlite3_prepare_v2() interface works
919 ** exactly the same as sqlite3_prepare_v3() with a zero prepFlags
920 ** parameter.
921 **
922 ** Proof in that the 5th parameter to sqlite3LockAndPrepare is 0 */
drh2c2f3922017-06-01 00:54:35 +0000923 rc = sqlite3LockAndPrepare(db,zSql,nBytes,SQLITE_PREPARE_SAVESQL,0,
924 ppStmt,pzTail);
drh3cef3642017-07-14 19:22:08 +0000925 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 );
drh2c2f3922017-06-01 00:54:35 +0000926 return rc;
927}
928int sqlite3_prepare_v3(
929 sqlite3 *db, /* Database handle. */
930 const char *zSql, /* UTF-8 encoded SQL statement. */
931 int nBytes, /* Length of zSql in bytes. */
932 unsigned int prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
933 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
934 const char **pzTail /* OUT: End of parsed string */
935){
936 int rc;
drh3cef3642017-07-14 19:22:08 +0000937 /* EVIDENCE-OF: R-56861-42673 sqlite3_prepare_v3() differs from
938 ** sqlite3_prepare_v2() only in having the extra prepFlags parameter,
939 ** which is a bit array consisting of zero or more of the
940 ** SQLITE_PREPARE_* flags.
941 **
942 ** Proof by comparison to the implementation of sqlite3_prepare_v2()
943 ** directly above. */
drh2c2f3922017-06-01 00:54:35 +0000944 rc = sqlite3LockAndPrepare(db,zSql,nBytes,
945 SQLITE_PREPARE_SAVESQL|(prepFlags&SQLITE_PREPARE_MASK),
946 0,ppStmt,pzTail);
drh3cef3642017-07-14 19:22:08 +0000947 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 );
drh17eaae72008-03-03 18:47:28 +0000948 return rc;
drhb900aaf2006-11-09 00:24:53 +0000949}
950
951
danielk1977fa256a32005-05-25 04:11:56 +0000952#ifndef SQLITE_OMIT_UTF16
953/*
954** Compile the UTF-16 encoded SQL statement zSql into a statement handle.
955*/
drhb900aaf2006-11-09 00:24:53 +0000956static int sqlite3Prepare16(
danielk1977fa256a32005-05-25 04:11:56 +0000957 sqlite3 *db, /* Database handle. */
dan0ecdeb22011-01-25 13:43:35 +0000958 const void *zSql, /* UTF-16 encoded SQL statement. */
danielk1977fa256a32005-05-25 04:11:56 +0000959 int nBytes, /* Length of zSql in bytes. */
drh2c2f3922017-06-01 00:54:35 +0000960 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
danielk1977fa256a32005-05-25 04:11:56 +0000961 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
962 const void **pzTail /* OUT: End of parsed string */
963){
964 /* This function currently works by first transforming the UTF-16
965 ** encoded string to UTF-8, then invoking sqlite3_prepare(). The
966 ** tricky bit is figuring out the pointer to return in *pzTail.
967 */
danielk197754f01982006-01-18 15:25:17 +0000968 char *zSql8;
danielk1977c87d34d2006-01-06 13:00:28 +0000969 const char *zTail8 = 0;
danielk197754f01982006-01-18 15:25:17 +0000970 int rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000971
drh9ca95732014-10-24 00:35:58 +0000972#ifdef SQLITE_ENABLE_API_ARMOR
973 if( ppStmt==0 ) return SQLITE_MISUSE_BKPT;
974#endif
drh769e97e2009-04-01 16:33:37 +0000975 *ppStmt = 0;
drh9ca95732014-10-24 00:35:58 +0000976 if( !sqlite3SafetyCheckOk(db)||zSql==0 ){
drh413c3d32010-02-23 20:11:56 +0000977 return SQLITE_MISUSE_BKPT;
danielk1977fa256a32005-05-25 04:11:56 +0000978 }
drh7232ad02013-07-16 23:26:43 +0000979 if( nBytes>=0 ){
980 int sz;
981 const char *z = (const char*)zSql;
982 for(sz=0; sz<nBytes && (z[sz]!=0 || z[sz+1]!=0); sz += 2){}
983 nBytes = sz;
984 }
drhb21c8cd2007-08-21 19:33:56 +0000985 sqlite3_mutex_enter(db->mutex);
danb7dca7d2010-03-05 16:32:12 +0000986 zSql8 = sqlite3Utf16to8(db, zSql, nBytes, SQLITE_UTF16NATIVE);
danielk197754f01982006-01-18 15:25:17 +0000987 if( zSql8 ){
drh2c2f3922017-06-01 00:54:35 +0000988 rc = sqlite3LockAndPrepare(db, zSql8, -1, prepFlags, 0, ppStmt, &zTail8);
danielk1977fa256a32005-05-25 04:11:56 +0000989 }
danielk1977fa256a32005-05-25 04:11:56 +0000990
991 if( zTail8 && pzTail ){
992 /* If sqlite3_prepare returns a tail pointer, we calculate the
993 ** equivalent pointer into the UTF-16 string by counting the unicode
994 ** characters between zSql8 and zTail8, and then returning a pointer
995 ** the same number of characters into the UTF-16 string.
996 */
drhea678832008-12-10 19:26:22 +0000997 int chars_parsed = sqlite3Utf8CharLen(zSql8, (int)(zTail8-zSql8));
drhee858132007-05-08 20:37:38 +0000998 *pzTail = (u8 *)zSql + sqlite3Utf16ByteLen(zSql, chars_parsed);
danielk1977fa256a32005-05-25 04:11:56 +0000999 }
drh633e6d52008-07-28 19:34:53 +00001000 sqlite3DbFree(db, zSql8);
drhb21c8cd2007-08-21 19:33:56 +00001001 rc = sqlite3ApiExit(db, rc);
1002 sqlite3_mutex_leave(db->mutex);
1003 return rc;
danielk1977fa256a32005-05-25 04:11:56 +00001004}
drhb900aaf2006-11-09 00:24:53 +00001005
1006/*
1007** Two versions of the official API. Legacy and new use. In the legacy
1008** version, the original SQL text is not saved in the prepared statement
1009** and so if a schema change occurs, SQLITE_SCHEMA is returned by
1010** sqlite3_step(). In the new version, the original SQL text is retained
1011** and the statement is automatically recompiled if an schema change
1012** occurs.
1013*/
1014int sqlite3_prepare16(
1015 sqlite3 *db, /* Database handle. */
dan0ecdeb22011-01-25 13:43:35 +00001016 const void *zSql, /* UTF-16 encoded SQL statement. */
drhb900aaf2006-11-09 00:24:53 +00001017 int nBytes, /* Length of zSql in bytes. */
1018 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
1019 const void **pzTail /* OUT: End of parsed string */
1020){
drh17eaae72008-03-03 18:47:28 +00001021 int rc;
1022 rc = sqlite3Prepare16(db,zSql,nBytes,0,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +00001023 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +00001024 return rc;
drhb900aaf2006-11-09 00:24:53 +00001025}
1026int sqlite3_prepare16_v2(
1027 sqlite3 *db, /* Database handle. */
dan0ecdeb22011-01-25 13:43:35 +00001028 const void *zSql, /* UTF-16 encoded SQL statement. */
drhb900aaf2006-11-09 00:24:53 +00001029 int nBytes, /* Length of zSql in bytes. */
1030 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
1031 const void **pzTail /* OUT: End of parsed string */
1032){
drh17eaae72008-03-03 18:47:28 +00001033 int rc;
drh2c2f3922017-06-01 00:54:35 +00001034 rc = sqlite3Prepare16(db,zSql,nBytes,SQLITE_PREPARE_SAVESQL,ppStmt,pzTail);
1035 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
1036 return rc;
1037}
1038int sqlite3_prepare16_v3(
1039 sqlite3 *db, /* Database handle. */
1040 const void *zSql, /* UTF-16 encoded SQL statement. */
1041 int nBytes, /* Length of zSql in bytes. */
1042 unsigned int prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
1043 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
1044 const void **pzTail /* OUT: End of parsed string */
1045){
1046 int rc;
1047 rc = sqlite3Prepare16(db,zSql,nBytes,
1048 SQLITE_PREPARE_SAVESQL|(prepFlags&SQLITE_PREPARE_MASK),
1049 ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +00001050 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +00001051 return rc;
drhb900aaf2006-11-09 00:24:53 +00001052}
1053
danielk1977fa256a32005-05-25 04:11:56 +00001054#endif /* SQLITE_OMIT_UTF16 */