summaryrefslogtreecommitdiff
path: root/src/test_syscall.c
diff options
context:
space:
mode:
authorHans-Christoph Steiner <hans@eds.org>2012-03-30 20:42:12 -0400
committerHans-Christoph Steiner <hans@eds.org>2012-03-30 20:42:12 -0400
commit7bb481fda9ecb134804b49c2ce77ca28f7eea583 (patch)
tree31b520b9914d3e2453968abe375f2c102772c3dc /src/test_syscall.c
Imported Upstream version 2.0.3
Diffstat (limited to 'src/test_syscall.c')
-rw-r--r--src/test_syscall.c674
1 files changed, 674 insertions, 0 deletions
diff --git a/src/test_syscall.c b/src/test_syscall.c
new file mode 100644
index 0000000..d484f22
--- /dev/null
+++ b/src/test_syscall.c
@@ -0,0 +1,674 @@
+/*
+** 2011 March 28
+**
+** The author disclaims copyright to this source code. In place of
+** a legal notice, here is a blessing:
+**
+** May you do good and not evil.
+** May you find forgiveness for yourself and forgive others.
+** May you share freely, never taking more than you give.
+**
+*************************************************************************
+**
+** The code in this file implements a Tcl interface used to test error
+** handling in the os_unix.c module. Wrapper functions that support fault
+** injection are registered as the low-level OS functions using the
+** xSetSystemCall() method of the VFS. The Tcl interface is as follows:
+**
+**
+** test_syscall install LIST
+** Install wrapper functions for all system calls in argument LIST.
+** LIST must be a list consisting of zero or more of the following
+** literal values:
+**
+** open close access getcwd stat fstat
+** ftruncate fcntl read pread pread64 write
+** pwrite pwrite64 fchmod fallocate
+**
+** test_syscall uninstall
+** Uninstall all wrapper functions.
+**
+** test_syscall fault ?COUNT PERSIST?
+** If [test_syscall fault] is invoked without the two arguments, fault
+** injection is disabled. Otherwise, fault injection is configured to
+** cause a failure on the COUNT'th next call to a system call with a
+** wrapper function installed. A COUNT value of 1 means fail the next
+** system call.
+**
+** Argument PERSIST is interpreted as a boolean. If true, the all
+** system calls following the initial failure also fail. Otherwise, only
+** the single transient failure is injected.
+**
+** test_syscall errno CALL ERRNO
+** Set the value that the global "errno" is set to following a fault
+** in call CALL. Argument CALL must be one of the system call names
+** listed above (under [test_syscall install]). ERRNO is a symbolic
+** name (i.e. "EACCES"). Not all errno codes are supported. Add extra
+** to the aErrno table in function test_syscall_errno() below as
+** required.
+**
+** test_syscall reset ?SYSTEM-CALL?
+** With no argument, this is an alias for the [uninstall] command. However,
+** this command uses a VFS call of the form:
+**
+** xSetSystemCall(pVfs, 0, 0);
+**
+** To restore the default system calls. The [uninstall] command restores
+** each system call individually by calling (i.e.):
+**
+** xSetSystemCall(pVfs, "open", 0);
+**
+** With an argument, this command attempts to reset the system call named
+** by the parameter using the same method as [uninstall].
+**
+** test_syscall exists SYSTEM-CALL
+** Return true if the named system call exists. Or false otherwise.
+**
+** test_syscall list
+** Return a list of all system calls. The list is constructed using
+** the xNextSystemCall() VFS method.
+*/
+
+#include "sqlite3.h"
+#include "tcl.h"
+#include <stdlib.h>
+#include <string.h>
+#include <assert.h>
+
+#include "sqliteInt.h"
+#if SQLITE_OS_UNIX
+
+/* From test1.c */
+extern const char *sqlite3TestErrorName(int);
+
+#include <sys/types.h>
+#include <errno.h>
+
+static struct TestSyscallGlobal {
+ int bPersist; /* 1 for persistent errors, 0 for transient */
+ int nCount; /* Fail after this many more calls */
+ int nFail; /* Number of failures that have occurred */
+} gSyscall = { 0, 0 };
+
+static int ts_open(const char *, int, int);
+static int ts_close(int fd);
+static int ts_access(const char *zPath, int mode);
+static char *ts_getcwd(char *zPath, size_t nPath);
+static int ts_stat(const char *zPath, struct stat *p);
+static int ts_fstat(int fd, struct stat *p);
+static int ts_ftruncate(int fd, off_t n);
+static int ts_fcntl(int fd, int cmd, ... );
+static int ts_read(int fd, void *aBuf, size_t nBuf);
+static int ts_pread(int fd, void *aBuf, size_t nBuf, off_t off);
+static int ts_pread64(int fd, void *aBuf, size_t nBuf, off_t off);
+static int ts_write(int fd, const void *aBuf, size_t nBuf);
+static int ts_pwrite(int fd, const void *aBuf, size_t nBuf, off_t off);
+static int ts_pwrite64(int fd, const void *aBuf, size_t nBuf, off_t off);
+static int ts_fchmod(int fd, mode_t mode);
+static int ts_fallocate(int fd, off_t off, off_t len);
+
+
+struct TestSyscallArray {
+ const char *zName;
+ sqlite3_syscall_ptr xTest;
+ sqlite3_syscall_ptr xOrig;
+ int default_errno; /* Default value for errno following errors */
+ int custom_errno; /* Current value for errno if error */
+} aSyscall[] = {
+ /* 0 */ { "open", (sqlite3_syscall_ptr)ts_open, 0, EACCES, 0 },
+ /* 1 */ { "close", (sqlite3_syscall_ptr)ts_close, 0, 0, 0 },
+ /* 2 */ { "access", (sqlite3_syscall_ptr)ts_access, 0, 0, 0 },
+ /* 3 */ { "getcwd", (sqlite3_syscall_ptr)ts_getcwd, 0, 0, 0 },
+ /* 4 */ { "stat", (sqlite3_syscall_ptr)ts_stat, 0, 0, 0 },
+ /* 5 */ { "fstat", (sqlite3_syscall_ptr)ts_fstat, 0, 0, 0 },
+ /* 6 */ { "ftruncate", (sqlite3_syscall_ptr)ts_ftruncate, 0, EIO, 0 },
+ /* 7 */ { "fcntl", (sqlite3_syscall_ptr)ts_fcntl, 0, EACCES, 0 },
+ /* 8 */ { "read", (sqlite3_syscall_ptr)ts_read, 0, 0, 0 },
+ /* 9 */ { "pread", (sqlite3_syscall_ptr)ts_pread, 0, 0, 0 },
+ /* 10 */ { "pread64", (sqlite3_syscall_ptr)ts_pread64, 0, 0, 0 },
+ /* 11 */ { "write", (sqlite3_syscall_ptr)ts_write, 0, 0, 0 },
+ /* 12 */ { "pwrite", (sqlite3_syscall_ptr)ts_pwrite, 0, 0, 0 },
+ /* 13 */ { "pwrite64", (sqlite3_syscall_ptr)ts_pwrite64, 0, 0, 0 },
+ /* 14 */ { "fchmod", (sqlite3_syscall_ptr)ts_fchmod, 0, 0, 0 },
+ /* 15 */ { "fallocate", (sqlite3_syscall_ptr)ts_fallocate, 0, 0, 0 },
+ { 0, 0, 0, 0, 0 }
+};
+
+#define orig_open ((int(*)(const char *, int, int))aSyscall[0].xOrig)
+#define orig_close ((int(*)(int))aSyscall[1].xOrig)
+#define orig_access ((int(*)(const char*,int))aSyscall[2].xOrig)
+#define orig_getcwd ((char*(*)(char*,size_t))aSyscall[3].xOrig)
+#define orig_stat ((int(*)(const char*,struct stat*))aSyscall[4].xOrig)
+#define orig_fstat ((int(*)(int,struct stat*))aSyscall[5].xOrig)
+#define orig_ftruncate ((int(*)(int,off_t))aSyscall[6].xOrig)
+#define orig_fcntl ((int(*)(int,int,...))aSyscall[7].xOrig)
+#define orig_read ((ssize_t(*)(int,void*,size_t))aSyscall[8].xOrig)
+#define orig_pread ((ssize_t(*)(int,void*,size_t,off_t))aSyscall[9].xOrig)
+#define orig_pread64 ((ssize_t(*)(int,void*,size_t,off_t))aSyscall[10].xOrig)
+#define orig_write ((ssize_t(*)(int,const void*,size_t))aSyscall[11].xOrig)
+#define orig_pwrite ((ssize_t(*)(int,const void*,size_t,off_t))\
+ aSyscall[12].xOrig)
+#define orig_pwrite64 ((ssize_t(*)(int,const void*,size_t,off_t))\
+ aSyscall[13].xOrig)
+#define orig_fchmod ((int(*)(int,mode_t))aSyscall[14].xOrig)
+#define orig_fallocate ((int(*)(int,off_t,off_t))aSyscall[15].xOrig)
+
+/*
+** This function is called exactly once from within each invocation of a
+** system call wrapper in this file. It returns 1 if the function should
+** fail, or 0 if it should succeed.
+*/
+static int tsIsFail(void){
+ gSyscall.nCount--;
+ if( gSyscall.nCount==0 || (gSyscall.nFail && gSyscall.bPersist) ){
+ gSyscall.nFail++;
+ return 1;
+ }
+ return 0;
+}
+
+/*
+** Return the current error-number value for function zFunc. zFunc must be
+** the name of a system call in the aSyscall[] table.
+**
+** Usually, the current error-number is the value that errno should be set
+** to if the named system call fails. The exception is "fallocate". See
+** comments above the implementation of ts_fallocate() for details.
+*/
+static int tsErrno(const char *zFunc){
+ int i;
+ int nFunc = strlen(zFunc);
+ for(i=0; aSyscall[i].zName; i++){
+ if( strlen(aSyscall[i].zName)!=nFunc ) continue;
+ if( memcmp(aSyscall[i].zName, zFunc, nFunc) ) continue;
+ return aSyscall[i].custom_errno;
+ }
+
+ assert(0);
+ return 0;
+}
+
+/*
+** A wrapper around tsIsFail(). If tsIsFail() returns non-zero, set the
+** value of errno before returning.
+*/
+static int tsIsFailErrno(const char *zFunc){
+ if( tsIsFail() ){
+ errno = tsErrno(zFunc);
+ return 1;
+ }
+ return 0;
+}
+
+/*
+** A wrapper around open().
+*/
+static int ts_open(const char *zFile, int flags, int mode){
+ if( tsIsFailErrno("open") ){
+ return -1;
+ }
+ return orig_open(zFile, flags, mode);
+}
+
+/*
+** A wrapper around close().
+*/
+static int ts_close(int fd){
+ if( tsIsFail() ){
+ /* Even if simulating an error, close the original file-descriptor.
+ ** This is to stop the test process from running out of file-descriptors
+ ** when running a long test. If a call to close() appears to fail, SQLite
+ ** never attempts to use the file-descriptor afterwards (or even to close
+ ** it a second time). */
+ orig_close(fd);
+ return -1;
+ }
+ return orig_close(fd);
+}
+
+/*
+** A wrapper around access().
+*/
+static int ts_access(const char *zPath, int mode){
+ if( tsIsFail() ){
+ return -1;
+ }
+ return orig_access(zPath, mode);
+}
+
+/*
+** A wrapper around getcwd().
+*/
+static char *ts_getcwd(char *zPath, size_t nPath){
+ if( tsIsFail() ){
+ return NULL;
+ }
+ return orig_getcwd(zPath, nPath);
+}
+
+/*
+** A wrapper around stat().
+*/
+static int ts_stat(const char *zPath, struct stat *p){
+ if( tsIsFail() ){
+ return -1;
+ }
+ return orig_stat(zPath, p);
+}
+
+/*
+** A wrapper around fstat().
+*/
+static int ts_fstat(int fd, struct stat *p){
+ if( tsIsFailErrno("fstat") ){
+ return -1;
+ }
+ return orig_fstat(fd, p);
+}
+
+/*
+** A wrapper around ftruncate().
+*/
+static int ts_ftruncate(int fd, off_t n){
+ if( tsIsFailErrno("ftruncate") ){
+ return -1;
+ }
+ return orig_ftruncate(fd, n);
+}
+
+/*
+** A wrapper around fcntl().
+*/
+static int ts_fcntl(int fd, int cmd, ... ){
+ va_list ap;
+ void *pArg;
+ if( tsIsFailErrno("fcntl") ){
+ return -1;
+ }
+ va_start(ap, cmd);
+ pArg = va_arg(ap, void *);
+ return orig_fcntl(fd, cmd, pArg);
+}
+
+/*
+** A wrapper around read().
+*/
+static int ts_read(int fd, void *aBuf, size_t nBuf){
+ if( tsIsFailErrno("read") ){
+ return -1;
+ }
+ return orig_read(fd, aBuf, nBuf);
+}
+
+/*
+** A wrapper around pread().
+*/
+static int ts_pread(int fd, void *aBuf, size_t nBuf, off_t off){
+ if( tsIsFailErrno("pread") ){
+ return -1;
+ }
+ return orig_pread(fd, aBuf, nBuf, off);
+}
+
+/*
+** A wrapper around pread64().
+*/
+static int ts_pread64(int fd, void *aBuf, size_t nBuf, off_t off){
+ if( tsIsFailErrno("pread64") ){
+ return -1;
+ }
+ return orig_pread64(fd, aBuf, nBuf, off);
+}
+
+/*
+** A wrapper around write().
+*/
+static int ts_write(int fd, const void *aBuf, size_t nBuf){
+ if( tsIsFailErrno("write") ){
+ if( tsErrno("write")==EINTR ) orig_write(fd, aBuf, nBuf/2);
+ return -1;
+ }
+ return orig_write(fd, aBuf, nBuf);
+}
+
+/*
+** A wrapper around pwrite().
+*/
+static int ts_pwrite(int fd, const void *aBuf, size_t nBuf, off_t off){
+ if( tsIsFailErrno("pwrite") ){
+ return -1;
+ }
+ return orig_pwrite(fd, aBuf, nBuf, off);
+}
+
+/*
+** A wrapper around pwrite64().
+*/
+static int ts_pwrite64(int fd, const void *aBuf, size_t nBuf, off_t off){
+ if( tsIsFailErrno("pwrite64") ){
+ return -1;
+ }
+ return orig_pwrite64(fd, aBuf, nBuf, off);
+}
+
+/*
+** A wrapper around fchmod().
+*/
+static int ts_fchmod(int fd, mode_t mode){
+ if( tsIsFail() ){
+ return -1;
+ }
+ return orig_fchmod(fd, mode);
+}
+
+/*
+** A wrapper around fallocate().
+**
+** SQLite assumes that the fallocate() function is compatible with
+** posix_fallocate(). According to the Linux man page (2009-09-30):
+**
+** posix_fallocate() returns zero on success, or an error number on
+** failure. Note that errno is not set.
+*/
+static int ts_fallocate(int fd, off_t off, off_t len){
+ if( tsIsFail() ){
+ return tsErrno("fallocate");
+ }
+ return orig_fallocate(fd, off, len);
+}
+
+static int test_syscall_install(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ sqlite3_vfs *pVfs;
+ int nElem;
+ int i;
+ Tcl_Obj **apElem;
+
+ if( objc!=3 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "SYSCALL-LIST");
+ return TCL_ERROR;
+ }
+ if( Tcl_ListObjGetElements(interp, objv[2], &nElem, &apElem) ){
+ return TCL_ERROR;
+ }
+ pVfs = sqlite3_vfs_find(0);
+
+ for(i=0; i<nElem; i++){
+ int iCall;
+ int rc = Tcl_GetIndexFromObjStruct(interp,
+ apElem[i], aSyscall, sizeof(aSyscall[0]), "system-call", 0, &iCall
+ );
+ if( rc ) return rc;
+ if( aSyscall[iCall].xOrig==0 ){
+ aSyscall[iCall].xOrig = pVfs->xGetSystemCall(pVfs, aSyscall[iCall].zName);
+ pVfs->xSetSystemCall(pVfs, aSyscall[iCall].zName, aSyscall[iCall].xTest);
+ }
+ aSyscall[iCall].custom_errno = aSyscall[iCall].default_errno;
+ }
+
+ return TCL_OK;
+}
+
+static int test_syscall_uninstall(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ sqlite3_vfs *pVfs;
+ int i;
+
+ if( objc!=2 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "");
+ return TCL_ERROR;
+ }
+
+ pVfs = sqlite3_vfs_find(0);
+ for(i=0; aSyscall[i].zName; i++){
+ if( aSyscall[i].xOrig ){
+ pVfs->xSetSystemCall(pVfs, aSyscall[i].zName, 0);
+ aSyscall[i].xOrig = 0;
+ }
+ }
+ return TCL_OK;
+}
+
+static int test_syscall_reset(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ sqlite3_vfs *pVfs;
+ int i;
+ int rc;
+
+ if( objc!=2 && objc!=3 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "");
+ return TCL_ERROR;
+ }
+
+ pVfs = sqlite3_vfs_find(0);
+ if( objc==2 ){
+ rc = pVfs->xSetSystemCall(pVfs, 0, 0);
+ for(i=0; aSyscall[i].zName; i++) aSyscall[i].xOrig = 0;
+ }else{
+ int nFunc;
+ char *zFunc = Tcl_GetStringFromObj(objv[2], &nFunc);
+ rc = pVfs->xSetSystemCall(pVfs, Tcl_GetString(objv[2]), 0);
+ for(i=0; rc==SQLITE_OK && aSyscall[i].zName; i++){
+ if( strlen(aSyscall[i].zName)!=nFunc ) continue;
+ if( memcmp(aSyscall[i].zName, zFunc, nFunc) ) continue;
+ aSyscall[i].xOrig = 0;
+ }
+ }
+ if( rc!=SQLITE_OK ){
+ Tcl_SetObjResult(interp, Tcl_NewStringObj(sqlite3TestErrorName(rc), -1));
+ return TCL_ERROR;
+ }
+
+ Tcl_ResetResult(interp);
+ return TCL_OK;
+}
+
+static int test_syscall_exists(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ sqlite3_vfs *pVfs;
+ sqlite3_syscall_ptr x;
+
+ if( objc!=3 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "");
+ return TCL_ERROR;
+ }
+
+ pVfs = sqlite3_vfs_find(0);
+ x = pVfs->xGetSystemCall(pVfs, Tcl_GetString(objv[2]));
+
+ Tcl_SetObjResult(interp, Tcl_NewBooleanObj(x!=0));
+ return TCL_OK;
+}
+
+static int test_syscall_fault(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ int nCount = 0;
+ int bPersist = 0;
+
+ if( objc!=2 && objc!=4 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "?COUNT PERSIST?");
+ return TCL_ERROR;
+ }
+
+ if( objc==4 ){
+ if( Tcl_GetIntFromObj(interp, objv[2], &nCount)
+ || Tcl_GetBooleanFromObj(interp, objv[3], &bPersist)
+ ){
+ return TCL_ERROR;
+ }
+ }
+
+ Tcl_SetObjResult(interp, Tcl_NewIntObj(gSyscall.nFail));
+ gSyscall.nCount = nCount;
+ gSyscall.bPersist = bPersist;
+ gSyscall.nFail = 0;
+ return TCL_OK;
+}
+
+static int test_syscall_errno(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ int iCall;
+ int iErrno;
+ int rc;
+
+ struct Errno {
+ const char *z;
+ int i;
+ } aErrno[] = {
+ { "EACCES", EACCES },
+ { "EINTR", EINTR },
+ { "EIO", EIO },
+ { "EOVERFLOW", EOVERFLOW },
+ { "ENOMEM", ENOMEM },
+ { "EAGAIN", EAGAIN },
+ { "ETIMEDOUT", ETIMEDOUT },
+ { "EBUSY", EBUSY },
+ { "EPERM", EPERM },
+ { "EDEADLK", EDEADLK },
+ { "ENOLCK", ENOLCK },
+ { 0, 0 }
+ };
+
+ if( objc!=4 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "SYSCALL ERRNO");
+ return TCL_ERROR;
+ }
+
+ rc = Tcl_GetIndexFromObjStruct(interp,
+ objv[2], aSyscall, sizeof(aSyscall[0]), "system-call", 0, &iCall
+ );
+ if( rc!=TCL_OK ) return rc;
+ rc = Tcl_GetIndexFromObjStruct(interp,
+ objv[3], aErrno, sizeof(aErrno[0]), "errno", 0, &iErrno
+ );
+ if( rc!=TCL_OK ) return rc;
+
+ aSyscall[iCall].custom_errno = aErrno[iErrno].i;
+ return TCL_OK;
+}
+
+static int test_syscall_list(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ const char *zSys;
+ sqlite3_vfs *pVfs;
+ Tcl_Obj *pList;
+
+ if( objc!=2 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "");
+ return TCL_ERROR;
+ }
+
+ pVfs = sqlite3_vfs_find(0);
+ pList = Tcl_NewObj();
+ Tcl_IncrRefCount(pList);
+ for(zSys = pVfs->xNextSystemCall(pVfs, 0);
+ zSys!=0;
+ zSys = pVfs->xNextSystemCall(pVfs, zSys)
+ ){
+ Tcl_ListObjAppendElement(interp, pList, Tcl_NewStringObj(zSys, -1));
+ }
+
+ Tcl_SetObjResult(interp, pList);
+ Tcl_DecrRefCount(pList);
+ return TCL_OK;
+}
+
+static int test_syscall_defaultvfs(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ sqlite3_vfs *pVfs;
+
+ if( objc!=2 ){
+ Tcl_WrongNumArgs(interp, 2, objv, "");
+ return TCL_ERROR;
+ }
+
+ pVfs = sqlite3_vfs_find(0);
+ Tcl_SetObjResult(interp, Tcl_NewStringObj(pVfs->zName, -1));
+ return TCL_OK;
+}
+
+static int test_syscall(
+ void * clientData,
+ Tcl_Interp *interp,
+ int objc,
+ Tcl_Obj *CONST objv[]
+){
+ struct SyscallCmd {
+ const char *zName;
+ Tcl_ObjCmdProc *xCmd;
+ } aCmd[] = {
+ { "fault", test_syscall_fault },
+ { "install", test_syscall_install },
+ { "uninstall", test_syscall_uninstall },
+ { "reset", test_syscall_reset },
+ { "errno", test_syscall_errno },
+ { "exists", test_syscall_exists },
+ { "list", test_syscall_list },
+ { "defaultvfs", test_syscall_defaultvfs },
+ { 0, 0 }
+ };
+ int iCmd;
+ int rc;
+
+ if( objc<2 ){
+ Tcl_WrongNumArgs(interp, 1, objv, "SUB-COMMAND ...");
+ return TCL_ERROR;
+ }
+ rc = Tcl_GetIndexFromObjStruct(interp,
+ objv[1], aCmd, sizeof(aCmd[0]), "sub-command", 0, &iCmd
+ );
+ if( rc!=TCL_OK ) return rc;
+ return aCmd[iCmd].xCmd(clientData, interp, objc, objv);
+}
+
+int SqlitetestSyscall_Init(Tcl_Interp *interp){
+ struct SyscallCmd {
+ const char *zName;
+ Tcl_ObjCmdProc *xCmd;
+ } aCmd[] = {
+ { "test_syscall", test_syscall},
+ };
+ int i;
+
+ for(i=0; i<sizeof(aCmd)/sizeof(aCmd[0]); i++){
+ Tcl_CreateObjCommand(interp, aCmd[i].zName, aCmd[i].xCmd, 0, 0);
+ }
+ return TCL_OK;
+}
+#else
+int SqlitetestSyscall_Init(Tcl_Interp *interp){
+ return TCL_OK;
+}
+#endif