1f08c3bdfSopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 2f08c3bdfSopenharmony_ci/* 3f08c3bdfSopenharmony_ci * Copyright (c) International Business Machines Corp., 2001 4f08c3bdfSopenharmony_ci * 07/2001 Ported by Wayne Boyer 5f08c3bdfSopenharmony_ci * Copyright (c) 2022 SUSE LLC Avinesh Kumar <avinesh.kumar@suse.com> 6f08c3bdfSopenharmony_ci */ 7f08c3bdfSopenharmony_ci 8f08c3bdfSopenharmony_ci/*\ 9f08c3bdfSopenharmony_ci * [Description] 10f08c3bdfSopenharmony_ci * 11f08c3bdfSopenharmony_ci * Verify that rename(2) fails with EFAULT, when 12f08c3bdfSopenharmony_ci * oldpath or newpath points outside of accessible address space. 13f08c3bdfSopenharmony_ci */ 14f08c3bdfSopenharmony_ci 15f08c3bdfSopenharmony_ci#include <stdio.h> 16f08c3bdfSopenharmony_ci#include "tst_test.h" 17f08c3bdfSopenharmony_ci 18f08c3bdfSopenharmony_ci#define MNT_POINT "mntpoint" 19f08c3bdfSopenharmony_ci#define TEMP_FILE "tmpfile" 20f08c3bdfSopenharmony_ci#define INVALID_PATH ((void *)-1) 21f08c3bdfSopenharmony_ci 22f08c3bdfSopenharmony_cistatic void setup(void) 23f08c3bdfSopenharmony_ci{ 24f08c3bdfSopenharmony_ci SAFE_CHDIR(MNT_POINT); 25f08c3bdfSopenharmony_ci SAFE_TOUCH(TEMP_FILE, 0700, NULL); 26f08c3bdfSopenharmony_ci} 27f08c3bdfSopenharmony_ci 28f08c3bdfSopenharmony_cistatic void run(void) 29f08c3bdfSopenharmony_ci{ 30f08c3bdfSopenharmony_ci TST_EXP_FAIL(rename(INVALID_PATH, TEMP_FILE), 31f08c3bdfSopenharmony_ci EFAULT); 32f08c3bdfSopenharmony_ci TST_EXP_FAIL(rename(TEMP_FILE, INVALID_PATH), 33f08c3bdfSopenharmony_ci EFAULT); 34f08c3bdfSopenharmony_ci} 35f08c3bdfSopenharmony_ci 36f08c3bdfSopenharmony_cistatic struct tst_test test = { 37f08c3bdfSopenharmony_ci .setup = setup, 38f08c3bdfSopenharmony_ci .test_all = run, 39f08c3bdfSopenharmony_ci .needs_root = 1, 40f08c3bdfSopenharmony_ci .mount_device = 1, 41f08c3bdfSopenharmony_ci .mntpoint = MNT_POINT, 42f08c3bdfSopenharmony_ci .all_filesystems = 1 43f08c3bdfSopenharmony_ci}; 44