From nobody Tue Apr 7 01:16:57 2026 Received: from mail-yw1-f173.google.com (mail-yw1-f173.google.com [209.85.128.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7937A221FB1 for ; Tue, 17 Mar 2026 00:56:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.173 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773708994; cv=none; b=GI5vnt1PK9aTNax0Q6WMiF43TX3pLc2mhLNHqwr2y0dhG8YaQoWHqKnl1FtOdP002JJ5gvRlzCwx2E2LMGRVJfOIe1JqIQ1ZEZRAj+Byuevl/Seb8cFiPf64ROfIHsi0SV8bg4fwGhp37T+uoYaN5TAM9ZTJ6VOeAg3kg+rzp58= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773708994; c=relaxed/simple; bh=E+Hkdk1Kp8RLA9oT2ob9i9NCZmTcydZQUzHPrJghpSk=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:To:Cc; b=TC8rWcVGje+PNMfj9pvPWEQmqfuIHH1ZXrDki5aUHSGPLwafZjyq1HfkFV2QXnybXAF2JhgDyBT3PWnOfvGdN1F906Ha2wFdUrXM7ro8Lv1vYbRjCLZsax8dJnJ10riz09WFSejvdFfHnT80NawyiUEsjuIjXwtSzvzmuQPnZG0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=iUHyUdss; arc=none smtp.client-ip=209.85.128.173 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="iUHyUdss" Received: by mail-yw1-f173.google.com with SMTP id 00721157ae682-79a610a32a6so6597017b3.0 for ; Mon, 16 Mar 2026 17:56:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1773708992; x=1774313792; darn=vger.kernel.org; h=cc:to:message-id:content-transfer-encoding:mime-version:subject :date:from:from:to:cc:subject:date:message-id:reply-to; bh=gH1hPDl0XJ4BmlVqeBDzahDvtQK5lSZzA+ixw3hKdOo=; b=iUHyUdssOTkyWIq/FbZGRhiA1FtiqvmM0kA7kSB4tUaog5csC3pJp6VbggNyKcmo0L u9tKJylVYw8cz6CUQhX0FDvywN3pCKOGOiagtbKBSX3+15MMc8BWfVwbaYgi2qHzbEvl zacKKPlFD5yv13pLXYbUjEB2tw+mwKKTl3D11YxlfxX9jgwdZPFOvxt3539ZUGyQugz2 NqA4TqPi0Wov3SujmVpCFK9WEEZHcfW7dLJnPjxByFGl5y1//eFhshDkFN9W096x6dsi H/vKeChON+AvkyhHO1OccfryCGg7cNmDWh7lf3J+QK/q56C2KqgafaT0kzCLAKGZtdN8 5kSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1773708992; x=1774313792; h=cc:to:message-id:content-transfer-encoding:mime-version:subject :date:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=gH1hPDl0XJ4BmlVqeBDzahDvtQK5lSZzA+ixw3hKdOo=; b=a5fp6ElQ23UcmsJM6JcWtH2FXt8fEWXKd7lI2FQrvoe7xTyrZZqGOuHCshtK/WY3YP C9BuHlzaTcAIM/ryhi9dhfe3RsK95D86YPZoCTyZ7n9jRz/MQ58+MLM44LwRd+LYdK/h fzMmPAwY3pKjUGKubkUtk3uhNKIFcv0wgvbijJ7LRLjC8QSL7NtpTS9FYZ+Ecak4jH4r bb2OWGC3ikqDBBIqlUtSgZquLq6ppKXj9QvnYJQ8z6/Z3B8FSjn78U7AXhYEq87DZUx6 q7anZhggfzUq0xtIzAmz3AiuJVrTI4TnEnJaco0rQ/9FATmsNLDMVHWcshLTC22qpZEm mk3Q== X-Forwarded-Encrypted: i=1; AJvYcCWWJuIgwr4c0QjkOYr5u6J4wcnOGMZr9d9KUvESq22VBK0NF+uuATfi+X7ULP30vVTZZp/JvKzk+cPZ+7k=@vger.kernel.org X-Gm-Message-State: AOJu0YzqwQ/tEP98/UNuna9zZuzEygYd+ZYuyTrgHNdQ2cdeqKbtVxV3 Y7YRKrHLvTRn4pMPplGbuC+GZPOrl5EQxo6aYQkiCXPZc6hYXz8Z+tA0 X-Gm-Gg: ATEYQzz/kjbt4xPlSVMJTyVtPQHkrTXN/p5qcZtom5eDbrwFJpJ3QgKADs9tAip/z1j 8PuKenVnpIVzRB/birU4JQiATVO6VPSJWX2OYgDmoW4OiuWMWL1HxTiQ+xJsfEekGu1BLlfqwWi e9FB8mvOL7WqHPJ2oWSvD+K6AYe3yDaTOs7GV+RcfTmoIyY6mcbyEhMTzRJG70bg65LQ9DCERog mJmcQjC5tNkqWv4qYA5CibcnoyCDkrwfgYrwCVhbdsrVolfuFTshbPvFWQpCVf7f8+y/oyyFKy2 3lQAe9aDgmbzALRUIjeb6v/6i9j5bRZhB+9nhUlTBRdsD/UxoxdO8ArVi67tWRSe90LfFwmHkdn oCNJqAAX5EZUeJYn1CpWfLEqFsZdSukYDxe/0MqW8hMxFejDmQ87AmZbRY5tKbyHTmzRxNsixS2 exel+HmxL1m/CxzHaqlbWlVw== X-Received: by 2002:a05:690c:6d83:b0:799:1f23:6e46 with SMTP id 00721157ae682-79a1c1888efmr154062187b3.33.1773708992420; Mon, 16 Mar 2026 17:56:32 -0700 (PDT) Received: from localhost ([2a03:2880:25ff:50::]) by smtp.gmail.com with ESMTPSA id 00721157ae682-79917deb69asm94638557b3.10.2026.03.16.17.56.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Mar 2026 17:56:31 -0700 (PDT) From: Bobby Eshleman Date: Mon, 16 Mar 2026 17:56:15 -0700 Subject: [PATCH net-next v2] selftests/vsock: auto-detect kernel for guest VMs Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20260316-vsock-vmtest-autodetect-kernel-v2-1-5eec7b4831f8@meta.com> X-B4-Tracking: v=1; b=H4sIAK+muGkC/43NSwqDMBAA0KuEWTslH1TqqvcoLtJkrMGalGQaL OLdC56g67d4OxTKgQoMYodMNZSQIgxCNwLcbOOTMHgYBGipO2mUwVqSW7CuTIXRfjh5YnKMC+V IL/S+u7bkje2VhEbAO9MUtjO4QyTGSBvD2AiYQ+GUv+dc1en/JlWhwl62zrQP7/qJbiuxvbi0w ngcxw9OGLB41QAAAA== X-Change-ID: 20260313-vsock-vmtest-autodetect-kernel-dd695ed3a710 To: Stefano Garzarella , Shuah Khan Cc: virtualization@lists.linux.dev, netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Jakub Kicinski , Bobby Eshleman X-Mailer: b4 0.14.3 From: Bobby Eshleman When running vmtest.sh inside a nested VM the running kernel may not be installed on the filesystem at the standard /boot/ or /usr/lib/modules/ paths. Previously, this would cause vng to fail with "does not exist" since it could not find the kernel image. Instead, this patch uses --dry-run to detect if the kernel is available. If not, then we fall back to the kernel in the kernel source tree. If that fails, then we die. This way runners, like NIPA, can use vng --run arch/x86/boot/bzImage to setup an outer VM, and vmtest.sh will still do the right thing setting up the inner VM. Due to job control issues in vng, a workaround is used to prevent 'make kselftest TARGETS=3Dvsock' from hanging until test timeout. A PR has been placed upstream to solve the issue in vng: https://github.com/arighi/virtme-ng/pull/453 Signed-off-by: Bobby Eshleman --- Changes in v2: - add setsid workaround for make kselftest TARGETS=3Dvsock - Link to v1: https://lore.kernel.org/r/20260313-vsock-vmtest-autodetect-ke= rnel-v1-1-705c35bdc7fe@meta.com --- tools/testing/selftests/vsock/vmtest.sh | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/tools/testing/selftests/vsock/vmtest.sh b/tools/testing/selfte= sts/vsock/vmtest.sh index 86e338886b33..9eacb753238a 100755 --- a/tools/testing/selftests/vsock/vmtest.sh +++ b/tools/testing/selftests/vsock/vmtest.sh @@ -415,6 +415,19 @@ terminate_pids() { done } =20 +vng_dry_run() { + # WORKAROUND: use setsid to work around a virtme-ng bug where vng hangs + # when called from a background process group (e.g., under make + # kselftest). vng save/restores terminal settings using tcsetattr(), + # which is not allowed for background process groups because the + # controlling terminal is owned by the foreground process group. vng is + # stopped with SIGTTOU and hangs until kselftest's timer expires. + # setsid works around this by launching vng in a new session that has + # no controlling terminal, so tcsetattr() succeeds. + + setsid -w vng --run "$@" --dry-run &>/dev/null +} + vm_start() { local pidfile=3D$1 local ns=3D$2 @@ -441,6 +454,12 @@ vm_start() { =20 if [[ "${BUILD}" -eq 1 ]]; then kernel_opt=3D"${KERNEL_CHECKOUT}" + elif vng_dry_run; then + kernel_opt=3D"" + elif vng_dry_run "${KERNEL_CHECKOUT}"; then + kernel_opt=3D"${KERNEL_CHECKOUT}" + else + die "No suitable kernel found" fi =20 if [[ "${ns}" !=3D "init_ns" ]]; then --- base-commit: 8f921f61005450589c0bc1a941a5ddde21d9aed9 change-id: 20260313-vsock-vmtest-autodetect-kernel-dd695ed3a710 Best regards, --=20 Bobby Eshleman