1f08c3bdfSopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
2f08c3bdfSopenharmony_ci/*
3f08c3bdfSopenharmony_ci * Copyright (c) International Business Machines  Corp., 2001
4f08c3bdfSopenharmony_ci *  07/2001 Ported by Wayne Boyer
5f08c3bdfSopenharmony_ci * Copyright (c) 2022 SUSE LLC Avinesh Kumar <avinesh.kumar@suse.com>
6f08c3bdfSopenharmony_ci */
7f08c3bdfSopenharmony_ci
8f08c3bdfSopenharmony_ci/*\
9f08c3bdfSopenharmony_ci * [Description]
10f08c3bdfSopenharmony_ci *
11f08c3bdfSopenharmony_ci * Verify that rename(2) fails with EFAULT, when
12f08c3bdfSopenharmony_ci * oldpath or newpath points outside of accessible address space.
13f08c3bdfSopenharmony_ci */
14f08c3bdfSopenharmony_ci
15f08c3bdfSopenharmony_ci#include <stdio.h>
16f08c3bdfSopenharmony_ci#include "tst_test.h"
17f08c3bdfSopenharmony_ci
18f08c3bdfSopenharmony_ci#define MNT_POINT "mntpoint"
19f08c3bdfSopenharmony_ci#define TEMP_FILE "tmpfile"
20f08c3bdfSopenharmony_ci#define INVALID_PATH ((void *)-1)
21f08c3bdfSopenharmony_ci
22f08c3bdfSopenharmony_cistatic void setup(void)
23f08c3bdfSopenharmony_ci{
24f08c3bdfSopenharmony_ci	SAFE_CHDIR(MNT_POINT);
25f08c3bdfSopenharmony_ci	SAFE_TOUCH(TEMP_FILE, 0700, NULL);
26f08c3bdfSopenharmony_ci}
27f08c3bdfSopenharmony_ci
28f08c3bdfSopenharmony_cistatic void run(void)
29f08c3bdfSopenharmony_ci{
30f08c3bdfSopenharmony_ci	TST_EXP_FAIL(rename(INVALID_PATH, TEMP_FILE),
31f08c3bdfSopenharmony_ci				EFAULT);
32f08c3bdfSopenharmony_ci	TST_EXP_FAIL(rename(TEMP_FILE, INVALID_PATH),
33f08c3bdfSopenharmony_ci				EFAULT);
34f08c3bdfSopenharmony_ci}
35f08c3bdfSopenharmony_ci
36f08c3bdfSopenharmony_cistatic struct tst_test test = {
37f08c3bdfSopenharmony_ci	.setup = setup,
38f08c3bdfSopenharmony_ci	.test_all = run,
39f08c3bdfSopenharmony_ci	.needs_root = 1,
40f08c3bdfSopenharmony_ci	.mount_device = 1,
41f08c3bdfSopenharmony_ci	.mntpoint = MNT_POINT,
42f08c3bdfSopenharmony_ci	.all_filesystems = 1
43f08c3bdfSopenharmony_ci};
44