blob: 76073874081a7da9b6d14d42a7a81e787d8edabd [file] [log] [blame]
danielk1977fa256a32005-05-25 04:11:56 +00001/*
2** 2005 May 25
3**
4** The author disclaims copyright to this source code. In place of
5** a legal notice, here is a blessing:
6**
7** May you do good and not evil.
8** May you find forgiveness for yourself and forgive others.
9** May you share freely, never taking more than you give.
10**
11*************************************************************************
12** This file contains the implementation of the sqlite3_prepare()
13** interface, and routines that contribute to loading the database schema
14** from disk.
danielk1977fa256a32005-05-25 04:11:56 +000015*/
16#include "sqliteInt.h"
danielk1977fa256a32005-05-25 04:11:56 +000017
18/*
19** Fill the InitData structure with an error message that indicates
20** that the database is corrupt.
21*/
drh34533152008-03-19 13:03:33 +000022static void corruptSchema(
23 InitData *pData, /* Initialization context */
dan6a5a13d2021-02-17 20:08:22 +000024 char **azObj, /* Type and name of object being parsed */
drh34533152008-03-19 13:03:33 +000025 const char *zExtra /* Error information */
26){
drhc456e572008-08-11 18:44:58 +000027 sqlite3 *db = pData->db;
drh1595abc2018-08-14 19:27:51 +000028 if( db->mallocFailed ){
29 pData->rc = SQLITE_NOMEM_BKPT;
30 }else if( pData->pzErrMsg[0]!=0 ){
31 /* A error message has already been generated. Do not overwrite it */
drhac894af2021-11-03 15:59:17 +000032 }else if( pData->mInitFlags & (INITFLAG_AlterMask) ){
33 static const char *azAlterType[] = {
34 "rename",
35 "drop column",
36 "add column"
37 };
dan6a5a13d2021-02-17 20:08:22 +000038 *pData->pzErrMsg = sqlite3MPrintf(db,
39 "error in %s %s after %s: %s", azObj[0], azObj[1],
drhac894af2021-11-03 15:59:17 +000040 azAlterType[(pData->mInitFlags&INITFLAG_AlterMask)-1],
dan6a5a13d2021-02-17 20:08:22 +000041 zExtra
42 );
drh1595abc2018-08-14 19:27:51 +000043 pData->rc = SQLITE_ERROR;
44 }else if( db->flags & SQLITE_WriteSchema ){
45 pData->rc = SQLITE_CORRUPT_BKPT;
46 }else{
drh22c17b82015-05-15 04:13:15 +000047 char *z;
dan6a5a13d2021-02-17 20:08:22 +000048 const char *zObj = azObj[1] ? azObj[1] : "?";
drh17a936f2016-02-05 02:50:11 +000049 z = sqlite3MPrintf(db, "malformed database schema (%s)", zObj);
drh1e9c47b2018-03-16 20:15:58 +000050 if( zExtra && zExtra[0] ) z = sqlite3MPrintf(db, "%z - %s", z, zExtra);
drh22c17b82015-05-15 04:13:15 +000051 *pData->pzErrMsg = z;
drh1595abc2018-08-14 19:27:51 +000052 pData->rc = SQLITE_CORRUPT_BKPT;
danielk1977fa256a32005-05-25 04:11:56 +000053 }
54}
55
56/*
drh8d406732019-01-30 18:33:33 +000057** Check to see if any sibling index (another index on the same table)
58** of pIndex has the same root page number, and if it does, return true.
59** This would indicate a corrupt schema.
60*/
61int sqlite3IndexHasDuplicateRootPage(Index *pIndex){
62 Index *p;
63 for(p=pIndex->pTable->pIndex; p; p=p->pNext){
64 if( p->tnum==pIndex->tnum && p!=pIndex ) return 1;
65 }
66 return 0;
67}
68
drha22d2fc2019-10-05 18:33:25 +000069/* forward declaration */
70static int sqlite3Prepare(
71 sqlite3 *db, /* Database handle. */
72 const char *zSql, /* UTF-8 encoded SQL statement. */
73 int nBytes, /* Length of zSql in bytes. */
74 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
75 Vdbe *pReprepare, /* VM being reprepared */
76 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
77 const char **pzTail /* OUT: End of parsed string */
78);
79
80
drh8d406732019-01-30 18:33:33 +000081/*
danielk1977fa256a32005-05-25 04:11:56 +000082** This is the callback routine for the code that initializes the
83** database. See sqlite3Init() below for additional information.
84** This routine is also called from the OP_ParseSchema opcode of the VDBE.
85**
86** Each callback contains the following information:
87**
drhc5a93d42019-08-12 00:08:07 +000088** argv[0] = type of object: "table", "index", "trigger", or "view".
89** argv[1] = name of thing being created
90** argv[2] = associated table if an index or trigger
91** argv[3] = root page number for table or index. 0 for trigger or view.
92** argv[4] = SQL text for the CREATE statement.
danielk1977fa256a32005-05-25 04:11:56 +000093**
94*/
danielk197762c14b32008-11-19 09:05:26 +000095int sqlite3InitCallback(void *pInit, int argc, char **argv, char **NotUsed){
danielk1977fa256a32005-05-25 04:11:56 +000096 InitData *pData = (InitData*)pInit;
97 sqlite3 *db = pData->db;
drhece3c722006-09-23 20:36:01 +000098 int iDb = pData->iDb;
danielk1977fa256a32005-05-25 04:11:56 +000099
drhc5a93d42019-08-12 00:08:07 +0000100 assert( argc==5 );
danielk1977f3d3c272008-11-19 16:52:44 +0000101 UNUSED_PARAMETER2(NotUsed, argc);
drhb1ab8ea2007-08-29 00:33:07 +0000102 assert( sqlite3_mutex_held(db->mutex) );
dan0ea2d422020-03-05 18:04:09 +0000103 db->mDbFlags |= DBFLAG_EncodingFixed;
drh6000e082021-04-13 13:01:07 +0000104 if( argv==0 ) return 0; /* Might happen if EMPTY_RESULT_CALLBACKS are on */
drh6b86e512019-01-05 21:09:37 +0000105 pData->nInitRow++;
drh17435752007-08-16 04:30:38 +0000106 if( db->mallocFailed ){
dan6a5a13d2021-02-17 20:08:22 +0000107 corruptSchema(pData, argv, 0);
drh9da742f2009-06-16 17:49:36 +0000108 return 1;
danielk1977da184232006-01-05 11:34:32 +0000109 }
110
danielk1977ff9b2e72008-09-08 09:06:18 +0000111 assert( iDb>=0 && iDb<db->nDb );
drhc5a93d42019-08-12 00:08:07 +0000112 if( argv[3]==0 ){
dan6a5a13d2021-02-17 20:08:22 +0000113 corruptSchema(pData, argv, 0);
drh630fc342021-01-01 21:02:37 +0000114 }else if( argv[4]
115 && 'c'==sqlite3UpperToLower[(unsigned char)argv[4][0]]
116 && 'r'==sqlite3UpperToLower[(unsigned char)argv[4][1]] ){
danielk1977fa256a32005-05-25 04:11:56 +0000117 /* Call the parser to process a CREATE TABLE, INDEX or VIEW.
118 ** But because db->init.busy is set to 1, no VDBE code is generated
119 ** or executed. All the parser does is build the internal data
120 ** structures that describe the table, index, or view.
drh630fc342021-01-01 21:02:37 +0000121 **
122 ** No other valid SQL statement, other than the variable CREATE statements,
123 ** can begin with the letters "C" and "R". Thus, it is not possible run
124 ** any other kind of statement while parsing the schema, even a corrupt
125 ** schema.
danielk1977fa256a32005-05-25 04:11:56 +0000126 */
danielk1977fa256a32005-05-25 04:11:56 +0000127 int rc;
drh9ef5e772016-08-19 14:20:56 +0000128 u8 saved_iDb = db->init.iDb;
drh6498f0b2010-04-09 09:14:05 +0000129 sqlite3_stmt *pStmt;
drh9e55d472010-07-06 09:29:01 +0000130 TESTONLY(int rcp); /* Return code from sqlite3_prepare() */
drh6498f0b2010-04-09 09:14:05 +0000131
danielk1977fa256a32005-05-25 04:11:56 +0000132 assert( db->init.busy );
133 db->init.iDb = iDb;
drh69306bf2020-07-22 20:12:10 +0000134 if( sqlite3GetUInt32(argv[3], &db->init.newTnum)==0
135 || (db->init.newTnum>pData->mxPage && pData->mxPage>0)
136 ){
drhca439a42020-07-22 21:05:23 +0000137 if( sqlite3Config.bExtraSchemaChecks ){
dan6a5a13d2021-02-17 20:08:22 +0000138 corruptSchema(pData, argv, "invalid rootpage");
drhca439a42020-07-22 21:05:23 +0000139 }
drh3b3ddba2020-07-22 18:03:56 +0000140 }
drh3d5f74b2009-08-06 17:43:31 +0000141 db->init.orphanTrigger = 0;
drh2a6a72a2021-09-24 02:14:35 +0000142 db->init.azInit = (const char**)argv;
drha22d2fc2019-10-05 18:33:25 +0000143 pStmt = 0;
144 TESTONLY(rcp = ) sqlite3Prepare(db, argv[4], -1, 0, 0, &pStmt, 0);
dan9859c422010-07-06 07:36:18 +0000145 rc = db->errCode;
146 assert( (rc&0xFF)==(rcp&0xFF) );
drh9ef5e772016-08-19 14:20:56 +0000147 db->init.iDb = saved_iDb;
danc9461ec2018-08-29 21:00:16 +0000148 /* assert( saved_iDb==0 || (db->mDbFlags & DBFLAG_Vacuum)!=0 ); */
danielk1977fa256a32005-05-25 04:11:56 +0000149 if( SQLITE_OK!=rc ){
drh3d5f74b2009-08-06 17:43:31 +0000150 if( db->init.orphanTrigger ){
151 assert( iDb==1 );
152 }else{
drhd4da4932019-08-15 13:46:39 +0000153 if( rc > pData->rc ) pData->rc = rc;
drh3d5f74b2009-08-06 17:43:31 +0000154 if( rc==SQLITE_NOMEM ){
drh4a642b62016-02-05 01:55:27 +0000155 sqlite3OomFault(db);
dan9859c422010-07-06 07:36:18 +0000156 }else if( rc!=SQLITE_INTERRUPT && (rc&0xFF)!=SQLITE_LOCKED ){
dan6a5a13d2021-02-17 20:08:22 +0000157 corruptSchema(pData, argv, sqlite3_errmsg(db));
drh3d5f74b2009-08-06 17:43:31 +0000158 }
danielk1977261919c2005-12-06 12:52:59 +0000159 }
danielk1977fa256a32005-05-25 04:11:56 +0000160 }
drh2a6a72a2021-09-24 02:14:35 +0000161 db->init.azInit = sqlite3StdType; /* Any array of string ptrs will do */
drh6498f0b2010-04-09 09:14:05 +0000162 sqlite3_finalize(pStmt);
drhc5a93d42019-08-12 00:08:07 +0000163 }else if( argv[1]==0 || (argv[4]!=0 && argv[4][0]!=0) ){
dan6a5a13d2021-02-17 20:08:22 +0000164 corruptSchema(pData, argv, 0);
danielk1977fa256a32005-05-25 04:11:56 +0000165 }else{
166 /* If the SQL column is blank it means this is an index that
167 ** was created to be the PRIMARY KEY or to fulfill a UNIQUE
168 ** constraint for a CREATE TABLE. The index should have already
169 ** been created when we processed the CREATE TABLE. All we have
170 ** to do here is record the root page number for that index.
171 */
172 Index *pIndex;
drhc5a93d42019-08-12 00:08:07 +0000173 pIndex = sqlite3FindIndex(db, argv[1], db->aDb[iDb].zDbSName);
drh69306bf2020-07-22 20:12:10 +0000174 if( pIndex==0 ){
dan6a5a13d2021-02-17 20:08:22 +0000175 corruptSchema(pData, argv, "orphan index");
drh69306bf2020-07-22 20:12:10 +0000176 }else
177 if( sqlite3GetUInt32(argv[3],&pIndex->tnum)==0
drh69ab18d2019-01-10 14:33:15 +0000178 || pIndex->tnum<2
drh48bf2d72020-07-30 17:14:55 +0000179 || pIndex->tnum>pData->mxPage
drh8d406732019-01-30 18:33:33 +0000180 || sqlite3IndexHasDuplicateRootPage(pIndex)
drh69ab18d2019-01-10 14:33:15 +0000181 ){
drhca439a42020-07-22 21:05:23 +0000182 if( sqlite3Config.bExtraSchemaChecks ){
dan6a5a13d2021-02-17 20:08:22 +0000183 corruptSchema(pData, argv, "invalid rootpage");
drhca439a42020-07-22 21:05:23 +0000184 }
danielk1977fa256a32005-05-25 04:11:56 +0000185 }
186 }
187 return 0;
188}
189
190/*
191** Attempt to read the database schema and initialize internal
192** data structures for a single database file. The index of the
193** database file is given by iDb. iDb==0 is used for the main
194** database. iDb==1 should never be used. iDb>=2 is used for
195** auxiliary databases. Return one of the SQLITE_ error codes to
196** indicate success or failure.
197*/
drh1595abc2018-08-14 19:27:51 +0000198int sqlite3InitOne(sqlite3 *db, int iDb, char **pzErrMsg, u32 mFlags){
danielk1977fa256a32005-05-25 04:11:56 +0000199 int rc;
drh8a939192009-04-20 17:43:03 +0000200 int i;
mistachkinba2bba32012-09-18 23:21:32 +0000201#ifndef SQLITE_OMIT_DEPRECATED
danielk1977fa256a32005-05-25 04:11:56 +0000202 int size;
mistachkinba2bba32012-09-18 23:21:32 +0000203#endif
drhfdd6e852005-12-16 01:06:16 +0000204 Db *pDb;
drhc5a93d42019-08-12 00:08:07 +0000205 char const *azArg[6];
danielk19770d19f7a2009-06-03 11:25:07 +0000206 int meta[5];
danielk1977fa256a32005-05-25 04:11:56 +0000207 InitData initData;
drh067b92b2020-06-19 15:24:12 +0000208 const char *zSchemaTabName;
danielk197794b30732009-07-02 17:21:57 +0000209 int openedTransaction = 0;
dan0ea2d422020-03-05 18:04:09 +0000210 int mask = ((db->mDbFlags & DBFLAG_EncodingFixed) | ~DBFLAG_EncodingFixed);
danielk1977fa256a32005-05-25 04:11:56 +0000211
drhb2c85592018-04-25 12:01:45 +0000212 assert( (db->mDbFlags & DBFLAG_SchemaKnownOk)==0 );
danielk1977fa256a32005-05-25 04:11:56 +0000213 assert( iDb>=0 && iDb<db->nDb );
danielk197714db2662006-01-09 16:12:04 +0000214 assert( db->aDb[iDb].pSchema );
drhb1ab8ea2007-08-29 00:33:07 +0000215 assert( sqlite3_mutex_held(db->mutex) );
danielk19774eab8b72007-12-27 15:12:16 +0000216 assert( iDb==1 || sqlite3BtreeHoldsMutex(db->aDb[iDb].pBt) );
danielk1977da184232006-01-05 11:34:32 +0000217
drh36494b82017-08-25 15:43:34 +0000218 db->init.busy = 1;
219
drh1e32bed2020-06-19 13:33:53 +0000220 /* Construct the in-memory representation schema tables (sqlite_schema or
221 ** sqlite_temp_schema) by invoking the parser directly. The appropriate
drh055f2982016-01-15 15:06:41 +0000222 ** table name will be inserted automatically by the parser so we can just
223 ** use the abbreviation "x" here. The parser will also automatically tag
224 ** the schema table as read-only. */
drhc5a93d42019-08-12 00:08:07 +0000225 azArg[0] = "table";
drh067b92b2020-06-19 15:24:12 +0000226 azArg[1] = zSchemaTabName = SCHEMA_TABLE(iDb);
drhc5a93d42019-08-12 00:08:07 +0000227 azArg[2] = azArg[1];
228 azArg[3] = "1";
229 azArg[4] = "CREATE TABLE x(type text,name text,tbl_name text,"
drh36494b82017-08-25 15:43:34 +0000230 "rootpage int,sql text)";
drhc5a93d42019-08-12 00:08:07 +0000231 azArg[5] = 0;
danielk1977fa256a32005-05-25 04:11:56 +0000232 initData.db = db;
drhece3c722006-09-23 20:36:01 +0000233 initData.iDb = iDb;
drhc456e572008-08-11 18:44:58 +0000234 initData.rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000235 initData.pzErrMsg = pzErrMsg;
drh1595abc2018-08-14 19:27:51 +0000236 initData.mInitFlags = mFlags;
drh6b86e512019-01-05 21:09:37 +0000237 initData.nInitRow = 0;
drh3b3ddba2020-07-22 18:03:56 +0000238 initData.mxPage = 0;
drhc5a93d42019-08-12 00:08:07 +0000239 sqlite3InitCallback(&initData, 5, (char **)azArg, 0);
dan0ea2d422020-03-05 18:04:09 +0000240 db->mDbFlags &= mask;
drhc456e572008-08-11 18:44:58 +0000241 if( initData.rc ){
danielk1977a1644fd2007-08-29 12:31:25 +0000242 rc = initData.rc;
243 goto error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000244 }
danielk1977fa256a32005-05-25 04:11:56 +0000245
246 /* Create a cursor to hold the database open
247 */
drhfdd6e852005-12-16 01:06:16 +0000248 pDb = &db->aDb[iDb];
249 if( pDb->pBt==0 ){
drh36494b82017-08-25 15:43:34 +0000250 assert( iDb==1 );
251 DbSetProperty(db, 1, DB_SchemaLoaded);
252 rc = SQLITE_OK;
253 goto error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000254 }
danielk1977602b4662009-07-02 07:47:33 +0000255
256 /* If there is not already a read-only (or read-write) transaction opened
257 ** on the b-tree database, open one now. If a transaction is opened, it
258 ** will be closed before this function returns. */
drhb1ab8ea2007-08-29 00:33:07 +0000259 sqlite3BtreeEnter(pDb->pBt);
drh99744fa2020-08-25 19:09:07 +0000260 if( sqlite3BtreeTxnState(pDb->pBt)==SQLITE_TXN_NONE ){
drhbb2d9b12018-06-06 16:28:40 +0000261 rc = sqlite3BtreeBeginTrans(pDb->pBt, 0, 0);
danielk1977602b4662009-07-02 07:47:33 +0000262 if( rc!=SQLITE_OK ){
drh22c17b82015-05-15 04:13:15 +0000263 sqlite3SetString(pzErrMsg, db, sqlite3ErrStr(rc));
danielk1977602b4662009-07-02 07:47:33 +0000264 goto initone_error_out;
265 }
266 openedTransaction = 1;
danielk1977602b4662009-07-02 07:47:33 +0000267 }
danielk1977fa256a32005-05-25 04:11:56 +0000268
269 /* Get the database meta information.
270 **
271 ** Meta values are as follows:
272 ** meta[0] Schema cookie. Changes with each schema change.
273 ** meta[1] File format of schema layer.
274 ** meta[2] Size of the page cache.
drh27731d72009-06-22 12:05:10 +0000275 ** meta[3] Largest rootpage (auto/incr_vacuum mode)
drh8159a352006-05-23 23:22:29 +0000276 ** meta[4] Db text encoding. 1:UTF-8 2:UTF-16LE 3:UTF-16BE
drh27731d72009-06-22 12:05:10 +0000277 ** meta[5] User version
278 ** meta[6] Incremental vacuum mode
279 ** meta[7] unused
280 ** meta[8] unused
281 ** meta[9] unused
danielk1977fa256a32005-05-25 04:11:56 +0000282 **
drhf248e212006-01-25 22:50:38 +0000283 ** Note: The #defined SQLITE_UTF* symbols in sqliteInt.h correspond to
danielk1977fa256a32005-05-25 04:11:56 +0000284 ** the possible values of meta[4].
285 */
danielk1977602b4662009-07-02 07:47:33 +0000286 for(i=0; i<ArraySize(meta); i++){
287 sqlite3BtreeGetMeta(pDb->pBt, i+1, (u32 *)&meta[i]);
danielk19770d19f7a2009-06-03 11:25:07 +0000288 }
drh0314cf32018-04-28 01:27:09 +0000289 if( (db->flags & SQLITE_ResetDatabase)!=0 ){
290 memset(meta, 0, sizeof(meta));
291 }
danielk19770d19f7a2009-06-03 11:25:07 +0000292 pDb->pSchema->schema_cookie = meta[BTREE_SCHEMA_VERSION-1];
danielk1977fa256a32005-05-25 04:11:56 +0000293
294 /* If opening a non-empty database, check the text encoding. For the
295 ** main database, set sqlite3.enc to the encoding of the main database.
296 ** For an attached db, it is an error if the encoding is not the same
297 ** as sqlite3.enc.
298 */
danielk19770d19f7a2009-06-03 11:25:07 +0000299 if( meta[BTREE_TEXT_ENCODING-1] ){ /* text encoding */
dan0ea2d422020-03-05 18:04:09 +0000300 if( iDb==0 && (db->mDbFlags & DBFLAG_EncodingFixed)==0 ){
drhc5e47ac2009-06-04 00:11:56 +0000301 u8 encoding;
drh42a630b2020-03-05 16:13:24 +0000302#ifndef SQLITE_OMIT_UTF16
danielk197714db2662006-01-09 16:12:04 +0000303 /* If opening the main database, set ENC(db). */
drhc5e47ac2009-06-04 00:11:56 +0000304 encoding = (u8)meta[BTREE_TEXT_ENCODING-1] & 3;
305 if( encoding==0 ) encoding = SQLITE_UTF8;
dandbd4d5f2013-03-08 07:10:37 +0000306#else
drh42a630b2020-03-05 16:13:24 +0000307 encoding = SQLITE_UTF8;
dandbd4d5f2013-03-08 07:10:37 +0000308#endif
drh42a630b2020-03-05 16:13:24 +0000309 sqlite3SetTextEncoding(db, encoding);
danielk1977fa256a32005-05-25 04:11:56 +0000310 }else{
danielk197714db2662006-01-09 16:12:04 +0000311 /* If opening an attached database, the encoding much match ENC(db) */
dan0ea2d422020-03-05 18:04:09 +0000312 if( (meta[BTREE_TEXT_ENCODING-1] & 3)!=ENC(db) ){
drhf089aa42008-07-08 19:34:06 +0000313 sqlite3SetString(pzErrMsg, db, "attached databases must use the same"
314 " text encoding as main database");
danielk1977cd3e8f72008-03-25 09:47:35 +0000315 rc = SQLITE_ERROR;
drh701bb3b2008-08-02 03:50:39 +0000316 goto initone_error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000317 }
318 }
319 }
danielk197714db2662006-01-09 16:12:04 +0000320 pDb->pSchema->enc = ENC(db);
danielk1977fa256a32005-05-25 04:11:56 +0000321
danielk19778cf6c552008-06-23 16:53:46 +0000322 if( pDb->pSchema->cache_size==0 ){
drhe73c9142011-11-09 16:12:24 +0000323#ifndef SQLITE_OMIT_DEPRECATED
drhd50ffc42011-03-08 02:38:28 +0000324 size = sqlite3AbsInt32(meta[BTREE_DEFAULT_CACHE_SIZE-1]);
danielk19778cf6c552008-06-23 16:53:46 +0000325 if( size==0 ){ size = SQLITE_DEFAULT_CACHE_SIZE; }
danielk19778cf6c552008-06-23 16:53:46 +0000326 pDb->pSchema->cache_size = size;
drhe73c9142011-11-09 16:12:24 +0000327#else
328 pDb->pSchema->cache_size = SQLITE_DEFAULT_CACHE_SIZE;
329#endif
danielk19778cf6c552008-06-23 16:53:46 +0000330 sqlite3BtreeSetCacheSize(pDb->pBt, pDb->pSchema->cache_size);
331 }
danielk1977fa256a32005-05-25 04:11:56 +0000332
333 /*
334 ** file_format==1 Version 3.0.0.
drhfdd6e852005-12-16 01:06:16 +0000335 ** file_format==2 Version 3.1.3. // ALTER TABLE ADD COLUMN
336 ** file_format==3 Version 3.1.4. // ditto but with non-NULL defaults
drhd946db02005-12-29 19:23:06 +0000337 ** file_format==4 Version 3.3.0. // DESC indices. Boolean constants
danielk1977fa256a32005-05-25 04:11:56 +0000338 */
danielk19770d19f7a2009-06-03 11:25:07 +0000339 pDb->pSchema->file_format = (u8)meta[BTREE_FILE_FORMAT-1];
danielk1977da184232006-01-05 11:34:32 +0000340 if( pDb->pSchema->file_format==0 ){
341 pDb->pSchema->file_format = 1;
drhfdd6e852005-12-16 01:06:16 +0000342 }
danielk1977da184232006-01-05 11:34:32 +0000343 if( pDb->pSchema->file_format>SQLITE_MAX_FILE_FORMAT ){
drhf089aa42008-07-08 19:34:06 +0000344 sqlite3SetString(pzErrMsg, db, "unsupported file format");
danielk1977cd3e8f72008-03-25 09:47:35 +0000345 rc = SQLITE_ERROR;
drh701bb3b2008-08-02 03:50:39 +0000346 goto initone_error_out;
danielk1977fa256a32005-05-25 04:11:56 +0000347 }
348
drh4aa2bfe2007-11-28 13:43:16 +0000349 /* Ticket #2804: When we open a database in the newer file format,
350 ** clear the legacy_file_format pragma flag so that a VACUUM will
351 ** not downgrade the database and thus invalidate any descending
352 ** indices that the user might have created.
353 */
danielk19770d19f7a2009-06-03 11:25:07 +0000354 if( iDb==0 && meta[BTREE_FILE_FORMAT-1]>=4 ){
drhd5b44d62018-12-06 17:06:02 +0000355 db->flags &= ~(u64)SQLITE_LegacyFileFmt;
drh4aa2bfe2007-11-28 13:43:16 +0000356 }
danielk1977fa256a32005-05-25 04:11:56 +0000357
358 /* Read the schema information out of the schema tables
359 */
360 assert( db->init.busy );
drh3b3ddba2020-07-22 18:03:56 +0000361 initData.mxPage = sqlite3BtreeLastPage(pDb->pBt);
drh9da742f2009-06-16 17:49:36 +0000362 {
danielk1977fa256a32005-05-25 04:11:56 +0000363 char *zSql;
danielk19771e536952007-08-16 10:09:01 +0000364 zSql = sqlite3MPrintf(db,
drhc5a93d42019-08-12 00:08:07 +0000365 "SELECT*FROM\"%w\".%s ORDER BY rowid",
drh067b92b2020-06-19 15:24:12 +0000366 db->aDb[iDb].zDbSName, zSchemaTabName);
drha6d0ffc2007-10-12 20:42:28 +0000367#ifndef SQLITE_OMIT_AUTHORIZATION
368 {
drh32c6a482014-09-11 13:44:52 +0000369 sqlite3_xauth xAuth;
drha6d0ffc2007-10-12 20:42:28 +0000370 xAuth = db->xAuth;
371 db->xAuth = 0;
372#endif
373 rc = sqlite3_exec(db, zSql, sqlite3InitCallback, &initData, 0);
374#ifndef SQLITE_OMIT_AUTHORIZATION
375 db->xAuth = xAuth;
376 }
377#endif
drhc456e572008-08-11 18:44:58 +0000378 if( rc==SQLITE_OK ) rc = initData.rc;
drh633e6d52008-07-28 19:34:53 +0000379 sqlite3DbFree(db, zSql);
drh497e4462005-07-23 03:18:40 +0000380#ifndef SQLITE_OMIT_ANALYZE
381 if( rc==SQLITE_OK ){
382 sqlite3AnalysisLoad(db, iDb);
383 }
384#endif
danielk1977fa256a32005-05-25 04:11:56 +0000385 }
drh7a7cefa2021-06-13 17:55:58 +0000386 assert( pDb == &(db->aDb[iDb]) );
drh17435752007-08-16 04:30:38 +0000387 if( db->mallocFailed ){
mistachkinfad30392016-02-13 23:43:46 +0000388 rc = SQLITE_NOMEM_BKPT;
drh81028a42012-05-15 18:28:27 +0000389 sqlite3ResetAllSchemasOfConnection(db);
drh7a7cefa2021-06-13 17:55:58 +0000390 pDb = &db->aDb[iDb];
drh569143c2021-04-13 13:20:55 +0000391 }else
drh5705b412022-03-24 14:01:55 +0000392 if( rc==SQLITE_OK || ((db->flags&SQLITE_NoSchemaError) && rc!=SQLITE_NOMEM)){
drh569143c2021-04-13 13:20:55 +0000393 /* Hack: If the SQLITE_NoSchemaError flag is set, then consider
394 ** the schema loaded, even if errors (other than OOM) occurred. In
395 ** this situation the current sqlite3_prepare() operation will fail,
396 ** but the following one will attempt to compile the supplied statement
397 ** against whatever subset of the schema was loaded before the error
398 ** occurred.
399 **
400 ** The primary purpose of this is to allow access to the sqlite_schema
401 ** table even when its contents have been corrupted.
danielk197734c68fb2007-03-14 15:37:04 +0000402 */
danielk1977fa256a32005-05-25 04:11:56 +0000403 DbSetProperty(db, iDb, DB_SchemaLoaded);
danielk197734c68fb2007-03-14 15:37:04 +0000404 rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000405 }
danielk1977cd3e8f72008-03-25 09:47:35 +0000406
407 /* Jump here for an error that occurs after successfully allocating
408 ** curMain and calling sqlite3BtreeEnter(). For an error that occurs
409 ** before that point, jump to error_out.
410 */
drh701bb3b2008-08-02 03:50:39 +0000411initone_error_out:
danielk1977602b4662009-07-02 07:47:33 +0000412 if( openedTransaction ){
413 sqlite3BtreeCommit(pDb->pBt);
414 }
drhb1ab8ea2007-08-29 00:33:07 +0000415 sqlite3BtreeLeave(pDb->pBt);
danielk1977a1644fd2007-08-29 12:31:25 +0000416
417error_out:
drh36494b82017-08-25 15:43:34 +0000418 if( rc ){
419 if( rc==SQLITE_NOMEM || rc==SQLITE_IOERR_NOMEM ){
420 sqlite3OomFault(db);
421 }
422 sqlite3ResetOneSchema(db, iDb);
danielk1977a1644fd2007-08-29 12:31:25 +0000423 }
drh36494b82017-08-25 15:43:34 +0000424 db->init.busy = 0;
danielk1977fa256a32005-05-25 04:11:56 +0000425 return rc;
426}
427
428/*
429** Initialize all database files - the main database file, the file
430** used to store temporary tables, and any additional database files
431** created using ATTACH statements. Return a success code. If an
432** error occurs, write an error message into *pzErrMsg.
433**
danielk1977e7259292006-01-13 06:33:23 +0000434** After a database is initialized, the DB_SchemaLoaded bit is set
dan0ea2d422020-03-05 18:04:09 +0000435** bit is set in the flags field of the Db structure.
danielk1977fa256a32005-05-25 04:11:56 +0000436*/
437int sqlite3Init(sqlite3 *db, char **pzErrMsg){
438 int i, rc;
drh8257aa82017-07-26 19:59:13 +0000439 int commit_internal = !(db->mDbFlags&DBFLAG_SchemaChange);
danielk1977fa256a32005-05-25 04:11:56 +0000440
drhb1ab8ea2007-08-29 00:33:07 +0000441 assert( sqlite3_mutex_held(db->mutex) );
drh9bd3cc42014-12-12 23:17:54 +0000442 assert( sqlite3BtreeHoldsMutex(db->aDb[0].pBt) );
drh09e60542014-09-10 22:46:46 +0000443 assert( db->init.busy==0 );
drh9bd3cc42014-12-12 23:17:54 +0000444 ENC(db) = SCHEMA_ENC(db);
drh36494b82017-08-25 15:43:34 +0000445 assert( db->nDb>0 );
446 /* Do the main schema first */
447 if( !DbHasProperty(db, 0, DB_SchemaLoaded) ){
drh1595abc2018-08-14 19:27:51 +0000448 rc = sqlite3InitOne(db, 0, pzErrMsg, 0);
drh36494b82017-08-25 15:43:34 +0000449 if( rc ) return rc;
450 }
451 /* All other schemas after the main schema. The "temp" schema must be last */
452 for(i=db->nDb-1; i>0; i--){
drh32158722018-04-25 10:30:46 +0000453 assert( i==1 || sqlite3BtreeHoldsMutex(db->aDb[i].pBt) );
drh36494b82017-08-25 15:43:34 +0000454 if( !DbHasProperty(db, i, DB_SchemaLoaded) ){
drh1595abc2018-08-14 19:27:51 +0000455 rc = sqlite3InitOne(db, i, pzErrMsg, 0);
drh36494b82017-08-25 15:43:34 +0000456 if( rc ) return rc;
danielk1977fa256a32005-05-25 04:11:56 +0000457 }
458 }
drh36494b82017-08-25 15:43:34 +0000459 if( commit_internal ){
danielk1977fa256a32005-05-25 04:11:56 +0000460 sqlite3CommitInternalChanges(db);
461 }
drh36494b82017-08-25 15:43:34 +0000462 return SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000463}
464
465/*
mistachkin48864df2013-03-21 21:20:32 +0000466** This routine is a no-op if the database schema is already initialized.
danielk1977fa256a32005-05-25 04:11:56 +0000467** Otherwise, the schema is loaded. An error code is returned.
468*/
469int sqlite3ReadSchema(Parse *pParse){
470 int rc = SQLITE_OK;
471 sqlite3 *db = pParse->db;
drhb1ab8ea2007-08-29 00:33:07 +0000472 assert( sqlite3_mutex_held(db->mutex) );
danielk1977fa256a32005-05-25 04:11:56 +0000473 if( !db->init.busy ){
danielk1977b82e7ed2006-01-11 14:09:31 +0000474 rc = sqlite3Init(db, &pParse->zErrMsg);
drhb2c85592018-04-25 12:01:45 +0000475 if( rc!=SQLITE_OK ){
476 pParse->rc = rc;
477 pParse->nErr++;
478 }else if( db->noSharedCache ){
479 db->mDbFlags |= DBFLAG_SchemaKnownOk;
480 }
danielk1977fa256a32005-05-25 04:11:56 +0000481 }
482 return rc;
483}
484
485
486/*
487** Check schema cookies in all databases. If any cookie is out
drh1adecdf2009-07-03 19:19:50 +0000488** of date set pParse->rc to SQLITE_SCHEMA. If all schema cookies
489** make no changes to pParse->rc.
danielk1977fa256a32005-05-25 04:11:56 +0000490*/
danielk1977602b4662009-07-02 07:47:33 +0000491static void schemaIsValid(Parse *pParse){
492 sqlite3 *db = pParse->db;
danielk1977fa256a32005-05-25 04:11:56 +0000493 int iDb;
494 int rc;
danielk1977fa256a32005-05-25 04:11:56 +0000495 int cookie;
danielk1977fa256a32005-05-25 04:11:56 +0000496
danielk1977602b4662009-07-02 07:47:33 +0000497 assert( pParse->checkSchema );
498 assert( sqlite3_mutex_held(db->mutex) );
499 for(iDb=0; iDb<db->nDb; iDb++){
500 int openedTransaction = 0; /* True if a transaction is opened */
501 Btree *pBt = db->aDb[iDb].pBt; /* Btree database to read cookie from */
502 if( pBt==0 ) continue;
503
504 /* If there is not already a read-only (or read-write) transaction opened
505 ** on the b-tree database, open one now. If a transaction is opened, it
506 ** will be closed immediately after reading the meta-value. */
drh99744fa2020-08-25 19:09:07 +0000507 if( sqlite3BtreeTxnState(pBt)==SQLITE_TXN_NONE ){
drhbb2d9b12018-06-06 16:28:40 +0000508 rc = sqlite3BtreeBeginTrans(pBt, 0, 0);
drh1adecdf2009-07-03 19:19:50 +0000509 if( rc==SQLITE_NOMEM || rc==SQLITE_IOERR_NOMEM ){
drh4a642b62016-02-05 01:55:27 +0000510 sqlite3OomFault(db);
drh23890482021-04-05 11:39:55 +0000511 pParse->rc = SQLITE_NOMEM;
danielk1977602b4662009-07-02 07:47:33 +0000512 }
513 if( rc!=SQLITE_OK ) return;
514 openedTransaction = 1;
515 }
516
517 /* Read the schema cookie from the database. If it does not match the
shanehd77f56e2009-12-17 21:05:42 +0000518 ** value stored as part of the in-memory schema representation,
danielk1977602b4662009-07-02 07:47:33 +0000519 ** set Parse.rc to SQLITE_SCHEMA. */
520 sqlite3BtreeGetMeta(pBt, BTREE_SCHEMA_VERSION, (u32 *)&cookie);
drh21206082011-04-04 18:22:02 +0000521 assert( sqlite3SchemaMutexHeld(db, iDb, 0) );
danielk1977602b4662009-07-02 07:47:33 +0000522 if( cookie!=db->aDb[iDb].pSchema->schema_cookie ){
dan873a8402022-11-10 19:19:52 +0000523 if( DbHasProperty(db, iDb, DB_SchemaLoaded) ) pParse->rc = SQLITE_SCHEMA;
drh81028a42012-05-15 18:28:27 +0000524 sqlite3ResetOneSchema(db, iDb);
danielk1977602b4662009-07-02 07:47:33 +0000525 }
526
527 /* Close the transaction, if one was opened. */
528 if( openedTransaction ){
529 sqlite3BtreeCommit(pBt);
530 }
531 }
danielk1977fa256a32005-05-25 04:11:56 +0000532}
533
534/*
drhf248e212006-01-25 22:50:38 +0000535** Convert a schema pointer into the iDb index that indicates
536** which database file in db->aDb[] the schema refers to.
537**
538** If the same database is attached more than once, the first
539** attached database is returned.
540*/
danielk1977e501b892006-01-09 06:29:47 +0000541int sqlite3SchemaToIndex(sqlite3 *db, Schema *pSchema){
drhbdd4f7d2020-05-26 10:54:46 +0000542 int i = -32768;
drh198bf392006-01-06 21:52:49 +0000543
drhbdd4f7d2020-05-26 10:54:46 +0000544 /* If pSchema is NULL, then return -32768. This happens when code in
drh198bf392006-01-06 21:52:49 +0000545 ** expr.c is trying to resolve a reference to a transient table (i.e. one
546 ** created by a sub-select). In this case the return value of this
547 ** function should never be used.
548 **
drhbdd4f7d2020-05-26 10:54:46 +0000549 ** We return -32768 instead of the more usual -1 simply because using
550 ** -32768 as the incorrect index into db->aDb[] is much
drh198bf392006-01-06 21:52:49 +0000551 ** more likely to cause a segfault than -1 (of course there are assert()
drhbdd4f7d2020-05-26 10:54:46 +0000552 ** statements too, but it never hurts to play the odds) and
553 ** -32768 will still fit into a 16-bit signed integer.
drh198bf392006-01-06 21:52:49 +0000554 */
drhb1ab8ea2007-08-29 00:33:07 +0000555 assert( sqlite3_mutex_held(db->mutex) );
drh198bf392006-01-06 21:52:49 +0000556 if( pSchema ){
drh9d9c41e2017-10-31 03:40:15 +0000557 for(i=0; 1; i++){
558 assert( i<db->nDb );
drh198bf392006-01-06 21:52:49 +0000559 if( db->aDb[i].pSchema==pSchema ){
560 break;
561 }
562 }
drh1c767f02009-01-09 02:49:31 +0000563 assert( i>=0 && i<db->nDb );
drh198bf392006-01-06 21:52:49 +0000564 }
565 return i;
566}
567
568/*
drhf30a9692013-11-15 01:10:18 +0000569** Free all memory allocations in the pParse object
570*/
drhc692df22022-01-24 15:34:55 +0000571void sqlite3ParseObjectReset(Parse *pParse){
drh6903bf62017-08-01 20:59:41 +0000572 sqlite3 *db = pParse->db;
drh1da88b52022-01-24 19:38:56 +0000573 assert( db!=0 );
574 assert( db->pParse==pParse );
drh16118262021-12-31 17:54:48 +0000575 assert( pParse->nested==0 );
576#ifndef SQLITE_OMIT_SHARED_CACHE
drh41ce47c2022-08-22 02:00:26 +0000577 if( pParse->aTableLock ) sqlite3DbNNFreeNN(db, pParse->aTableLock);
drh16118262021-12-31 17:54:48 +0000578#endif
drhcf3c0782021-01-11 20:37:02 +0000579 while( pParse->pCleanup ){
drh5e5683a2021-01-13 21:05:07 +0000580 ParseCleanup *pCleanup = pParse->pCleanup;
581 pParse->pCleanup = pCleanup->pNext;
582 pCleanup->xCleanup(db, pCleanup->pPtr);
drh41ce47c2022-08-22 02:00:26 +0000583 sqlite3DbNNFreeNN(db, pCleanup);
drhcf3c0782021-01-11 20:37:02 +0000584 }
drh41ce47c2022-08-22 02:00:26 +0000585 if( pParse->aLabel ) sqlite3DbNNFreeNN(db, pParse->aLabel);
drhcf3c0782021-01-11 20:37:02 +0000586 if( pParse->pConstExpr ){
587 sqlite3ExprListDelete(db, pParse->pConstExpr);
588 }
drh1da88b52022-01-24 19:38:56 +0000589 assert( db->lookaside.bDisable >= pParse->disableLookaside );
590 db->lookaside.bDisable -= pParse->disableLookaside;
591 db->lookaside.sz = db->lookaside.bDisable ? 0 : db->lookaside.szTrue;
592 assert( pParse->db->pParse==pParse );
593 db->pParse = pParse->pOuterParse;
594 pParse->db = 0;
drh6903bf62017-08-01 20:59:41 +0000595 pParse->disableLookaside = 0;
drhf30a9692013-11-15 01:10:18 +0000596}
597
598/*
drhcf3c0782021-01-11 20:37:02 +0000599** Add a new cleanup operation to a Parser. The cleanup should happen when
drh21d4f5b2021-01-12 15:30:01 +0000600** the parser object is destroyed. But, beware: the cleanup might happen
601** immediately.
drhcf3c0782021-01-11 20:37:02 +0000602**
603** Use this mechanism for uncommon cleanups. There is a higher setup
drh21d4f5b2021-01-12 15:30:01 +0000604** cost for this mechansim (an extra malloc), so it should not be used
605** for common cleanups that happen on most calls. But for less
drhcf3c0782021-01-11 20:37:02 +0000606** common cleanups, we save a single NULL-pointer comparison in
drhc692df22022-01-24 15:34:55 +0000607** sqlite3ParseObjectReset(), which reduces the total CPU cycle count.
drhcf3c0782021-01-11 20:37:02 +0000608**
609** If a memory allocation error occurs, then the cleanup happens immediately.
drh6d0053c2021-03-09 19:32:37 +0000610** When either SQLITE_DEBUG or SQLITE_COVERAGE_TEST are defined, the
drh21d4f5b2021-01-12 15:30:01 +0000611** pParse->earlyCleanup flag is set in that case. Calling code show verify
612** that test cases exist for which this happens, to guard against possible
613** use-after-free errors following an OOM. The preferred way to do this is
614** to immediately follow the call to this routine with:
615**
616** testcase( pParse->earlyCleanup );
drh6d0053c2021-03-09 19:32:37 +0000617**
618** This routine returns a copy of its pPtr input (the third parameter)
619** except if an early cleanup occurs, in which case it returns NULL. So
620** another way to check for early cleanup is to check the return value.
621** Or, stop using the pPtr parameter with this call and use only its
622** return value thereafter. Something like this:
623**
624** pObj = sqlite3ParserAddCleanup(pParse, destructor, pObj);
drhcf3c0782021-01-11 20:37:02 +0000625*/
drha79e2a22021-02-21 23:44:14 +0000626void *sqlite3ParserAddCleanup(
drh21d4f5b2021-01-12 15:30:01 +0000627 Parse *pParse, /* Destroy when this Parser finishes */
628 void (*xCleanup)(sqlite3*,void*), /* The cleanup routine */
629 void *pPtr /* Pointer to object to be cleaned up */
drhcf3c0782021-01-11 20:37:02 +0000630){
631 ParseCleanup *pCleanup = sqlite3DbMallocRaw(pParse->db, sizeof(*pCleanup));
632 if( pCleanup ){
633 pCleanup->pNext = pParse->pCleanup;
634 pParse->pCleanup = pCleanup;
635 pCleanup->pPtr = pPtr;
636 pCleanup->xCleanup = xCleanup;
637 }else{
638 xCleanup(pParse->db, pPtr);
drha79e2a22021-02-21 23:44:14 +0000639 pPtr = 0;
drh21d4f5b2021-01-12 15:30:01 +0000640#if defined(SQLITE_DEBUG) || defined(SQLITE_COVERAGE_TEST)
641 pParse->earlyCleanup = 1;
642#endif
drhcf3c0782021-01-11 20:37:02 +0000643 }
drha79e2a22021-02-21 23:44:14 +0000644 return pPtr;
drhcf3c0782021-01-11 20:37:02 +0000645}
646
647/*
drhc692df22022-01-24 15:34:55 +0000648** Turn bulk memory into a valid Parse object and link that Parse object
649** into database connection db.
650**
651** Call sqlite3ParseObjectReset() to undo this operation.
652**
653** Caution: Do not confuse this routine with sqlite3ParseObjectInit() which
654** is generated by Lemon.
655*/
656void sqlite3ParseObjectInit(Parse *pParse, sqlite3 *db){
657 memset(PARSE_HDR(pParse), 0, PARSE_HDR_SZ);
658 memset(PARSE_TAIL(pParse), 0, PARSE_TAIL_SZ);
659 assert( db->pParse!=pParse );
660 pParse->pOuterParse = db->pParse;
661 db->pParse = pParse;
662 pParse->db = db;
drh75863ec2022-01-28 21:39:29 +0000663 if( db->mallocFailed ) sqlite3ErrorMsg(pParse, "out of memory");
drhc692df22022-01-24 15:34:55 +0000664}
665
666/*
drh87b7ac02022-05-06 00:43:06 +0000667** Maximum number of times that we will try again to prepare a statement
668** that returns SQLITE_ERROR_RETRY.
669*/
670#ifndef SQLITE_MAX_PREPARE_RETRY
671# define SQLITE_MAX_PREPARE_RETRY 25
672#endif
673
674/*
danielk1977fa256a32005-05-25 04:11:56 +0000675** Compile the UTF-8 encoded SQL statement zSql into a statement handle.
676*/
mlcreech3a00f902008-03-04 17:45:01 +0000677static int sqlite3Prepare(
danielk1977fa256a32005-05-25 04:11:56 +0000678 sqlite3 *db, /* Database handle. */
679 const char *zSql, /* UTF-8 encoded SQL statement. */
680 int nBytes, /* Length of zSql in bytes. */
drh2c2f3922017-06-01 00:54:35 +0000681 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
dan937d0de2009-10-15 18:35:38 +0000682 Vdbe *pReprepare, /* VM being reprepared */
danielk1977fa256a32005-05-25 04:11:56 +0000683 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
drhb900aaf2006-11-09 00:24:53 +0000684 const char **pzTail /* OUT: End of parsed string */
danielk1977fa256a32005-05-25 04:11:56 +0000685){
drhe7b347072009-06-01 18:18:20 +0000686 int rc = SQLITE_OK; /* Result code */
687 int i; /* Loop counter */
drhcb43a932016-10-03 01:21:51 +0000688 Parse sParse; /* Parsing context */
danielk1977fa256a32005-05-25 04:11:56 +0000689
drhc692df22022-01-24 15:34:55 +0000690 /* sqlite3ParseObjectInit(&sParse, db); // inlined for performance */
691 memset(PARSE_HDR(&sParse), 0, PARSE_HDR_SZ);
drhcb43a932016-10-03 01:21:51 +0000692 memset(PARSE_TAIL(&sParse), 0, PARSE_TAIL_SZ);
drhc692df22022-01-24 15:34:55 +0000693 sParse.pOuterParse = db->pParse;
694 db->pParse = &sParse;
695 sParse.db = db;
drhcb43a932016-10-03 01:21:51 +0000696 sParse.pReprepare = pReprepare;
drh860e0772009-04-02 18:32:26 +0000697 assert( ppStmt && *ppStmt==0 );
drh75863ec2022-01-28 21:39:29 +0000698 if( db->mallocFailed ) sqlite3ErrorMsg(&sParse, "out of memory");
drhb21c8cd2007-08-21 19:33:56 +0000699 assert( sqlite3_mutex_held(db->mutex) );
danielk1977fa256a32005-05-25 04:11:56 +0000700
drh2c2f3922017-06-01 00:54:35 +0000701 /* For a long-term use prepared statement avoid the use of
702 ** lookaside memory.
703 */
704 if( prepFlags & SQLITE_PREPARE_PERSISTENT ){
705 sParse.disableLookaside++;
drh31f69622019-10-05 14:39:36 +0000706 DisableLookaside;
drh2c2f3922017-06-01 00:54:35 +0000707 }
drh7424aef2022-10-01 13:17:53 +0000708 sParse.prepFlags = prepFlags & 0xff;
drh2c2f3922017-06-01 00:54:35 +0000709
drhc74d0b1d2009-02-24 16:18:05 +0000710 /* Check to verify that it is possible to get a read lock on all
711 ** database schemas. The inability to get a read lock indicates that
712 ** some other database connection is holding a write-lock, which in
713 ** turn means that the other connection has made uncommitted changes
714 ** to the schema.
715 **
716 ** Were we to proceed and prepare the statement against the uncommitted
717 ** schema changes and if those schema changes are subsequently rolled
718 ** back and different changes are made in their place, then when this
719 ** prepared statement goes to run the schema cookie would fail to detect
720 ** the schema change. Disaster would follow.
721 **
722 ** This thread is currently holding mutexes on all Btrees (because
723 ** of the sqlite3BtreeEnterAll() in sqlite3LockAndPrepare()) so it
724 ** is not possible for another thread to start a new schema change
725 ** while this routine is running. Hence, we do not need to hold
726 ** locks on the schema, we just need to make sure nobody else is
727 ** holding them.
728 **
729 ** Note that setting READ_UNCOMMITTED overrides most lock detection,
730 ** but it does *not* override schema lock detection, so this all still
731 ** works even if READ_UNCOMMITTED is set.
danielk1977c87d34d2006-01-06 13:00:28 +0000732 */
drh705e7332019-10-05 19:53:21 +0000733 if( !db->noSharedCache ){
734 for(i=0; i<db->nDb; i++) {
735 Btree *pBt = db->aDb[i].pBt;
736 if( pBt ){
737 assert( sqlite3BtreeHoldsMutex(pBt) );
738 rc = sqlite3BtreeSchemaLocked(pBt);
739 if( rc ){
740 const char *zDb = db->aDb[i].zDbSName;
741 sqlite3ErrorWithMsg(db, rc, "database schema is locked: %s", zDb);
742 testcase( db->flags & SQLITE_ReadUncommit );
743 goto end_prepare;
744 }
drhb1ab8ea2007-08-29 00:33:07 +0000745 }
danielk1977c87d34d2006-01-06 13:00:28 +0000746 }
747 }
drhe7b347072009-06-01 18:18:20 +0000748
drh7d34b8d2022-10-01 20:27:29 +0000749#ifndef SQLITE_OMIT_VIRTUALTABLE
750 if( db->pDisconnect ) sqlite3VtabUnlockList(db);
751#endif
drhe7b347072009-06-01 18:18:20 +0000752
drhd2d88bb2008-05-23 14:32:18 +0000753 if( nBytes>=0 && (nBytes==0 || zSql[nBytes-1]!=0) ){
drhe5c941b2007-05-08 13:58:26 +0000754 char *zSqlCopy;
drhbb4957f2008-03-20 14:03:29 +0000755 int mxLen = db->aLimit[SQLITE_LIMIT_SQL_LENGTH];
drh58fbb312009-06-17 00:35:30 +0000756 testcase( nBytes==mxLen );
757 testcase( nBytes==mxLen+1 );
drhbb4957f2008-03-20 14:03:29 +0000758 if( nBytes>mxLen ){
drh13f40da2014-08-22 18:00:11 +0000759 sqlite3ErrorWithMsg(db, SQLITE_TOOBIG, "statement too long");
drhe7b347072009-06-01 18:18:20 +0000760 rc = sqlite3ApiExit(db, SQLITE_TOOBIG);
761 goto end_prepare;
drhe5c941b2007-05-08 13:58:26 +0000762 }
drh17435752007-08-16 04:30:38 +0000763 zSqlCopy = sqlite3DbStrNDup(db, zSql, nBytes);
drh276fdbf2007-04-30 21:39:16 +0000764 if( zSqlCopy ){
drh54bc6382021-12-31 19:20:42 +0000765 sqlite3RunParser(&sParse, zSqlCopy);
drhcb43a932016-10-03 01:21:51 +0000766 sParse.zTail = &zSql[sParse.zTail-zSqlCopy];
dan98a4d5a2016-01-29 08:38:35 +0000767 sqlite3DbFree(db, zSqlCopy);
danielk19773a2c8c82008-04-03 14:36:25 +0000768 }else{
drhcb43a932016-10-03 01:21:51 +0000769 sParse.zTail = &zSql[nBytes];
drh276fdbf2007-04-30 21:39:16 +0000770 }
drh9051a422006-01-30 22:35:43 +0000771 }else{
drh54bc6382021-12-31 19:20:42 +0000772 sqlite3RunParser(&sParse, zSql);
drh9051a422006-01-30 22:35:43 +0000773 }
drhcb43a932016-10-03 01:21:51 +0000774 assert( 0==sParse.nQueryLoop );
danielk1977fa256a32005-05-25 04:11:56 +0000775
drhb900aaf2006-11-09 00:24:53 +0000776 if( pzTail ){
drhcb43a932016-10-03 01:21:51 +0000777 *pzTail = sParse.zTail;
drhb900aaf2006-11-09 00:24:53 +0000778 }
danielk1977fa256a32005-05-25 04:11:56 +0000779
danielk19776ab3a2e2009-02-19 14:39:25 +0000780 if( db->init.busy==0 ){
drh2c2f3922017-06-01 00:54:35 +0000781 sqlite3VdbeSetSql(sParse.pVdbe, zSql, (int)(sParse.zTail-zSql), prepFlags);
danielk19777e29e952007-04-19 11:09:01 +0000782 }
drhf3ce2482019-10-09 01:19:07 +0000783 if( db->mallocFailed ){
784 sParse.rc = SQLITE_NOMEM_BKPT;
drhad3930b2021-04-03 20:35:08 +0000785 sParse.checkSchema = 0;
drhf3ce2482019-10-09 01:19:07 +0000786 }
drh88efc792021-01-01 18:23:56 +0000787 if( sParse.rc!=SQLITE_OK && sParse.rc!=SQLITE_DONE ){
drh24a82ea2022-01-01 22:55:31 +0000788 if( sParse.checkSchema && db->init.busy==0 ){
drh88efc792021-01-01 18:23:56 +0000789 schemaIsValid(&sParse);
790 }
791 if( sParse.pVdbe ){
792 sqlite3VdbeFinalize(sParse.pVdbe);
793 }
794 assert( 0==(*ppStmt) );
795 rc = sParse.rc;
drh54bc6382021-12-31 19:20:42 +0000796 if( sParse.zErrMsg ){
797 sqlite3ErrorWithMsg(db, rc, "%s", sParse.zErrMsg);
798 sqlite3DbFree(db, sParse.zErrMsg);
drh88efc792021-01-01 18:23:56 +0000799 }else{
800 sqlite3Error(db, rc);
801 }
danielk19777e29e952007-04-19 11:09:01 +0000802 }else{
drh54bc6382021-12-31 19:20:42 +0000803 assert( sParse.zErrMsg==0 );
drhcb43a932016-10-03 01:21:51 +0000804 *ppStmt = (sqlite3_stmt*)sParse.pVdbe;
drh88efc792021-01-01 18:23:56 +0000805 rc = SQLITE_OK;
806 sqlite3ErrorClear(db);
danielk1977fa256a32005-05-25 04:11:56 +0000807 }
808
danielk1977261919c2005-12-06 12:52:59 +0000809
dan65a7cd12009-09-01 12:16:01 +0000810 /* Delete any TriggerPrg structures allocated while parsing this statement. */
drhcb43a932016-10-03 01:21:51 +0000811 while( sParse.pTriggerPrg ){
812 TriggerPrg *pT = sParse.pTriggerPrg;
813 sParse.pTriggerPrg = pT->pNext;
dan165921a2009-08-28 18:53:45 +0000814 sqlite3DbFree(db, pT);
815 }
816
drhe7b347072009-06-01 18:18:20 +0000817end_prepare:
818
drhc692df22022-01-24 15:34:55 +0000819 sqlite3ParseObjectReset(&sParse);
danielk1977fa256a32005-05-25 04:11:56 +0000820 return rc;
821}
drhb21c8cd2007-08-21 19:33:56 +0000822static int sqlite3LockAndPrepare(
823 sqlite3 *db, /* Database handle. */
824 const char *zSql, /* UTF-8 encoded SQL statement. */
825 int nBytes, /* Length of zSql in bytes. */
drh2c2f3922017-06-01 00:54:35 +0000826 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
dan937d0de2009-10-15 18:35:38 +0000827 Vdbe *pOld, /* VM being reprepared */
drhb21c8cd2007-08-21 19:33:56 +0000828 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
829 const char **pzTail /* OUT: End of parsed string */
830){
831 int rc;
drh7e8515d2017-12-08 19:37:04 +0000832 int cnt = 0;
drh9ca95732014-10-24 00:35:58 +0000833
834#ifdef SQLITE_ENABLE_API_ARMOR
835 if( ppStmt==0 ) return SQLITE_MISUSE_BKPT;
836#endif
drh860e0772009-04-02 18:32:26 +0000837 *ppStmt = 0;
drh9ca95732014-10-24 00:35:58 +0000838 if( !sqlite3SafetyCheckOk(db)||zSql==0 ){
drh413c3d32010-02-23 20:11:56 +0000839 return SQLITE_MISUSE_BKPT;
drh27641702007-08-22 02:56:42 +0000840 }
drhb21c8cd2007-08-21 19:33:56 +0000841 sqlite3_mutex_enter(db->mutex);
drhb1ab8ea2007-08-29 00:33:07 +0000842 sqlite3BtreeEnterAll(db);
drh7e8515d2017-12-08 19:37:04 +0000843 do{
844 /* Make multiple attempts to compile the SQL, until it either succeeds
845 ** or encounters a permanent error. A schema problem after one schema
846 ** reset is considered a permanent error. */
drh2c2f3922017-06-01 00:54:35 +0000847 rc = sqlite3Prepare(db, zSql, nBytes, prepFlags, pOld, ppStmt, pzTail);
drh7e8515d2017-12-08 19:37:04 +0000848 assert( rc==SQLITE_OK || *ppStmt==0 );
drh15561b92021-12-09 14:09:47 +0000849 if( rc==SQLITE_OK || db->mallocFailed ) break;
drh87b7ac02022-05-06 00:43:06 +0000850 }while( (rc==SQLITE_ERROR_RETRY && (cnt++)<SQLITE_MAX_PREPARE_RETRY)
drh7e8515d2017-12-08 19:37:04 +0000851 || (rc==SQLITE_SCHEMA && (sqlite3ResetOneSchema(db,-1), cnt++)==0) );
drhb1ab8ea2007-08-29 00:33:07 +0000852 sqlite3BtreeLeaveAll(db);
drh7e8515d2017-12-08 19:37:04 +0000853 rc = sqlite3ApiExit(db, rc);
854 assert( (rc&db->errMask)==rc );
dan2b06b072020-09-04 17:30:59 +0000855 db->busyHandler.nBusy = 0;
drhb21c8cd2007-08-21 19:33:56 +0000856 sqlite3_mutex_leave(db->mutex);
857 return rc;
858}
danielk1977fa256a32005-05-25 04:11:56 +0000859
mistachkin8bee11a2018-10-29 17:53:23 +0000860
drhb900aaf2006-11-09 00:24:53 +0000861/*
862** Rerun the compilation of a statement after a schema change.
danielk197765a2ea12009-03-19 07:58:31 +0000863**
864** If the statement is successfully recompiled, return SQLITE_OK. Otherwise,
865** if the statement cannot be recompiled because another connection has
drh1e32bed2020-06-19 13:33:53 +0000866** locked the sqlite3_schema table, return SQLITE_LOCKED. If any other error
danielk197765a2ea12009-03-19 07:58:31 +0000867** occurs, return SQLITE_SCHEMA.
drhb900aaf2006-11-09 00:24:53 +0000868*/
869int sqlite3Reprepare(Vdbe *p){
870 int rc;
drh4f0c5872007-03-26 22:05:01 +0000871 sqlite3_stmt *pNew;
drhb900aaf2006-11-09 00:24:53 +0000872 const char *zSql;
873 sqlite3 *db;
drh2c2f3922017-06-01 00:54:35 +0000874 u8 prepFlags;
drhb21c8cd2007-08-21 19:33:56 +0000875
drhb1ab8ea2007-08-29 00:33:07 +0000876 assert( sqlite3_mutex_held(sqlite3VdbeDb(p)->mutex) );
danielk1977d0e2a852007-11-14 06:48:48 +0000877 zSql = sqlite3_sql((sqlite3_stmt *)p);
drhc4dd3fd2008-01-22 01:48:05 +0000878 assert( zSql!=0 ); /* Reprepare only called for prepare_v2() statements */
drhb900aaf2006-11-09 00:24:53 +0000879 db = sqlite3VdbeDb(p);
drhb21c8cd2007-08-21 19:33:56 +0000880 assert( sqlite3_mutex_held(db->mutex) );
drh2c2f3922017-06-01 00:54:35 +0000881 prepFlags = sqlite3VdbePrepareFlags(p);
882 rc = sqlite3LockAndPrepare(db, zSql, -1, prepFlags, p, &pNew, 0);
drhb900aaf2006-11-09 00:24:53 +0000883 if( rc ){
danielk19778e556522007-11-13 10:30:24 +0000884 if( rc==SQLITE_NOMEM ){
drh4a642b62016-02-05 01:55:27 +0000885 sqlite3OomFault(db);
danielk19778e556522007-11-13 10:30:24 +0000886 }
drhb900aaf2006-11-09 00:24:53 +0000887 assert( pNew==0 );
drha6129fa2010-02-24 17:15:19 +0000888 return rc;
drhb900aaf2006-11-09 00:24:53 +0000889 }else{
890 assert( pNew!=0 );
891 }
drh4f0c5872007-03-26 22:05:01 +0000892 sqlite3VdbeSwap((Vdbe*)pNew, p);
shane145834a2008-09-04 12:03:42 +0000893 sqlite3TransferBindings(pNew, (sqlite3_stmt*)p);
drh4f0c5872007-03-26 22:05:01 +0000894 sqlite3VdbeResetStepResult((Vdbe*)pNew);
895 sqlite3VdbeFinalize((Vdbe*)pNew);
danielk197765a2ea12009-03-19 07:58:31 +0000896 return SQLITE_OK;
drhb900aaf2006-11-09 00:24:53 +0000897}
898
899
900/*
901** Two versions of the official API. Legacy and new use. In the legacy
902** version, the original SQL text is not saved in the prepared statement
903** and so if a schema change occurs, SQLITE_SCHEMA is returned by
904** sqlite3_step(). In the new version, the original SQL text is retained
905** and the statement is automatically recompiled if an schema change
906** occurs.
907*/
908int sqlite3_prepare(
909 sqlite3 *db, /* Database handle. */
910 const char *zSql, /* UTF-8 encoded SQL statement. */
911 int nBytes, /* Length of zSql in bytes. */
912 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
913 const char **pzTail /* OUT: End of parsed string */
914){
drh17eaae72008-03-03 18:47:28 +0000915 int rc;
dan937d0de2009-10-15 18:35:38 +0000916 rc = sqlite3LockAndPrepare(db,zSql,nBytes,0,0,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +0000917 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +0000918 return rc;
drhb900aaf2006-11-09 00:24:53 +0000919}
920int sqlite3_prepare_v2(
921 sqlite3 *db, /* Database handle. */
922 const char *zSql, /* UTF-8 encoded SQL statement. */
923 int nBytes, /* Length of zSql in bytes. */
924 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
925 const char **pzTail /* OUT: End of parsed string */
926){
drh17eaae72008-03-03 18:47:28 +0000927 int rc;
drh3cef3642017-07-14 19:22:08 +0000928 /* EVIDENCE-OF: R-37923-12173 The sqlite3_prepare_v2() interface works
929 ** exactly the same as sqlite3_prepare_v3() with a zero prepFlags
930 ** parameter.
931 **
932 ** Proof in that the 5th parameter to sqlite3LockAndPrepare is 0 */
drh2c2f3922017-06-01 00:54:35 +0000933 rc = sqlite3LockAndPrepare(db,zSql,nBytes,SQLITE_PREPARE_SAVESQL,0,
934 ppStmt,pzTail);
drh3cef3642017-07-14 19:22:08 +0000935 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 );
drh2c2f3922017-06-01 00:54:35 +0000936 return rc;
937}
938int sqlite3_prepare_v3(
939 sqlite3 *db, /* Database handle. */
940 const char *zSql, /* UTF-8 encoded SQL statement. */
941 int nBytes, /* Length of zSql in bytes. */
942 unsigned int prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
943 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
944 const char **pzTail /* OUT: End of parsed string */
945){
946 int rc;
drh3cef3642017-07-14 19:22:08 +0000947 /* EVIDENCE-OF: R-56861-42673 sqlite3_prepare_v3() differs from
948 ** sqlite3_prepare_v2() only in having the extra prepFlags parameter,
949 ** which is a bit array consisting of zero or more of the
950 ** SQLITE_PREPARE_* flags.
951 **
952 ** Proof by comparison to the implementation of sqlite3_prepare_v2()
953 ** directly above. */
drh2c2f3922017-06-01 00:54:35 +0000954 rc = sqlite3LockAndPrepare(db,zSql,nBytes,
955 SQLITE_PREPARE_SAVESQL|(prepFlags&SQLITE_PREPARE_MASK),
956 0,ppStmt,pzTail);
drh3cef3642017-07-14 19:22:08 +0000957 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 );
drh17eaae72008-03-03 18:47:28 +0000958 return rc;
drhb900aaf2006-11-09 00:24:53 +0000959}
960
961
danielk1977fa256a32005-05-25 04:11:56 +0000962#ifndef SQLITE_OMIT_UTF16
963/*
964** Compile the UTF-16 encoded SQL statement zSql into a statement handle.
965*/
drhb900aaf2006-11-09 00:24:53 +0000966static int sqlite3Prepare16(
danielk1977fa256a32005-05-25 04:11:56 +0000967 sqlite3 *db, /* Database handle. */
dan0ecdeb22011-01-25 13:43:35 +0000968 const void *zSql, /* UTF-16 encoded SQL statement. */
danielk1977fa256a32005-05-25 04:11:56 +0000969 int nBytes, /* Length of zSql in bytes. */
drh2c2f3922017-06-01 00:54:35 +0000970 u32 prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
danielk1977fa256a32005-05-25 04:11:56 +0000971 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
972 const void **pzTail /* OUT: End of parsed string */
973){
974 /* This function currently works by first transforming the UTF-16
975 ** encoded string to UTF-8, then invoking sqlite3_prepare(). The
976 ** tricky bit is figuring out the pointer to return in *pzTail.
977 */
danielk197754f01982006-01-18 15:25:17 +0000978 char *zSql8;
danielk1977c87d34d2006-01-06 13:00:28 +0000979 const char *zTail8 = 0;
danielk197754f01982006-01-18 15:25:17 +0000980 int rc = SQLITE_OK;
danielk1977fa256a32005-05-25 04:11:56 +0000981
drh9ca95732014-10-24 00:35:58 +0000982#ifdef SQLITE_ENABLE_API_ARMOR
983 if( ppStmt==0 ) return SQLITE_MISUSE_BKPT;
984#endif
drh769e97e2009-04-01 16:33:37 +0000985 *ppStmt = 0;
drh9ca95732014-10-24 00:35:58 +0000986 if( !sqlite3SafetyCheckOk(db)||zSql==0 ){
drh413c3d32010-02-23 20:11:56 +0000987 return SQLITE_MISUSE_BKPT;
danielk1977fa256a32005-05-25 04:11:56 +0000988 }
drh7232ad02013-07-16 23:26:43 +0000989 if( nBytes>=0 ){
990 int sz;
991 const char *z = (const char*)zSql;
992 for(sz=0; sz<nBytes && (z[sz]!=0 || z[sz+1]!=0); sz += 2){}
993 nBytes = sz;
994 }
drhb21c8cd2007-08-21 19:33:56 +0000995 sqlite3_mutex_enter(db->mutex);
danb7dca7d2010-03-05 16:32:12 +0000996 zSql8 = sqlite3Utf16to8(db, zSql, nBytes, SQLITE_UTF16NATIVE);
danielk197754f01982006-01-18 15:25:17 +0000997 if( zSql8 ){
drh2c2f3922017-06-01 00:54:35 +0000998 rc = sqlite3LockAndPrepare(db, zSql8, -1, prepFlags, 0, ppStmt, &zTail8);
danielk1977fa256a32005-05-25 04:11:56 +0000999 }
danielk1977fa256a32005-05-25 04:11:56 +00001000
1001 if( zTail8 && pzTail ){
1002 /* If sqlite3_prepare returns a tail pointer, we calculate the
1003 ** equivalent pointer into the UTF-16 string by counting the unicode
1004 ** characters between zSql8 and zTail8, and then returning a pointer
1005 ** the same number of characters into the UTF-16 string.
1006 */
drhea678832008-12-10 19:26:22 +00001007 int chars_parsed = sqlite3Utf8CharLen(zSql8, (int)(zTail8-zSql8));
drhee858132007-05-08 20:37:38 +00001008 *pzTail = (u8 *)zSql + sqlite3Utf16ByteLen(zSql, chars_parsed);
danielk1977fa256a32005-05-25 04:11:56 +00001009 }
drh633e6d52008-07-28 19:34:53 +00001010 sqlite3DbFree(db, zSql8);
drhb21c8cd2007-08-21 19:33:56 +00001011 rc = sqlite3ApiExit(db, rc);
1012 sqlite3_mutex_leave(db->mutex);
1013 return rc;
danielk1977fa256a32005-05-25 04:11:56 +00001014}
drhb900aaf2006-11-09 00:24:53 +00001015
1016/*
1017** Two versions of the official API. Legacy and new use. In the legacy
1018** version, the original SQL text is not saved in the prepared statement
1019** and so if a schema change occurs, SQLITE_SCHEMA is returned by
1020** sqlite3_step(). In the new version, the original SQL text is retained
1021** and the statement is automatically recompiled if an schema change
1022** occurs.
1023*/
1024int sqlite3_prepare16(
1025 sqlite3 *db, /* Database handle. */
dan0ecdeb22011-01-25 13:43:35 +00001026 const void *zSql, /* UTF-16 encoded SQL statement. */
drhb900aaf2006-11-09 00:24:53 +00001027 int nBytes, /* Length of zSql in bytes. */
1028 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
1029 const void **pzTail /* OUT: End of parsed string */
1030){
drh17eaae72008-03-03 18:47:28 +00001031 int rc;
1032 rc = sqlite3Prepare16(db,zSql,nBytes,0,ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +00001033 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +00001034 return rc;
drhb900aaf2006-11-09 00:24:53 +00001035}
1036int sqlite3_prepare16_v2(
1037 sqlite3 *db, /* Database handle. */
dan0ecdeb22011-01-25 13:43:35 +00001038 const void *zSql, /* UTF-16 encoded SQL statement. */
drhb900aaf2006-11-09 00:24:53 +00001039 int nBytes, /* Length of zSql in bytes. */
1040 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
1041 const void **pzTail /* OUT: End of parsed string */
1042){
drh17eaae72008-03-03 18:47:28 +00001043 int rc;
drh2c2f3922017-06-01 00:54:35 +00001044 rc = sqlite3Prepare16(db,zSql,nBytes,SQLITE_PREPARE_SAVESQL,ppStmt,pzTail);
1045 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
1046 return rc;
1047}
1048int sqlite3_prepare16_v3(
1049 sqlite3 *db, /* Database handle. */
1050 const void *zSql, /* UTF-16 encoded SQL statement. */
1051 int nBytes, /* Length of zSql in bytes. */
1052 unsigned int prepFlags, /* Zero or more SQLITE_PREPARE_* flags */
1053 sqlite3_stmt **ppStmt, /* OUT: A pointer to the prepared statement */
1054 const void **pzTail /* OUT: End of parsed string */
1055){
1056 int rc;
1057 rc = sqlite3Prepare16(db,zSql,nBytes,
1058 SQLITE_PREPARE_SAVESQL|(prepFlags&SQLITE_PREPARE_MASK),
1059 ppStmt,pzTail);
drh58edb652008-03-08 12:23:30 +00001060 assert( rc==SQLITE_OK || ppStmt==0 || *ppStmt==0 ); /* VERIFY: F13021 */
drh17eaae72008-03-03 18:47:28 +00001061 return rc;
drhb900aaf2006-11-09 00:24:53 +00001062}
1063
danielk1977fa256a32005-05-25 04:11:56 +00001064#endif /* SQLITE_OMIT_UTF16 */