diff mbox series

syscalls: Add tests for name_to_handle_at() and open_by_handle_at()

Message ID 9c4453f49394a7864ec9c84ccd561663f54bae51.1605862411.git.viresh.kumar@linaro.org
State Changes Requested
Headers show
Series syscalls: Add tests for name_to_handle_at() and open_by_handle_at() | expand

Commit Message

Viresh Kumar Nov. 20, 2020, 8:53 a.m. UTC
This adds basic success and failure tests for name_to_handle_at() and
open_by_handle_at() and syscalls.

Signed-off-by: Viresh Kumar <viresh.kumar@linaro.org>
---
 configure.ac                                  |   1 +
 runtest/syscalls                              |   5 +
 .../syscalls/name_to_handle_at/.gitignore     |   3 +
 .../syscalls/name_to_handle_at/Makefile       |   7 +
 .../name_to_handle_at/name_to_handle_at01.c   | 131 +++++++++++++++++
 .../name_to_handle_at/name_to_handle_at02.c   |  79 ++++++++++
 .../name_to_handle_at/open_by_handle_at01.c   | 139 ++++++++++++++++++
 7 files changed, 365 insertions(+)
 create mode 100644 testcases/kernel/syscalls/name_to_handle_at/.gitignore
 create mode 100644 testcases/kernel/syscalls/name_to_handle_at/Makefile
 create mode 100644 testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
 create mode 100644 testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
 create mode 100644 testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c

Comments

Cyril Hrubis Nov. 20, 2020, 10:41 a.m. UTC | #1
Hi!
>  configure.ac                                  |   1 +
>  runtest/syscalls                              |   5 +
>  .../syscalls/name_to_handle_at/.gitignore     |   3 +
>  .../syscalls/name_to_handle_at/Makefile       |   7 +
>  .../name_to_handle_at/name_to_handle_at01.c   | 131 +++++++++++++++++
>  .../name_to_handle_at/name_to_handle_at02.c   |  79 ++++++++++
>  .../name_to_handle_at/open_by_handle_at01.c   | 139 ++++++++++++++++++
>  7 files changed, 365 insertions(+)
>  create mode 100644 testcases/kernel/syscalls/name_to_handle_at/.gitignore
>  create mode 100644 testcases/kernel/syscalls/name_to_handle_at/Makefile
>  create mode 100644 testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
>  create mode 100644 testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
>  create mode 100644 testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c
> 
> diff --git a/configure.ac b/configure.ac
> index 06be1c09417a..39ba301b855d 100644
> --- a/configure.ac
> +++ b/configure.ac
> @@ -99,6 +99,7 @@ AC_CHECK_FUNCS_ONCE([ \
>      modify_ldt \
>      move_mount \
>      name_to_handle_at \
> +    open_by_handle_at \
>      open_tree \
>      openat \
>      openat2 \

I'm a bit confused here, what do we need to add the function to the
configure check for?

We does not seem to use it in any way, I guess that we should add
fallback definitions to a lapi header in the same way we do for example
in lapi/setns.h so that these tests would compile on older libcs.

> diff --git a/runtest/syscalls b/runtest/syscalls
> index a5363277f478..aa33c1cb322f 100644
> --- a/runtest/syscalls
> +++ b/runtest/syscalls
> @@ -846,6 +846,9 @@ nanosleep01 nanosleep01
>  nanosleep02 nanosleep02
>  nanosleep04 nanosleep04
>  
> +name_to_handle_at01 name_to_handle_at01
> +name_to_handle_at02 name_to_handle_at02
> +
>  nftw01 nftw01
>  nftw6401 nftw6401
>  
> @@ -879,6 +882,8 @@ openat201 openat201
>  openat202 openat202
>  openat203 openat203
>  
> +open_by_handle_at01 open_by_handle_at01
> +
>  open_tree01 open_tree01
>  open_tree02 open_tree02
>  
> diff --git a/testcases/kernel/syscalls/name_to_handle_at/.gitignore b/testcases/kernel/syscalls/name_to_handle_at/.gitignore
> new file mode 100644
> index 000000000000..cefa82727253
> --- /dev/null
> +++ b/testcases/kernel/syscalls/name_to_handle_at/.gitignore
> @@ -0,0 +1,3 @@
> +name_to_handle_at01
> +name_to_handle_at02
> +open_by_handle_at01

I'm not sure if we want to put both name_to_handle and open_by_handle
into the same directory, it would probably be cleaner to have the
open_by_handle ones in open_by_handle_at() directory.

> diff --git a/testcases/kernel/syscalls/name_to_handle_at/Makefile b/testcases/kernel/syscalls/name_to_handle_at/Makefile
> new file mode 100644
> index 000000000000..18896b6f28c0
> --- /dev/null
> +++ b/testcases/kernel/syscalls/name_to_handle_at/Makefile
> @@ -0,0 +1,7 @@
> +# SPDX-License-Identifier: GPL-2.0-or-later
> +
> +top_srcdir		?= ../../../..
> +
> +include $(top_srcdir)/include/mk/testcases.mk
> +
> +include $(top_srcdir)/include/mk/generic_leaf_target.mk
> diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
> new file mode 100644
> index 000000000000..36f22c003568
> --- /dev/null
> +++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
> @@ -0,0 +1,131 @@
> +// SPDX-License-Identifier: GPL-2.0-or-later
> +/*
> + * Copyright (c) 2020 Viresh Kumar <viresh.kumar@linaro.org>
> + *
> + * Basic name_to_handle_at() and open_by_handle_at() tests.
> + */

Since we merged the docparse patchset can we please start formatting the
description comments accordingly?

See the end of the readme at:

https://github.com/linux-test-project/ltp/tree/master/docparse

> +#define _GNU_SOURCE
> +#include <fcntl.h>
> +#include <malloc.h>
> +#include <sys/stat.h>
> +#include "lapi/syscalls.h"
> +#include "tst_test.h"
> +
> +#define TEST_FILE "test_file"
> +#define TEST_DIR "test_dir"
> +
> +static int dir_fd, fd_atcwd = AT_FDCWD;
> +
> +static struct tcase {
> +	int *dfd;
> +	const char *pathname;
> +	int name_flags;
> +	int flags;
> +} tcases[] = {
> +	{&dir_fd, TEST_FILE, 0, O_RDWR},
> +	{&dir_fd, TEST_FILE, 0, O_RDONLY},
> +	{&dir_fd, TEST_FILE, 0, O_WRONLY},
> +	{&dir_fd, TEST_FILE, AT_EMPTY_PATH, O_RDWR},
> +	{&dir_fd, TEST_FILE, AT_EMPTY_PATH, O_RDONLY},
> +	{&dir_fd, TEST_FILE, AT_EMPTY_PATH, O_WRONLY},
> +	{&dir_fd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDWR},
> +	{&dir_fd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDONLY},
> +	{&dir_fd, TEST_FILE, AT_SYMLINK_FOLLOW, O_WRONLY},
> +	{&dir_fd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDWR},
> +	{&dir_fd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDONLY},
> +	{&dir_fd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_WRONLY},
> +	{&dir_fd, "", AT_EMPTY_PATH, O_RDONLY},
> +
> +	{&fd_atcwd, TEST_FILE, 0, O_RDWR},
> +	{&fd_atcwd, TEST_FILE, 0, O_RDONLY},
> +	{&fd_atcwd, TEST_FILE, 0, O_WRONLY},
> +	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH, O_RDWR},
> +	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH, O_RDONLY},
> +	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH, O_WRONLY},
> +	{&fd_atcwd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDWR},
> +	{&fd_atcwd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDONLY},
> +	{&fd_atcwd, TEST_FILE, AT_SYMLINK_FOLLOW, O_WRONLY},
> +	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDWR},
> +	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDONLY},
> +	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_WRONLY},
> +	{&fd_atcwd, "", AT_EMPTY_PATH, O_RDONLY},
> +};
> +
> +static void cleanup(void)
> +{
> +	SAFE_CLOSE(dir_fd);
> +}
> +
> +static void setup(void)
> +{
> +	SAFE_MKDIR(TEST_DIR, 0700);
> +	dir_fd = SAFE_OPEN(TEST_DIR, O_DIRECTORY);
> +	SAFE_CHDIR(TEST_DIR);
> +	SAFE_TOUCH(TEST_FILE, 0600, NULL);
> +}
> +
> +static void run(unsigned int n)
> +{
> +	struct tcase *tc = &tcases[n];
> +	struct file_handle fh = {0, }, *fhp;

The = {0, } can as well be just = {}

> +	struct stat file_stat;
> +	int fd, mount_id;
> +
> +	/*
> +	 * Make an initial call to name_to_handle_at() to discover the size
> +	 * required for the file handle.
> +	 */
> +	TEST(name_to_handle_at(*tc->dfd, tc->pathname, &fh, &mount_id,
> +			       tc->name_flags));
> +
> +	if (TST_RET != -1 || TST_ERR != EOVERFLOW) {
> +		tst_res(TFAIL | TTERRNO,
> +			"name_to_handle_at() should fail with %s (%d)",
> +			tst_strerrno(EOVERFLOW), n);

Can we just put the EOVERFLOW into the string instead?

> +		return;
> +	}
> +
> +	fhp = malloc(sizeof(*fhp) + fh.handle_bytes);
> +	if (!fhp) {
> +		tst_res(TFAIL, "Failed to allocate memory for fhp (%d)", n);
> +		return;
> +	}

Can we just instead do the call to get the size in the test setup and
allocate guarded buffer for all testcases with tst_alloc() instead?

> +	fhp->handle_type = fh.handle_type;
> +	fhp->handle_bytes = fh.handle_bytes;
> +
> +	TEST(name_to_handle_at(*tc->dfd, tc->pathname, fhp, &mount_id,
> +			       tc->name_flags));
> +	if (TST_RET) {
> +		tst_res(TFAIL | TTERRNO, "name_to_handle_at() failed (%d)", n);
> +		goto out;
> +	}
> +
> +	TEST(fd = open_by_handle_at(*tc->dfd, fhp, tc->flags));
> +	if (fd < 0) {
> +		tst_res(TFAIL | TTERRNO, "open_by_handle_at() failed (%d)", n);
> +		goto out;
> +	}
> +
> +	SAFE_FSTAT(fd, &file_stat);
> +
> +	/* Don't check stats when pathname is empty */
> +	if (file_stat.st_size == 0 || !strlen(tc->pathname))
                                                ^
						This is the same as
						!tc->pathname[0]
> +		tst_res(TPASS, "name_to_handle_at() and open_by_handle_at() passed (%d)", n);
> +	else
> +		tst_res(TFAIL, "fstat() didn't work as expected (%d)", n);
> +
> +	SAFE_CLOSE(fd);
> +
> +out:
> +	free(fhp);
> +}
> +
> +static struct tst_test test = {
> +	.tcnt = ARRAY_SIZE(tcases),
> +	.test = run,
> +	.setup = setup,
> +	.cleanup = cleanup,
> +	.needs_tmpdir = 1,
> +	.needs_root = 1,
> +};
> diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
> new file mode 100644
> index 000000000000..2e97847a6996
> --- /dev/null
> +++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
> @@ -0,0 +1,79 @@
> +// SPDX-License-Identifier: GPL-2.0-or-later
> +/*
> + * Copyright (c) 2020 Viresh Kumar <viresh.kumar@linaro.org>
> + *
> + * name_to_handle_at() failure tests.
> + */
> +#define _GNU_SOURCE
> +#include <fcntl.h>
> +#include "lapi/syscalls.h"
> +#include "tst_test.h"
> +
> +#define TEST_FILE "test_file"
> +
> +static struct file_handle fh, high_fh = {.handle_bytes = MAX_HANDLE_SZ + 1};
> +static struct file_handle *valid_fhp = &fh, *invalid_fhp, *high_fhp = &high_fh;
> +static int mount_id, *valid_mount_id = &mount_id, *invalid_mount_id;
> +static const char *valid_path = TEST_FILE, *invalid_path, *empty_path = "";
> +
> +static struct tcase {
> +	const char *name;
> +	int dfd;
> +	const char **pathname;
> +	int flags;
> +	struct file_handle **fhp;
> +	int **mount_id;
> +	int exp_errno;
> +} tcases[] = {
> +	{"invalid-dfd", -1, &valid_path, 0, &valid_fhp, &valid_mount_id, EBADF},
> +	{"not a directory", 0, &valid_path, 0, &valid_fhp, &valid_mount_id, ENOTDIR},
> +	{"invalid-path", AT_FDCWD, &invalid_path, 0, &valid_fhp, &valid_mount_id, EFAULT},
> +	{"invalid-file-handle", AT_FDCWD, &valid_path, 0, &invalid_fhp, &valid_mount_id, EFAULT},
> +	{"zero-file-handle-size", AT_FDCWD, &valid_path, 0, &valid_fhp, &valid_mount_id, EOVERFLOW},
> +	{"high-file-handle-size", AT_FDCWD, &valid_path, 0, &high_fhp, &valid_mount_id, EINVAL},
> +	{"invalid-mount_id", AT_FDCWD, &valid_path, 0, &valid_fhp, &invalid_mount_id, EFAULT},
> +	{"invalid-flags", AT_FDCWD, &valid_path, -1, &valid_fhp, &valid_mount_id, EINVAL},
> +	{"empty-path", AT_FDCWD, &empty_path, 0, &valid_fhp, &valid_mount_id, ENOENT},
> +};
> +
> +static void setup(void)
> +{
> +	void *faulty_address;
> +
> +	SAFE_TOUCH(TEST_FILE, 0600, NULL);
> +	faulty_address = tst_get_bad_addr(NULL);
> +	invalid_fhp = faulty_address;
> +	invalid_mount_id = faulty_address;
> +	invalid_path = faulty_address;
> +}
> +
> +static void run(unsigned int n)
> +{
> +	struct tcase *tc = &tcases[n];
> +
> +	TEST(name_to_handle_at(tc->dfd, *tc->pathname, *tc->fhp, *tc->mount_id,
> +			       tc->flags));
> +
> +	if (TST_RET != -1) {
> +		tst_res(TFAIL, "%s: name_to_handle_at() passed unexpectedly",
> +			tc->name);
> +		return;
> +	}
> +
> +	if (tc->exp_errno != TST_ERR) {
> +		tst_res(TFAIL | TTERRNO,
> +			"%s: name_to_handle_at() should fail with %s", tc->name,
> +			tst_strerrno(tc->exp_errno));
> +		return;
> +	}
> +
> +	tst_res(TPASS | TTERRNO, "%s: name_to_handle_at() failed as expected",
> +		tc->name);
> +}
> +
> +static struct tst_test test = {
> +	.tcnt = ARRAY_SIZE(tcases),
> +	.test = run,
> +	.setup = setup,
> +	.needs_tmpdir = 1,
> +};
> diff --git a/testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c b/testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c
> new file mode 100644
> index 000000000000..e3c24790c1f8
> --- /dev/null
> +++ b/testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c
> @@ -0,0 +1,139 @@
> +// SPDX-License-Identifier: GPL-2.0-or-later
> +/*
> + * Copyright (c) 2020 Viresh Kumar <viresh.kumar@linaro.org>
> + *
> + * open_by_handle_at() failure tests.
> + */
> +#define _GNU_SOURCE
> +#include <linux/capability.h>
> +#include <fcntl.h>
> +#include <malloc.h>
> +#include "lapi/syscalls.h"
> +#include "tst_capability.h"
> +#include "tst_test.h"
> +
> +#define TEST_FILE "test_file"
> +#define FOO_SYMLINK "foo_symlink"
> +
> +static struct file_handle high_fh = {.handle_bytes = MAX_HANDLE_SZ + 1}, *high_fhp = &high_fh;
> +static struct file_handle zero_fh, *zero_fhp = &zero_fh;
> +static struct file_handle *valid_fhp, *invalid_fhp, *link_fhp;
> +
> +static struct tst_cap cap_req = TST_CAP(TST_CAP_REQ, CAP_DAC_READ_SEARCH);
> +static struct tst_cap cap_drop = TST_CAP(TST_CAP_DROP, CAP_DAC_READ_SEARCH);
> +
> +static struct tcase {
> +	const char *name;
> +	int dfd;
> +	struct file_handle **fhp;
> +	int flags;
> +	int cap;
> +	int exp_errno;
> +} tcases[] = {
> +	{"invalid-dfd", -1, &valid_fhp, O_RDWR, 0, EBADF},
> +	{"stale-dfd", 0, &valid_fhp, O_RDWR, 0, ESTALE},
> +	{"invalid-file-handle", AT_FDCWD, &invalid_fhp, O_RDWR, 0, EFAULT},
> +	{"high-file-handle-size", AT_FDCWD, &high_fhp, O_RDWR, 0, EINVAL},
> +	{"zero-file-handle-size", AT_FDCWD, &zero_fhp, O_RDWR, 0, EINVAL},
> +	{"no-capability", AT_FDCWD, &valid_fhp, O_RDWR, 1, EPERM},
> +	{"symlink", AT_FDCWD, &link_fhp, O_RDWR, 0, ELOOP},
> +};
> +
> +static void cleanup(void)
> +{
> +	free(valid_fhp);
> +	free(link_fhp);
> +}
> +
> +static void setup(void)
> +{
> +	struct file_handle fh = {0, }, *fhp;
> +	void *faulty_address;
> +	int mount_id;
> +
> +	SAFE_TOUCH(TEST_FILE, 0600, NULL);
> +	SAFE_SYMLINK(TEST_FILE, FOO_SYMLINK);
> +	faulty_address = tst_get_bad_addr(NULL);
> +	invalid_fhp = faulty_address;
> +
> +	/*
> +	 * Make an initial call to name_to_handle_at() to discover the size
> +	 * required for the file handle.
> +	 */
> +	TEST(name_to_handle_at(AT_FDCWD, TEST_FILE, &fh, &mount_id, 0));
> +	if (TST_RET != -1 || TST_ERR != EOVERFLOW) {
> +		tst_res(TFAIL | TTERRNO,
> +			"name_to_handle_at() should fail with %s",
> +			tst_strerrno(EOVERFLOW));
> +		return;
> +	}

Maybe there should be a function in a common header for this?

> +	/* Valid file handle */
> +	fhp = malloc(sizeof(*fhp) + fh.handle_bytes);
> +	if (!fhp) {
> +		tst_res(TFAIL, "Failed to allocate memory for fhp");
> +		return;
> +	}
> +	valid_fhp = fhp;

Here as well, can we use tst_alloc() for this?

> +	fhp->handle_type = fh.handle_type;
> +	fhp->handle_bytes = fh.handle_bytes;
> +
> +	TEST(name_to_handle_at(AT_FDCWD, TEST_FILE, fhp, &mount_id, 0));
> +	if (TST_RET)
> +		tst_res(TFAIL | TTERRNO, "name_to_handle_at() failed");
> +
> +	/* Symlink file handle */
> +	link_fhp = malloc(sizeof(*link_fhp) + fh.handle_bytes);
> +	if (!link_fhp) {
> +		tst_res(TFAIL, "Failed to allocate memory for fhp");
> +		return;
> +	}

And here as well, tst_alloc()?

> +	link_fhp->handle_type = fh.handle_type;
> +	link_fhp->handle_bytes = fh.handle_bytes;
> +
> +	TEST(name_to_handle_at(AT_FDCWD, FOO_SYMLINK, link_fhp, &mount_id, 0));
> +	if (TST_RET)
> +		tst_res(TFAIL | TTERRNO, "name_to_handle_at() failed");
> +}
> +
> +static void run(unsigned int n)
> +{
> +	struct tcase *tc = &tcases[n];
> +	int fd;
> +
> +	if (tc->cap)
> +		tst_cap_action(&cap_drop);
> +
> +	TEST(fd = open_by_handle_at(tc->dfd, *tc->fhp, tc->flags));
> +
> +	if (tc->cap)
> +		tst_cap_action(&cap_req);
> +
> +	if (TST_RET != -1) {
> +		SAFE_CLOSE(fd);
> +		tst_res(TFAIL, "%s: open_by_handle_at() passed unexpectedly",
> +			tc->name);
> +		return;
> +	}
> +
> +	if (tc->exp_errno != TST_ERR) {
> +		tst_res(TFAIL | TTERRNO,
> +			"%s: open_by_handle_at() should fail with %s", tc->name,
> +			tst_strerrno(tc->exp_errno));
> +		return;
> +	}
> +
> +	tst_res(TPASS | TTERRNO, "%s: open_by_handle_at() failed as expected",
> +		tc->name);
> +}
> +
> +static struct tst_test test = {
> +	.tcnt = ARRAY_SIZE(tcases),
> +	.test = run,
> +	.setup = setup,
> +	.cleanup = cleanup,
> +	.needs_tmpdir = 1,
> +	.needs_root = 1,
> +};
> -- 
> 2.25.0.rc1.19.g042ed3e048af
>
Viresh Kumar Nov. 23, 2020, 5:52 a.m. UTC | #2
On 20-11-20, 11:41, Cyril Hrubis wrote:
> We does not seem to use it in any way, I guess that we should add
> fallback definitions to a lapi header in the same way we do for example
> in lapi/setns.h so that these tests would compile on older libcs.

These syscalls were added long back in 2.6.38 and so I stayed away
from adding a header and userspace (where we care) must already have
the definitions. Should I add that header ?
Viresh Kumar Nov. 23, 2020, 8:36 a.m. UTC | #3
On 23-11-20, 11:22, Viresh Kumar wrote:
> On 20-11-20, 11:41, Cyril Hrubis wrote:
> > We does not seem to use it in any way, I guess that we should add
> > fallback definitions to a lapi header in the same way we do for example
> > in lapi/setns.h so that these tests would compile on older libcs.
> 
> These syscalls were added long back in 2.6.38 and so I stayed away
> from adding a header and userspace (where we care) must already have
> the definitions. Should I add that header ?

I have resent patches now, ignore this.
diff mbox series

Patch

diff --git a/configure.ac b/configure.ac
index 06be1c09417a..39ba301b855d 100644
--- a/configure.ac
+++ b/configure.ac
@@ -99,6 +99,7 @@  AC_CHECK_FUNCS_ONCE([ \
     modify_ldt \
     move_mount \
     name_to_handle_at \
+    open_by_handle_at \
     open_tree \
     openat \
     openat2 \
diff --git a/runtest/syscalls b/runtest/syscalls
index a5363277f478..aa33c1cb322f 100644
--- a/runtest/syscalls
+++ b/runtest/syscalls
@@ -846,6 +846,9 @@  nanosleep01 nanosleep01
 nanosleep02 nanosleep02
 nanosleep04 nanosleep04
 
+name_to_handle_at01 name_to_handle_at01
+name_to_handle_at02 name_to_handle_at02
+
 nftw01 nftw01
 nftw6401 nftw6401
 
@@ -879,6 +882,8 @@  openat201 openat201
 openat202 openat202
 openat203 openat203
 
+open_by_handle_at01 open_by_handle_at01
+
 open_tree01 open_tree01
 open_tree02 open_tree02
 
diff --git a/testcases/kernel/syscalls/name_to_handle_at/.gitignore b/testcases/kernel/syscalls/name_to_handle_at/.gitignore
new file mode 100644
index 000000000000..cefa82727253
--- /dev/null
+++ b/testcases/kernel/syscalls/name_to_handle_at/.gitignore
@@ -0,0 +1,3 @@ 
+name_to_handle_at01
+name_to_handle_at02
+open_by_handle_at01
diff --git a/testcases/kernel/syscalls/name_to_handle_at/Makefile b/testcases/kernel/syscalls/name_to_handle_at/Makefile
new file mode 100644
index 000000000000..18896b6f28c0
--- /dev/null
+++ b/testcases/kernel/syscalls/name_to_handle_at/Makefile
@@ -0,0 +1,7 @@ 
+# SPDX-License-Identifier: GPL-2.0-or-later
+
+top_srcdir		?= ../../../..
+
+include $(top_srcdir)/include/mk/testcases.mk
+
+include $(top_srcdir)/include/mk/generic_leaf_target.mk
diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
new file mode 100644
index 000000000000..36f22c003568
--- /dev/null
+++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
@@ -0,0 +1,131 @@ 
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright (c) 2020 Viresh Kumar <viresh.kumar@linaro.org>
+ *
+ * Basic name_to_handle_at() and open_by_handle_at() tests.
+ */
+#define _GNU_SOURCE
+#include <fcntl.h>
+#include <malloc.h>
+#include <sys/stat.h>
+#include "lapi/syscalls.h"
+#include "tst_test.h"
+
+#define TEST_FILE "test_file"
+#define TEST_DIR "test_dir"
+
+static int dir_fd, fd_atcwd = AT_FDCWD;
+
+static struct tcase {
+	int *dfd;
+	const char *pathname;
+	int name_flags;
+	int flags;
+} tcases[] = {
+	{&dir_fd, TEST_FILE, 0, O_RDWR},
+	{&dir_fd, TEST_FILE, 0, O_RDONLY},
+	{&dir_fd, TEST_FILE, 0, O_WRONLY},
+	{&dir_fd, TEST_FILE, AT_EMPTY_PATH, O_RDWR},
+	{&dir_fd, TEST_FILE, AT_EMPTY_PATH, O_RDONLY},
+	{&dir_fd, TEST_FILE, AT_EMPTY_PATH, O_WRONLY},
+	{&dir_fd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDWR},
+	{&dir_fd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDONLY},
+	{&dir_fd, TEST_FILE, AT_SYMLINK_FOLLOW, O_WRONLY},
+	{&dir_fd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDWR},
+	{&dir_fd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDONLY},
+	{&dir_fd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_WRONLY},
+	{&dir_fd, "", AT_EMPTY_PATH, O_RDONLY},
+
+	{&fd_atcwd, TEST_FILE, 0, O_RDWR},
+	{&fd_atcwd, TEST_FILE, 0, O_RDONLY},
+	{&fd_atcwd, TEST_FILE, 0, O_WRONLY},
+	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH, O_RDWR},
+	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH, O_RDONLY},
+	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH, O_WRONLY},
+	{&fd_atcwd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDWR},
+	{&fd_atcwd, TEST_FILE, AT_SYMLINK_FOLLOW, O_RDONLY},
+	{&fd_atcwd, TEST_FILE, AT_SYMLINK_FOLLOW, O_WRONLY},
+	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDWR},
+	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_RDONLY},
+	{&fd_atcwd, TEST_FILE, AT_EMPTY_PATH | AT_SYMLINK_FOLLOW, O_WRONLY},
+	{&fd_atcwd, "", AT_EMPTY_PATH, O_RDONLY},
+};
+
+static void cleanup(void)
+{
+	SAFE_CLOSE(dir_fd);
+}
+
+static void setup(void)
+{
+	SAFE_MKDIR(TEST_DIR, 0700);
+	dir_fd = SAFE_OPEN(TEST_DIR, O_DIRECTORY);
+	SAFE_CHDIR(TEST_DIR);
+	SAFE_TOUCH(TEST_FILE, 0600, NULL);
+}
+
+static void run(unsigned int n)
+{
+	struct tcase *tc = &tcases[n];
+	struct file_handle fh = {0, }, *fhp;
+	struct stat file_stat;
+	int fd, mount_id;
+
+	/*
+	 * Make an initial call to name_to_handle_at() to discover the size
+	 * required for the file handle.
+	 */
+	TEST(name_to_handle_at(*tc->dfd, tc->pathname, &fh, &mount_id,
+			       tc->name_flags));
+
+	if (TST_RET != -1 || TST_ERR != EOVERFLOW) {
+		tst_res(TFAIL | TTERRNO,
+			"name_to_handle_at() should fail with %s (%d)",
+			tst_strerrno(EOVERFLOW), n);
+		return;
+	}
+
+	fhp = malloc(sizeof(*fhp) + fh.handle_bytes);
+	if (!fhp) {
+		tst_res(TFAIL, "Failed to allocate memory for fhp (%d)", n);
+		return;
+	}
+
+	fhp->handle_type = fh.handle_type;
+	fhp->handle_bytes = fh.handle_bytes;
+
+	TEST(name_to_handle_at(*tc->dfd, tc->pathname, fhp, &mount_id,
+			       tc->name_flags));
+	if (TST_RET) {
+		tst_res(TFAIL | TTERRNO, "name_to_handle_at() failed (%d)", n);
+		goto out;
+	}
+
+	TEST(fd = open_by_handle_at(*tc->dfd, fhp, tc->flags));
+	if (fd < 0) {
+		tst_res(TFAIL | TTERRNO, "open_by_handle_at() failed (%d)", n);
+		goto out;
+	}
+
+	SAFE_FSTAT(fd, &file_stat);
+
+	/* Don't check stats when pathname is empty */
+	if (file_stat.st_size == 0 || !strlen(tc->pathname))
+		tst_res(TPASS, "name_to_handle_at() and open_by_handle_at() passed (%d)", n);
+	else
+		tst_res(TFAIL, "fstat() didn't work as expected (%d)", n);
+
+	SAFE_CLOSE(fd);
+
+out:
+	free(fhp);
+}
+
+static struct tst_test test = {
+	.tcnt = ARRAY_SIZE(tcases),
+	.test = run,
+	.setup = setup,
+	.cleanup = cleanup,
+	.needs_tmpdir = 1,
+	.needs_root = 1,
+};
diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
new file mode 100644
index 000000000000..2e97847a6996
--- /dev/null
+++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
@@ -0,0 +1,79 @@ 
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright (c) 2020 Viresh Kumar <viresh.kumar@linaro.org>
+ *
+ * name_to_handle_at() failure tests.
+ */
+#define _GNU_SOURCE
+#include <fcntl.h>
+#include "lapi/syscalls.h"
+#include "tst_test.h"
+
+#define TEST_FILE "test_file"
+
+static struct file_handle fh, high_fh = {.handle_bytes = MAX_HANDLE_SZ + 1};
+static struct file_handle *valid_fhp = &fh, *invalid_fhp, *high_fhp = &high_fh;
+static int mount_id, *valid_mount_id = &mount_id, *invalid_mount_id;
+static const char *valid_path = TEST_FILE, *invalid_path, *empty_path = "";
+
+static struct tcase {
+	const char *name;
+	int dfd;
+	const char **pathname;
+	int flags;
+	struct file_handle **fhp;
+	int **mount_id;
+	int exp_errno;
+} tcases[] = {
+	{"invalid-dfd", -1, &valid_path, 0, &valid_fhp, &valid_mount_id, EBADF},
+	{"not a directory", 0, &valid_path, 0, &valid_fhp, &valid_mount_id, ENOTDIR},
+	{"invalid-path", AT_FDCWD, &invalid_path, 0, &valid_fhp, &valid_mount_id, EFAULT},
+	{"invalid-file-handle", AT_FDCWD, &valid_path, 0, &invalid_fhp, &valid_mount_id, EFAULT},
+	{"zero-file-handle-size", AT_FDCWD, &valid_path, 0, &valid_fhp, &valid_mount_id, EOVERFLOW},
+	{"high-file-handle-size", AT_FDCWD, &valid_path, 0, &high_fhp, &valid_mount_id, EINVAL},
+	{"invalid-mount_id", AT_FDCWD, &valid_path, 0, &valid_fhp, &invalid_mount_id, EFAULT},
+	{"invalid-flags", AT_FDCWD, &valid_path, -1, &valid_fhp, &valid_mount_id, EINVAL},
+	{"empty-path", AT_FDCWD, &empty_path, 0, &valid_fhp, &valid_mount_id, ENOENT},
+};
+
+static void setup(void)
+{
+	void *faulty_address;
+
+	SAFE_TOUCH(TEST_FILE, 0600, NULL);
+	faulty_address = tst_get_bad_addr(NULL);
+	invalid_fhp = faulty_address;
+	invalid_mount_id = faulty_address;
+	invalid_path = faulty_address;
+}
+
+static void run(unsigned int n)
+{
+	struct tcase *tc = &tcases[n];
+
+	TEST(name_to_handle_at(tc->dfd, *tc->pathname, *tc->fhp, *tc->mount_id,
+			       tc->flags));
+
+	if (TST_RET != -1) {
+		tst_res(TFAIL, "%s: name_to_handle_at() passed unexpectedly",
+			tc->name);
+		return;
+	}
+
+	if (tc->exp_errno != TST_ERR) {
+		tst_res(TFAIL | TTERRNO,
+			"%s: name_to_handle_at() should fail with %s", tc->name,
+			tst_strerrno(tc->exp_errno));
+		return;
+	}
+
+	tst_res(TPASS | TTERRNO, "%s: name_to_handle_at() failed as expected",
+		tc->name);
+}
+
+static struct tst_test test = {
+	.tcnt = ARRAY_SIZE(tcases),
+	.test = run,
+	.setup = setup,
+	.needs_tmpdir = 1,
+};
diff --git a/testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c b/testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c
new file mode 100644
index 000000000000..e3c24790c1f8
--- /dev/null
+++ b/testcases/kernel/syscalls/name_to_handle_at/open_by_handle_at01.c
@@ -0,0 +1,139 @@ 
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright (c) 2020 Viresh Kumar <viresh.kumar@linaro.org>
+ *
+ * open_by_handle_at() failure tests.
+ */
+#define _GNU_SOURCE
+#include <linux/capability.h>
+#include <fcntl.h>
+#include <malloc.h>
+#include "lapi/syscalls.h"
+#include "tst_capability.h"
+#include "tst_test.h"
+
+#define TEST_FILE "test_file"
+#define FOO_SYMLINK "foo_symlink"
+
+static struct file_handle high_fh = {.handle_bytes = MAX_HANDLE_SZ + 1}, *high_fhp = &high_fh;
+static struct file_handle zero_fh, *zero_fhp = &zero_fh;
+static struct file_handle *valid_fhp, *invalid_fhp, *link_fhp;
+
+static struct tst_cap cap_req = TST_CAP(TST_CAP_REQ, CAP_DAC_READ_SEARCH);
+static struct tst_cap cap_drop = TST_CAP(TST_CAP_DROP, CAP_DAC_READ_SEARCH);
+
+static struct tcase {
+	const char *name;
+	int dfd;
+	struct file_handle **fhp;
+	int flags;
+	int cap;
+	int exp_errno;
+} tcases[] = {
+	{"invalid-dfd", -1, &valid_fhp, O_RDWR, 0, EBADF},
+	{"stale-dfd", 0, &valid_fhp, O_RDWR, 0, ESTALE},
+	{"invalid-file-handle", AT_FDCWD, &invalid_fhp, O_RDWR, 0, EFAULT},
+	{"high-file-handle-size", AT_FDCWD, &high_fhp, O_RDWR, 0, EINVAL},
+	{"zero-file-handle-size", AT_FDCWD, &zero_fhp, O_RDWR, 0, EINVAL},
+	{"no-capability", AT_FDCWD, &valid_fhp, O_RDWR, 1, EPERM},
+	{"symlink", AT_FDCWD, &link_fhp, O_RDWR, 0, ELOOP},
+};
+
+static void cleanup(void)
+{
+	free(valid_fhp);
+	free(link_fhp);
+}
+
+static void setup(void)
+{
+	struct file_handle fh = {0, }, *fhp;
+	void *faulty_address;
+	int mount_id;
+
+	SAFE_TOUCH(TEST_FILE, 0600, NULL);
+	SAFE_SYMLINK(TEST_FILE, FOO_SYMLINK);
+	faulty_address = tst_get_bad_addr(NULL);
+	invalid_fhp = faulty_address;
+
+	/*
+	 * Make an initial call to name_to_handle_at() to discover the size
+	 * required for the file handle.
+	 */
+	TEST(name_to_handle_at(AT_FDCWD, TEST_FILE, &fh, &mount_id, 0));
+	if (TST_RET != -1 || TST_ERR != EOVERFLOW) {
+		tst_res(TFAIL | TTERRNO,
+			"name_to_handle_at() should fail with %s",
+			tst_strerrno(EOVERFLOW));
+		return;
+	}
+
+	/* Valid file handle */
+	fhp = malloc(sizeof(*fhp) + fh.handle_bytes);
+	if (!fhp) {
+		tst_res(TFAIL, "Failed to allocate memory for fhp");
+		return;
+	}
+	valid_fhp = fhp;
+
+	fhp->handle_type = fh.handle_type;
+	fhp->handle_bytes = fh.handle_bytes;
+
+	TEST(name_to_handle_at(AT_FDCWD, TEST_FILE, fhp, &mount_id, 0));
+	if (TST_RET)
+		tst_res(TFAIL | TTERRNO, "name_to_handle_at() failed");
+
+	/* Symlink file handle */
+	link_fhp = malloc(sizeof(*link_fhp) + fh.handle_bytes);
+	if (!link_fhp) {
+		tst_res(TFAIL, "Failed to allocate memory for fhp");
+		return;
+	}
+
+	link_fhp->handle_type = fh.handle_type;
+	link_fhp->handle_bytes = fh.handle_bytes;
+
+	TEST(name_to_handle_at(AT_FDCWD, FOO_SYMLINK, link_fhp, &mount_id, 0));
+	if (TST_RET)
+		tst_res(TFAIL | TTERRNO, "name_to_handle_at() failed");
+}
+
+static void run(unsigned int n)
+{
+	struct tcase *tc = &tcases[n];
+	int fd;
+
+	if (tc->cap)
+		tst_cap_action(&cap_drop);
+
+	TEST(fd = open_by_handle_at(tc->dfd, *tc->fhp, tc->flags));
+
+	if (tc->cap)
+		tst_cap_action(&cap_req);
+
+	if (TST_RET != -1) {
+		SAFE_CLOSE(fd);
+		tst_res(TFAIL, "%s: open_by_handle_at() passed unexpectedly",
+			tc->name);
+		return;
+	}
+
+	if (tc->exp_errno != TST_ERR) {
+		tst_res(TFAIL | TTERRNO,
+			"%s: open_by_handle_at() should fail with %s", tc->name,
+			tst_strerrno(tc->exp_errno));
+		return;
+	}
+
+	tst_res(TPASS | TTERRNO, "%s: open_by_handle_at() failed as expected",
+		tc->name);
+}
+
+static struct tst_test test = {
+	.tcnt = ARRAY_SIZE(tcases),
+	.test = run,
+	.setup = setup,
+	.cleanup = cleanup,
+	.needs_tmpdir = 1,
+	.needs_root = 1,
+};