Skip to main content

sqlrite/sql/pager/
overflow.rs

1//! Overflow storage for cells that don't fit on one table-leaf page.
2//!
3//! Two pieces live here:
4//!
5//! - [`OverflowRef`] — the on-page marker that replaces a full cell when
6//!   the cell's body is too large to keep inline. It carries the rowid
7//!   (so the page's slot directory stays rowid-ordered), the total size
8//!   of the external body, and a pointer to the first overflow page of
9//!   the chain that holds the body.
10//! - [`write_overflow_chain`] / [`read_overflow_chain`] — turn raw bytes
11//!   into a chain of `Overflow`-typed pages and back. Each overflow page
12//!   reuses the existing 7-byte page header (type tag + next-page + payload
13//!   length) — we're not adding a new page format.
14//!
15//! **Decision to inline the rowid and NOT inline any of the body.** SQLite's
16//! leaf-cell scheme keeps a prefix of the body inline before spilling, so
17//! small lookups by rowid don't need a chain walk. We'd still have to chase
18//! the chain for most columns anyway, so for simplicity this implementation
19//! spills the entire body. A later optimization can split cells at a
20//! threshold and keep a prefix inline without changing the page layout.
21//!
22//! **Overflow threshold.** Inserting a cell whose encoded length is more
23//! than roughly a quarter of the page payload area (≈ 1000 bytes) is a
24//! good candidate for overflow — on a ~4 KiB page you can still keep at
25//! least 3-4 cells per page. The exact threshold is the caller's choice;
26//! this module just exposes [`OVERFLOW_THRESHOLD`] as a suggestion.
27
28use crate::error::{Result, SQLRiteError};
29use crate::sql::pager::cell::{Cell, KIND_LOCAL, KIND_OVERFLOW};
30use crate::sql::pager::page::{PAGE_HEADER_SIZE, PAGE_SIZE, PAYLOAD_PER_PAGE, PageType};
31use crate::sql::pager::pager::Pager;
32use crate::sql::pager::varint;
33
34/// Inline cell-body size above which the caller should consider overflowing.
35/// Sized so at least 4 inline cells can coexist on a page alongside their
36/// slot directory.
37pub const OVERFLOW_THRESHOLD: usize = PAYLOAD_PER_PAGE / 4;
38
39/// On-page marker that stands in for a cell whose body lives in an overflow
40/// chain. Rowid is inlined so the page's binary search over slots still
41/// works without chasing the chain.
42#[derive(Debug, Clone, PartialEq, Eq)]
43pub struct OverflowRef {
44    pub rowid: i64,
45    /// Exact byte count that `read_overflow_chain` must produce; the
46    /// caller then feeds those bytes to `LocalCellBody::decode`.
47    pub total_body_len: u64,
48    /// First page of the Overflow-type chain carrying the body.
49    pub first_overflow_page: u32,
50}
51
52impl OverflowRef {
53    /// Serializes the reference using the shared
54    /// `[cell_length varint | kind_tag | body]` prefix; `kind_tag` is
55    /// always `KIND_OVERFLOW` for this type.
56    pub fn encode(&self) -> Vec<u8> {
57        let mut body = Vec::with_capacity(1 + varint::MAX_VARINT_BYTES * 2 + 4);
58        body.push(KIND_OVERFLOW);
59        varint::write_i64(&mut body, self.rowid);
60        varint::write_u64(&mut body, self.total_body_len);
61        body.extend_from_slice(&self.first_overflow_page.to_le_bytes());
62
63        let mut out = Vec::with_capacity(body.len() + varint::MAX_VARINT_BYTES);
64        varint::write_u64(&mut out, body.len() as u64);
65        out.extend_from_slice(&body);
66        out
67    }
68
69    pub fn decode(buf: &[u8], pos: usize) -> Result<(OverflowRef, usize)> {
70        let (body_len, len_bytes) = varint::read_u64(buf, pos)?;
71        let body_start = pos + len_bytes;
72        let body_end = body_start
73            .checked_add(body_len as usize)
74            .ok_or_else(|| SQLRiteError::Internal("overflow ref length overflow".to_string()))?;
75        if body_end > buf.len() {
76            return Err(SQLRiteError::Internal(format!(
77                "overflow ref extends past buffer: needs {body_start}..{body_end}, have {}",
78                buf.len()
79            )));
80        }
81
82        let body = &buf[body_start..body_end];
83        if body.first().copied() != Some(KIND_OVERFLOW) {
84            return Err(SQLRiteError::Internal(format!(
85                "OverflowRef::decode called on non-overflow entry (kind_tag = {:#x})",
86                body.first().copied().unwrap_or(0)
87            )));
88        }
89        let mut cur = 1usize;
90        let (rowid, n) = varint::read_i64(body, cur)?;
91        cur += n;
92        let (total_body_len, n) = varint::read_u64(body, cur)?;
93        cur += n;
94        if cur + 4 > body.len() {
95            return Err(SQLRiteError::Internal(
96                "overflow ref truncated before first_overflow_page".to_string(),
97            ));
98        }
99        let first_overflow_page = u32::from_le_bytes(body[cur..cur + 4].try_into().unwrap());
100        cur += 4;
101        if cur != body.len() {
102            return Err(SQLRiteError::Internal(format!(
103                "overflow ref had {} trailing bytes",
104                body.len() - cur
105            )));
106        }
107        Ok((
108            OverflowRef {
109                rowid,
110                total_body_len,
111                first_overflow_page,
112            },
113            body_end - pos,
114        ))
115    }
116}
117
118/// An on-page entry: either a full local cell, or a pointer to an overflow
119/// chain carrying the cell's body.
120#[derive(Debug, Clone, PartialEq)]
121pub enum PagedEntry {
122    Local(Cell),
123    Overflow(OverflowRef),
124}
125
126impl PagedEntry {
127    pub fn rowid(&self) -> i64 {
128        match self {
129            PagedEntry::Local(c) => c.rowid,
130            PagedEntry::Overflow(r) => r.rowid,
131        }
132    }
133
134    pub fn encode(&self) -> Result<Vec<u8>> {
135        match self {
136            PagedEntry::Local(c) => c.encode(),
137            PagedEntry::Overflow(r) => Ok(r.encode()),
138        }
139    }
140
141    /// Dispatches on the kind tag and returns the appropriate variant.
142    pub fn decode(buf: &[u8], pos: usize) -> Result<(PagedEntry, usize)> {
143        match Cell::peek_kind(buf, pos)? {
144            KIND_LOCAL => {
145                let (c, n) = Cell::decode(buf, pos)?;
146                Ok((PagedEntry::Local(c), n))
147            }
148            KIND_OVERFLOW => {
149                let (r, n) = OverflowRef::decode(buf, pos)?;
150                Ok((PagedEntry::Overflow(r), n))
151            }
152            other => Err(SQLRiteError::Internal(format!(
153                "unknown paged-entry kind tag {other:#x} at offset {pos}"
154            ))),
155        }
156    }
157}
158
159/// Writes `bytes` into a chain of Overflow-typed pages, drawing each
160/// page number from the supplied [`PageAllocator`]. Returns the page
161/// number of the first link in the chain (the value to record in the
162/// `OverflowRef` cell on the owning leaf).
163///
164/// Pages no longer have to be consecutive — the chain is followed by
165/// `next_page` pointers, and the allocator may hand out pages from a
166/// freelist or preferred pool that aren't sequential.
167pub fn write_overflow_chain(
168    pager: &mut Pager,
169    bytes: &[u8],
170    alloc: &mut crate::sql::pager::allocator::PageAllocator,
171) -> Result<u32> {
172    if bytes.is_empty() {
173        return Err(SQLRiteError::Internal(
174            "refusing to write an empty overflow chain — caller should inline instead".to_string(),
175        ));
176    }
177    // Allocate every page in the chain up front so each stage_page call
178    // already knows the successor's page number.
179    let chunks: Vec<&[u8]> = bytes.chunks(PAYLOAD_PER_PAGE).collect();
180    let pages: Vec<u32> = (0..chunks.len()).map(|_| alloc.allocate()).collect();
181    for (i, chunk) in chunks.iter().enumerate() {
182        let next = if i + 1 < pages.len() { pages[i + 1] } else { 0 };
183        pager.stage_page(pages[i], encode_overflow_page(next, chunk)?);
184    }
185    Ok(pages[0])
186}
187
188/// Walks an overflow chain starting at `first_page` and concatenates its
189/// payload bytes. Reads exactly `total_body_len` bytes — a mismatch between
190/// what the chain carries and what the OverflowRef claims is a corruption
191/// error.
192pub fn read_overflow_chain(pager: &Pager, first_page: u32, total_body_len: u64) -> Result<Vec<u8>> {
193    let mut out = Vec::with_capacity(total_body_len as usize);
194    let mut current = first_page;
195    while current != 0 {
196        let raw = pager.read_page(current).ok_or_else(|| {
197            SQLRiteError::Internal(format!("overflow chain references missing page {current}"))
198        })?;
199        let ty_byte = raw[0];
200        if ty_byte != PageType::Overflow as u8 {
201            return Err(SQLRiteError::Internal(format!(
202                "page {current} was supposed to be Overflow but is type {ty_byte}"
203            )));
204        }
205        let next = u32::from_le_bytes(raw[1..5].try_into().unwrap());
206        let payload_len = u16::from_le_bytes(raw[5..7].try_into().unwrap()) as usize;
207        if payload_len > PAYLOAD_PER_PAGE {
208            return Err(SQLRiteError::Internal(format!(
209                "overflow page {current} reports payload_len {payload_len} > max"
210            )));
211        }
212        out.extend_from_slice(&raw[PAGE_HEADER_SIZE..PAGE_HEADER_SIZE + payload_len]);
213        current = next;
214    }
215    if out.len() as u64 != total_body_len {
216        return Err(SQLRiteError::Internal(format!(
217            "overflow chain produced {} bytes, OverflowRef claimed {total_body_len}",
218            out.len()
219        )));
220    }
221    Ok(out)
222}
223
224/// Encodes a single `Overflow`-typed page holding `payload` bytes. Shared
225/// with the rest of the pager via the standard 7-byte page header layout.
226fn encode_overflow_page(next: u32, payload: &[u8]) -> Result<[u8; PAGE_SIZE]> {
227    if payload.len() > PAYLOAD_PER_PAGE {
228        return Err(SQLRiteError::Internal(format!(
229            "overflow page payload {} exceeds max {PAYLOAD_PER_PAGE}",
230            payload.len()
231        )));
232    }
233    let mut buf = [0u8; PAGE_SIZE];
234    buf[0] = PageType::Overflow as u8;
235    buf[1..5].copy_from_slice(&next.to_le_bytes());
236    buf[5..7].copy_from_slice(&(payload.len() as u16).to_le_bytes());
237    buf[PAGE_HEADER_SIZE..PAGE_HEADER_SIZE + payload.len()].copy_from_slice(payload);
238    Ok(buf)
239}
240
241#[cfg(test)]
242mod tests {
243    use super::*;
244    use crate::sql::db::table::Value;
245
246    fn tmp_path(name: &str) -> std::path::PathBuf {
247        let mut p = std::env::temp_dir();
248        let pid = std::process::id();
249        let nanos = std::time::SystemTime::now()
250            .duration_since(std::time::UNIX_EPOCH)
251            .map(|d| d.as_nanos())
252            .unwrap_or(0);
253        p.push(format!("sqlrite-overflow-{pid}-{nanos}-{name}.sqlrite"));
254        p
255    }
256
257    #[test]
258    fn overflow_ref_round_trip() {
259        let r = OverflowRef {
260            rowid: 42,
261            total_body_len: 123_456,
262            first_overflow_page: 7,
263        };
264        let bytes = r.encode();
265        let (back, consumed) = OverflowRef::decode(&bytes, 0).unwrap();
266        assert_eq!(back, r);
267        assert_eq!(consumed, bytes.len());
268    }
269
270    #[test]
271    fn paged_entry_dispatches_on_kind() {
272        let local = Cell::new(1, vec![Some(Value::Integer(10))]);
273        let local_bytes = local.encode().unwrap();
274        let (decoded, _) = PagedEntry::decode(&local_bytes, 0).unwrap();
275        assert_eq!(decoded, PagedEntry::Local(local));
276
277        let overflow = OverflowRef {
278            rowid: 2,
279            total_body_len: 5000,
280            first_overflow_page: 13,
281        };
282        let overflow_bytes = overflow.encode();
283        let (decoded, _) = PagedEntry::decode(&overflow_bytes, 0).unwrap();
284        assert_eq!(decoded, PagedEntry::Overflow(overflow));
285    }
286
287    #[test]
288    fn peek_rowid_works_for_both_kinds() {
289        let local = Cell::new(99, vec![Some(Value::Integer(1))]);
290        let local_bytes = local.encode().unwrap();
291        assert_eq!(Cell::peek_rowid(&local_bytes, 0).unwrap(), 99);
292
293        let overflow = OverflowRef {
294            rowid: -7,
295            total_body_len: 100,
296            first_overflow_page: 42,
297        };
298        let overflow_bytes = overflow.encode();
299        assert_eq!(Cell::peek_rowid(&overflow_bytes, 0).unwrap(), -7);
300    }
301
302    #[test]
303    fn write_then_read_overflow_chain() {
304        let path = tmp_path("chain");
305        let mut pager = Pager::create(&path).unwrap();
306
307        // A blob that definitely spans multiple pages.
308        let blob: Vec<u8> = (0..10_000).map(|i| (i % 251) as u8).collect();
309        let pages_needed = blob.len().div_ceil(PAYLOAD_PER_PAGE) as u32;
310        let mut alloc =
311            crate::sql::pager::allocator::PageAllocator::new(std::collections::VecDeque::new(), 10);
312        let start = write_overflow_chain(&mut pager, &blob, &mut alloc).unwrap();
313        assert_eq!(start, 10);
314        // Linear allocation from page 10 → high water = 10 + pages_needed.
315        assert_eq!(alloc.high_water(), 10 + pages_needed);
316
317        pager
318            .commit(crate::sql::pager::header::DbHeader {
319                page_count: alloc.high_water(),
320                schema_root_page: 1,
321                format_version: crate::sql::pager::header::FORMAT_VERSION_BASELINE,
322                freelist_head: 0,
323            })
324            .unwrap();
325
326        // Fresh pager to verify we read from disk.
327        drop(pager);
328        let pager = Pager::open(&path).unwrap();
329        let back = read_overflow_chain(&pager, start, blob.len() as u64).unwrap();
330        assert_eq!(back, blob);
331
332        let _ = std::fs::remove_file(&path);
333    }
334
335    #[test]
336    fn read_overflow_chain_rejects_length_mismatch() {
337        let path = tmp_path("mismatch");
338        let mut pager = Pager::create(&path).unwrap();
339        let blob = vec![1u8; 500];
340        let mut alloc =
341            crate::sql::pager::allocator::PageAllocator::new(std::collections::VecDeque::new(), 10);
342        let start = write_overflow_chain(&mut pager, &blob, &mut alloc).unwrap();
343        assert_eq!(start, 10);
344        pager
345            .commit(crate::sql::pager::header::DbHeader {
346                page_count: alloc.high_water(),
347                schema_root_page: 1,
348                format_version: crate::sql::pager::header::FORMAT_VERSION_BASELINE,
349                freelist_head: 0,
350            })
351            .unwrap();
352
353        // Claim more bytes than the chain actually carries.
354        let err = read_overflow_chain(&pager, start, 999).unwrap_err();
355        assert!(format!("{err}").contains("overflow chain produced"));
356
357        let _ = std::fs::remove_file(&path);
358    }
359
360    #[test]
361    fn empty_chain_is_rejected() {
362        let path = tmp_path("empty");
363        let mut pager = Pager::create(&path).unwrap();
364        let mut alloc =
365            crate::sql::pager::allocator::PageAllocator::new(std::collections::VecDeque::new(), 10);
366        let err = write_overflow_chain(&mut pager, &[], &mut alloc).unwrap_err();
367        assert!(format!("{err}").contains("empty overflow chain"));
368        let _ = std::fs::remove_file(&path);
369    }
370
371    #[test]
372    fn overflow_threshold_is_reasonable() {
373        // The threshold should leave room for at least 4 cells per page.
374        assert!(OVERFLOW_THRESHOLD <= PAYLOAD_PER_PAGE / 4);
375        // And it should be comfortably larger than a typical small cell.
376        assert!(OVERFLOW_THRESHOLD > 200);
377    }
378}