Home | History | Annotate | Line # | Download | only in sys
t_stat.c revision 1.2.2.1
      1  1.2.2.1    yamt /* $NetBSD: t_stat.c,v 1.2.2.1 2012/04/17 00:09:12 yamt Exp $ */
      2      1.1  jruoho 
      3      1.1  jruoho /*-
      4      1.1  jruoho  * Copyright (c) 2011 The NetBSD Foundation, Inc.
      5      1.1  jruoho  * All rights reserved.
      6      1.1  jruoho  *
      7      1.1  jruoho  * This code is derived from software contributed to The NetBSD Foundation
      8      1.1  jruoho  * by Jukka Ruohonen.
      9      1.1  jruoho  *
     10      1.1  jruoho  * Redistribution and use in source and binary forms, with or without
     11      1.1  jruoho  * modification, are permitted provided that the following conditions
     12      1.1  jruoho  * are met:
     13      1.1  jruoho  * 1. Redistributions of source code must retain the above copyright
     14      1.1  jruoho  *    notice, this list of conditions and the following disclaimer.
     15      1.1  jruoho  * 2. Redistributions in binary form must reproduce the above copyright
     16      1.1  jruoho  *    notice, this list of conditions and the following disclaimer in the
     17      1.1  jruoho  *    documentation and/or other materials provided with the distribution.
     18      1.1  jruoho  *
     19      1.1  jruoho  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20      1.1  jruoho  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21      1.1  jruoho  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22      1.1  jruoho  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23      1.1  jruoho  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24      1.1  jruoho  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25      1.1  jruoho  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26      1.1  jruoho  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27      1.1  jruoho  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28      1.1  jruoho  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29      1.1  jruoho  * POSSIBILITY OF SUCH DAMAGE.
     30      1.1  jruoho  */
     31      1.1  jruoho #include <sys/cdefs.h>
     32  1.2.2.1    yamt __RCSID("$NetBSD: t_stat.c,v 1.2.2.1 2012/04/17 00:09:12 yamt Exp $");
     33      1.1  jruoho 
     34      1.1  jruoho #include <sys/stat.h>
     35  1.2.2.1    yamt #include <sys/socket.h>
     36      1.1  jruoho #include <sys/types.h>
     37      1.1  jruoho 
     38  1.2.2.1    yamt #include <arpa/inet.h>
     39  1.2.2.1    yamt 
     40      1.1  jruoho #include <atf-c.h>
     41      1.1  jruoho #include <errno.h>
     42      1.1  jruoho #include <fcntl.h>
     43      1.1  jruoho #include <fts.h>
     44      1.1  jruoho #include <limits.h>
     45      1.1  jruoho #include <string.h>
     46      1.1  jruoho #include <unistd.h>
     47      1.1  jruoho 
     48      1.1  jruoho #include <stdio.h>
     49      1.1  jruoho 
     50      1.1  jruoho static const char *path = "stat";
     51      1.1  jruoho 
     52      1.1  jruoho ATF_TC_WITH_CLEANUP(stat_chflags);
     53      1.1  jruoho ATF_TC_HEAD(stat_chflags, tc)
     54      1.1  jruoho {
     55      1.1  jruoho 	atf_tc_set_md_var(tc, "descr", "Test chflags(2) with stat(2)");
     56      1.1  jruoho }
     57      1.1  jruoho 
     58      1.1  jruoho ATF_TC_BODY(stat_chflags, tc)
     59      1.1  jruoho {
     60      1.1  jruoho 	struct stat sa, sb;
     61      1.1  jruoho 	int fd;
     62      1.1  jruoho 
     63      1.1  jruoho 	(void)memset(&sa, 0, sizeof(struct stat));
     64      1.1  jruoho 	(void)memset(&sb, 0, sizeof(struct stat));
     65      1.1  jruoho 
     66      1.1  jruoho 	fd = open(path, O_RDONLY | O_CREAT);
     67      1.1  jruoho 
     68      1.1  jruoho 	ATF_REQUIRE(fd != -1);
     69      1.1  jruoho 	ATF_REQUIRE(stat(path, &sa) == 0);
     70      1.1  jruoho 	ATF_REQUIRE(chflags(path, UF_NODUMP) == 0);
     71      1.1  jruoho 	ATF_REQUIRE(stat(path, &sb) == 0);
     72      1.1  jruoho 
     73      1.1  jruoho 	if (sa.st_flags == sb.st_flags)
     74      1.1  jruoho 		atf_tc_fail("stat(2) did not detect chflags(2)");
     75      1.1  jruoho 
     76      1.1  jruoho 	ATF_REQUIRE(close(fd) == 0);
     77      1.1  jruoho 	ATF_REQUIRE(unlink(path) == 0);
     78      1.1  jruoho }
     79      1.1  jruoho 
     80      1.1  jruoho ATF_TC_CLEANUP(stat_chflags, tc)
     81      1.1  jruoho {
     82      1.1  jruoho 	(void)unlink(path);
     83      1.1  jruoho }
     84      1.1  jruoho 
     85      1.1  jruoho ATF_TC(stat_dir);
     86      1.1  jruoho ATF_TC_HEAD(stat_dir, tc)
     87      1.1  jruoho {
     88      1.1  jruoho 	atf_tc_set_md_var(tc, "descr", "Test stat(2) with directories");
     89      1.1  jruoho }
     90      1.1  jruoho 
     91      1.1  jruoho ATF_TC_BODY(stat_dir, tc)
     92      1.1  jruoho {
     93      1.2  jruoho 	const short depth = 2;
     94      1.1  jruoho 	struct stat sa, sb;
     95      1.1  jruoho 	char *argv[2];
     96      1.1  jruoho 	FTSENT *ftse;
     97      1.1  jruoho 	FTS *fts;
     98      1.1  jruoho 	int ops;
     99      1.1  jruoho 
    100      1.1  jruoho 	argv[1] = NULL;
    101      1.1  jruoho 	argv[0] = __UNCONST("/");
    102      1.1  jruoho 
    103      1.1  jruoho 	ops = FTS_NOCHDIR;
    104      1.1  jruoho 	ops |= FTS_PHYSICAL;
    105      1.1  jruoho 
    106      1.1  jruoho 	fts = fts_open(argv, ops, NULL);
    107      1.1  jruoho 	ATF_REQUIRE(fts != NULL);
    108      1.1  jruoho 
    109      1.1  jruoho 	while ((ftse = fts_read(fts)) != NULL) {
    110      1.1  jruoho 
    111      1.1  jruoho 		if (ftse->fts_level < 1)
    112      1.1  jruoho 			continue;
    113      1.1  jruoho 
    114      1.1  jruoho 		if (ftse->fts_level > depth) {
    115      1.1  jruoho 			(void)fts_set(fts, ftse, FTS_SKIP);
    116      1.1  jruoho 			continue;
    117      1.1  jruoho 		}
    118      1.1  jruoho 
    119      1.1  jruoho 		switch(ftse->fts_info) {
    120      1.1  jruoho 
    121      1.1  jruoho 		case FTS_DP:
    122      1.1  jruoho 
    123      1.1  jruoho 			(void)memset(&sa, 0, sizeof(struct stat));
    124      1.1  jruoho 			(void)memset(&sb, 0, sizeof(struct stat));
    125      1.1  jruoho 
    126      1.1  jruoho 			ATF_REQUIRE(stat(ftse->fts_parent->fts_path,&sa) == 0);
    127      1.1  jruoho 			ATF_REQUIRE(chdir(ftse->fts_path) == 0);
    128      1.1  jruoho 			ATF_REQUIRE(stat(".", &sb) == 0);
    129      1.1  jruoho 
    130      1.1  jruoho 			/*
    131      1.1  jruoho 			 * The previous two stat(2) calls
    132      1.1  jruoho 			 * should be for the same directory.
    133      1.1  jruoho 			 */
    134      1.1  jruoho 			if (sa.st_dev != sb.st_dev || sa.st_ino != sb.st_ino)
    135      1.1  jruoho 				atf_tc_fail("inconsistent stat(2)");
    136      1.1  jruoho 
    137      1.1  jruoho 			/*
    138      1.1  jruoho 			 * Check that fts(3)'s stat(2)
    139      1.1  jruoho 			 * call equals the manual one.
    140      1.1  jruoho 			 */
    141      1.1  jruoho 			if (sb.st_ino != ftse->fts_statp->st_ino)
    142      1.1  jruoho 				atf_tc_fail("stat(2) and fts(3) differ");
    143      1.1  jruoho 
    144      1.1  jruoho 			break;
    145      1.1  jruoho 
    146      1.1  jruoho 		default:
    147      1.1  jruoho 			break;
    148      1.1  jruoho 		}
    149      1.1  jruoho 	}
    150      1.1  jruoho 
    151      1.1  jruoho 	(void)fts_close(fts);
    152      1.1  jruoho }
    153      1.1  jruoho 
    154      1.1  jruoho ATF_TC(stat_err);
    155      1.1  jruoho ATF_TC_HEAD(stat_err, tc)
    156      1.1  jruoho {
    157      1.1  jruoho 	atf_tc_set_md_var(tc, "descr", "Test errors from the stat(2) family");
    158      1.1  jruoho }
    159      1.1  jruoho 
    160      1.1  jruoho ATF_TC_BODY(stat_err, tc)
    161      1.1  jruoho {
    162      1.1  jruoho 	char buf[NAME_MAX + 1];
    163      1.1  jruoho 	struct stat st;
    164      1.1  jruoho 
    165      1.1  jruoho 	(void)memset(buf, 'x', sizeof(buf));
    166      1.1  jruoho 
    167      1.1  jruoho 	errno = 0;
    168      1.1  jruoho 	ATF_REQUIRE_ERRNO(EBADF, fstat(-1, &st) == -1);
    169      1.1  jruoho 
    170      1.1  jruoho 	errno = 0;
    171      1.1  jruoho 	ATF_REQUIRE_ERRNO(ENAMETOOLONG, stat(buf, &st) == -1);
    172      1.1  jruoho 
    173      1.1  jruoho 	errno = 0;
    174      1.1  jruoho 	ATF_REQUIRE_ERRNO(ENAMETOOLONG, lstat(buf, &st) == -1);
    175      1.1  jruoho 
    176      1.1  jruoho 	errno = 0;
    177      1.1  jruoho 	ATF_REQUIRE_ERRNO(EFAULT, stat((void *)-1, &st) == -1);
    178      1.1  jruoho 
    179      1.1  jruoho 	errno = 0;
    180      1.1  jruoho 	ATF_REQUIRE_ERRNO(EFAULT, lstat((void *)-1, &st) == -1);
    181      1.1  jruoho 
    182      1.1  jruoho 	errno = 0;
    183      1.1  jruoho 	ATF_REQUIRE_ERRNO(EFAULT, stat("/etc/passwd", (void *)-1) == -1);
    184      1.1  jruoho 
    185      1.1  jruoho 	errno = 0;
    186      1.1  jruoho 	ATF_REQUIRE_ERRNO(EFAULT, lstat("/etc/passwd", (void *)-1) == -1);
    187      1.1  jruoho 
    188      1.1  jruoho 	errno = 0;
    189      1.1  jruoho 	ATF_REQUIRE_ERRNO(ENOENT, stat("/a/b/c/d/e/f/g/h/i/j/k", &st) == -1);
    190      1.1  jruoho 
    191      1.1  jruoho 	errno = 0;
    192      1.1  jruoho 	ATF_REQUIRE_ERRNO(ENOENT, lstat("/a/b/c/d/e/f/g/h/i/j/k", &st) == -1);
    193      1.1  jruoho }
    194      1.1  jruoho 
    195      1.1  jruoho ATF_TC_WITH_CLEANUP(stat_mtime);
    196      1.1  jruoho ATF_TC_HEAD(stat_mtime, tc)
    197      1.1  jruoho {
    198      1.1  jruoho 	atf_tc_set_md_var(tc, "descr", "Test modification times with stat(2)");
    199      1.1  jruoho }
    200      1.1  jruoho 
    201      1.1  jruoho ATF_TC_BODY(stat_mtime, tc)
    202      1.1  jruoho {
    203      1.1  jruoho 	struct stat sa, sb;
    204      1.1  jruoho 	int fd[3];
    205      1.1  jruoho 	size_t i;
    206      1.1  jruoho 
    207      1.1  jruoho 	for (i = 0; i < __arraycount(fd); i++) {
    208      1.1  jruoho 
    209      1.1  jruoho 		(void)memset(&sa, 0, sizeof(struct stat));
    210      1.1  jruoho 		(void)memset(&sb, 0, sizeof(struct stat));
    211      1.1  jruoho 
    212      1.1  jruoho 		fd[i] = open(path, O_WRONLY | O_CREAT);
    213      1.1  jruoho 
    214      1.1  jruoho 		ATF_REQUIRE(fd[i] != -1);
    215      1.1  jruoho 		ATF_REQUIRE(write(fd[i], "X", 1) == 1);
    216      1.1  jruoho 		ATF_REQUIRE(stat(path, &sa) == 0);
    217      1.1  jruoho 
    218      1.1  jruoho 		(void)sleep(1);
    219      1.1  jruoho 
    220      1.1  jruoho 		ATF_REQUIRE(write(fd[i], "X", 1) == 1);
    221      1.1  jruoho 		ATF_REQUIRE(stat(path, &sb) == 0);
    222      1.1  jruoho 
    223      1.1  jruoho 		ATF_REQUIRE(close(fd[i]) == 0);
    224      1.1  jruoho 		ATF_REQUIRE(unlink(path) == 0);
    225      1.1  jruoho 
    226      1.1  jruoho 		if (sa.st_mtime == sb.st_mtime)
    227      1.1  jruoho 			atf_tc_fail("mtimes did not change");
    228      1.1  jruoho 	}
    229      1.1  jruoho }
    230      1.1  jruoho 
    231      1.1  jruoho ATF_TC_CLEANUP(stat_mtime, tc)
    232      1.1  jruoho {
    233      1.1  jruoho 	(void)unlink(path);
    234      1.1  jruoho }
    235      1.1  jruoho 
    236      1.1  jruoho ATF_TC_WITH_CLEANUP(stat_perm);
    237      1.1  jruoho ATF_TC_HEAD(stat_perm, tc)
    238      1.1  jruoho {
    239      1.1  jruoho 	atf_tc_set_md_var(tc, "descr", "Test permissions with stat(2)");
    240      1.1  jruoho 	atf_tc_set_md_var(tc, "require.user", "root");
    241      1.1  jruoho }
    242      1.1  jruoho 
    243      1.1  jruoho ATF_TC_BODY(stat_perm, tc)
    244      1.1  jruoho {
    245      1.1  jruoho 	struct stat sa, sb;
    246      1.1  jruoho 	gid_t gid;
    247      1.1  jruoho 	uid_t uid;
    248      1.1  jruoho 	int fd;
    249      1.1  jruoho 
    250      1.1  jruoho 	(void)memset(&sa, 0, sizeof(struct stat));
    251      1.1  jruoho 	(void)memset(&sb, 0, sizeof(struct stat));
    252      1.1  jruoho 
    253      1.1  jruoho 	uid = getuid();
    254      1.1  jruoho 	gid = getgid();
    255      1.1  jruoho 
    256      1.1  jruoho 	fd = open(path, O_RDONLY | O_CREAT);
    257      1.1  jruoho 
    258      1.1  jruoho 	ATF_REQUIRE(fd != -1);
    259      1.1  jruoho 	ATF_REQUIRE(fstat(fd, &sa) == 0);
    260      1.1  jruoho 	ATF_REQUIRE(stat(path, &sb) == 0);
    261      1.1  jruoho 
    262      1.1  jruoho 	if (gid != sa.st_gid || sa.st_gid != sb.st_gid)
    263      1.1  jruoho 		atf_tc_fail("invalid GID");
    264      1.1  jruoho 
    265      1.1  jruoho 	if (uid != sa.st_uid || sa.st_uid != sb.st_uid)
    266      1.1  jruoho 		atf_tc_fail("invalid UID");
    267      1.1  jruoho 
    268      1.1  jruoho 	ATF_REQUIRE(close(fd) == 0);
    269      1.1  jruoho 	ATF_REQUIRE(unlink(path) == 0);
    270      1.1  jruoho }
    271      1.1  jruoho 
    272      1.1  jruoho ATF_TC_CLEANUP(stat_perm, tc)
    273      1.1  jruoho {
    274      1.1  jruoho 	(void)unlink(path);
    275      1.1  jruoho }
    276      1.1  jruoho 
    277      1.1  jruoho ATF_TC_WITH_CLEANUP(stat_size);
    278      1.1  jruoho ATF_TC_HEAD(stat_size, tc)
    279      1.1  jruoho {
    280      1.1  jruoho 	atf_tc_set_md_var(tc, "descr", "Test file sizes with stat(2)");
    281      1.1  jruoho }
    282      1.1  jruoho 
    283      1.1  jruoho ATF_TC_BODY(stat_size, tc)
    284      1.1  jruoho {
    285      1.1  jruoho 	struct stat sa, sb, sc;
    286      1.1  jruoho 	const size_t n = 10;
    287      1.1  jruoho 	size_t i;
    288      1.1  jruoho 	int fd;
    289      1.1  jruoho 
    290      1.1  jruoho 	fd = open(path, O_WRONLY | O_CREAT);
    291      1.1  jruoho 	ATF_REQUIRE(fd >= 0);
    292      1.1  jruoho 
    293      1.1  jruoho 	for (i = 0; i < n; i++) {
    294      1.1  jruoho 
    295      1.1  jruoho 		(void)memset(&sa, 0, sizeof(struct stat));
    296      1.1  jruoho 		(void)memset(&sb, 0, sizeof(struct stat));
    297      1.1  jruoho 		(void)memset(&sc, 0, sizeof(struct stat));
    298      1.1  jruoho 
    299      1.1  jruoho 		ATF_REQUIRE(fstat(fd, &sa) == 0);
    300      1.1  jruoho 		ATF_REQUIRE(write(fd, "X", 1) == 1);
    301      1.1  jruoho 		ATF_REQUIRE(fstat(fd, &sb) == 0);
    302      1.1  jruoho 		ATF_REQUIRE(stat(path, &sc) == 0);
    303      1.1  jruoho 
    304      1.1  jruoho 		if (sa.st_size + 1 != sb.st_size)
    305      1.1  jruoho 			atf_tc_fail("invalid file size");
    306      1.1  jruoho 
    307      1.1  jruoho 		if (sb.st_size != sc.st_size)
    308      1.1  jruoho 			atf_tc_fail("stat(2) and fstat(2) mismatch");
    309      1.1  jruoho 	}
    310      1.1  jruoho 
    311      1.1  jruoho 	ATF_REQUIRE(close(fd) == 0);
    312      1.1  jruoho 	ATF_REQUIRE(unlink(path) == 0);
    313      1.1  jruoho }
    314      1.1  jruoho 
    315      1.1  jruoho ATF_TC_CLEANUP(stat_size, tc)
    316      1.1  jruoho {
    317      1.1  jruoho 	(void)unlink(path);
    318      1.1  jruoho }
    319      1.1  jruoho 
    320  1.2.2.1    yamt ATF_TC(stat_socket);
    321  1.2.2.1    yamt ATF_TC_HEAD(stat_socket, tc)
    322  1.2.2.1    yamt {
    323  1.2.2.1    yamt 	atf_tc_set_md_var(tc, "descr", "Test fstat(2) with "
    324  1.2.2.1    yamt 	    "a socket (PR kern/46077)");
    325  1.2.2.1    yamt }
    326  1.2.2.1    yamt 
    327  1.2.2.1    yamt ATF_TC_BODY(stat_socket, tc)
    328  1.2.2.1    yamt {
    329  1.2.2.1    yamt 	struct sockaddr_in addr;
    330  1.2.2.1    yamt 	struct stat st;
    331  1.2.2.1    yamt 	uint32_t iaddr;
    332  1.2.2.1    yamt 	int fd, flags;
    333  1.2.2.1    yamt 
    334  1.2.2.1    yamt 	(void)memset(&st, 0, sizeof(struct stat));
    335  1.2.2.1    yamt 	(void)memset(&addr, 0, sizeof(struct sockaddr_in));
    336  1.2.2.1    yamt 
    337  1.2.2.1    yamt 	fd = socket(AF_INET, SOCK_STREAM, 0);
    338  1.2.2.1    yamt 	ATF_REQUIRE(fd >= 0);
    339  1.2.2.1    yamt 
    340  1.2.2.1    yamt 	flags = fcntl(fd, F_GETFL);
    341  1.2.2.1    yamt 
    342  1.2.2.1    yamt 	ATF_REQUIRE(flags != -1);
    343  1.2.2.1    yamt 	ATF_REQUIRE(fcntl(fd, F_SETFL, flags | O_NONBLOCK) != -1);
    344  1.2.2.1    yamt 	ATF_REQUIRE(inet_pton(AF_INET, "127.0.0.1", &iaddr) == 1);
    345  1.2.2.1    yamt 
    346  1.2.2.1    yamt 	addr.sin_port = htons(42);
    347  1.2.2.1    yamt 	addr.sin_family = AF_INET;
    348  1.2.2.1    yamt 	addr.sin_addr.s_addr = iaddr;
    349  1.2.2.1    yamt 
    350  1.2.2.1    yamt 	errno = 0;
    351  1.2.2.1    yamt 
    352  1.2.2.1    yamt 	ATF_REQUIRE_ERRNO(EINPROGRESS,
    353  1.2.2.1    yamt 	    connect(fd, (struct sockaddr *)&addr,
    354  1.2.2.1    yamt 		sizeof(struct sockaddr_in)) == -1);
    355  1.2.2.1    yamt 
    356  1.2.2.1    yamt 	errno = 0;
    357  1.2.2.1    yamt 
    358  1.2.2.1    yamt 	if (fstat(fd, &st) != 0 || errno != 0)
    359  1.2.2.1    yamt 		atf_tc_fail("fstat(2) failed for a EINPROGRESS socket");
    360  1.2.2.1    yamt 
    361  1.2.2.1    yamt 	(void)close(fd);
    362  1.2.2.1    yamt }
    363  1.2.2.1    yamt 
    364      1.1  jruoho ATF_TC_WITH_CLEANUP(stat_symlink);
    365      1.1  jruoho ATF_TC_HEAD(stat_symlink, tc)
    366      1.1  jruoho {
    367      1.1  jruoho 	atf_tc_set_md_var(tc, "descr", "Test symbolic links with stat(2)");
    368      1.1  jruoho }
    369      1.1  jruoho 
    370      1.1  jruoho ATF_TC_BODY(stat_symlink, tc)
    371      1.1  jruoho {
    372      1.1  jruoho 	const char *pathlink = "pathlink";
    373      1.1  jruoho 	struct stat sa, sb;
    374      1.1  jruoho 	int fd;
    375      1.1  jruoho 
    376      1.1  jruoho 	(void)memset(&sa, 0, sizeof(struct stat));
    377      1.1  jruoho 	(void)memset(&sb, 0, sizeof(struct stat));
    378      1.1  jruoho 
    379      1.1  jruoho 	fd = open(path, O_WRONLY | O_CREAT);
    380      1.1  jruoho 
    381      1.1  jruoho 	ATF_REQUIRE(fd >= 0);
    382      1.1  jruoho 	ATF_REQUIRE(symlink(path, pathlink) == 0);
    383      1.1  jruoho 	ATF_REQUIRE(stat(pathlink, &sa) == 0);
    384      1.1  jruoho 	ATF_REQUIRE(lstat(pathlink, &sb) == 0);
    385      1.1  jruoho 
    386      1.1  jruoho 	if (S_ISLNK(sa.st_mode) != 0)
    387      1.1  jruoho 		atf_tc_fail("stat(2) detected symbolic link");
    388      1.1  jruoho 
    389      1.1  jruoho 	if (S_ISLNK(sb.st_mode) == 0)
    390      1.1  jruoho 		atf_tc_fail("lstat(2) did not detect symbolic link");
    391      1.1  jruoho 
    392      1.1  jruoho 	if (sa.st_mode == sb.st_mode)
    393      1.1  jruoho 		atf_tc_fail("inconsistencies between stat(2) and lstat(2)");
    394      1.1  jruoho 
    395      1.1  jruoho 	ATF_REQUIRE(unlink(path) == 0);
    396      1.1  jruoho 	ATF_REQUIRE(unlink(pathlink) == 0);
    397      1.1  jruoho }
    398      1.1  jruoho 
    399      1.1  jruoho ATF_TC_CLEANUP(stat_symlink, tc)
    400      1.1  jruoho {
    401      1.1  jruoho 	(void)unlink(path);
    402      1.1  jruoho }
    403      1.1  jruoho 
    404      1.1  jruoho ATF_TP_ADD_TCS(tp)
    405      1.1  jruoho {
    406      1.1  jruoho 
    407      1.1  jruoho 	ATF_TP_ADD_TC(tp, stat_chflags);
    408      1.1  jruoho 	ATF_TP_ADD_TC(tp, stat_dir);
    409      1.1  jruoho 	ATF_TP_ADD_TC(tp, stat_err);
    410      1.1  jruoho 	ATF_TP_ADD_TC(tp, stat_mtime);
    411      1.1  jruoho 	ATF_TP_ADD_TC(tp, stat_perm);
    412      1.1  jruoho 	ATF_TP_ADD_TC(tp, stat_size);
    413  1.2.2.1    yamt 	ATF_TP_ADD_TC(tp, stat_socket);
    414      1.1  jruoho 	ATF_TP_ADD_TC(tp, stat_symlink);
    415      1.1  jruoho 
    416      1.1  jruoho 	return atf_no_error();
    417      1.1  jruoho }
    418