Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2198126/?format=api
{ "id": 2198126, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2198126/?format=api", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/1.0/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260219115530.2019498-9-vsementsov@yandex-team.ru>", "date": "2026-02-19T11:55:29", "name": "[v11,8/8] tests/functional: add test_tap_migration", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "0eb51038462ff77bc806a1c78e72b5e3b536333d", "submitter": { "id": 84116, "url": "http://patchwork.ozlabs.org/api/1.0/people/84116/?format=api", "name": "Vladimir Sementsov-Ogievskiy", "email": "vsementsov@yandex-team.ru" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260219115530.2019498-9-vsementsov@yandex-team.ru/mbox/", "series": [ { "id": 492667, "url": "http://patchwork.ozlabs.org/api/1.0/series/492667/?format=api", "date": "2026-02-19T11:55:27", "name": "virtio-net: live-TAP local migration", "version": 11, "mbox": "http://patchwork.ozlabs.org/series/492667/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2198126/checks/", "tags": {}, "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=yandex-team.ru header.i=@yandex-team.ru\n header.a=rsa-sha256 header.s=default header.b=lr8kfW6C;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)", "mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net;\n dkim=pass header.i=@yandex-team.ru" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fGsLx14Pgz1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 19 Feb 2026 22:57:29 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vt2dV-0004S2-3e; Thu, 19 Feb 2026 06:56:01 -0500", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <vsementsov@yandex-team.ru>)\n id 1vt2dH-0004OQ-63\n for qemu-devel@nongnu.org; Thu, 19 Feb 2026 06:55:47 -0500", "from forwardcorp1b.mail.yandex.net\n ([2a02:6b8:c02:900:1:45:d181:df01])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <vsementsov@yandex-team.ru>)\n id 1vt2dE-0006F4-Os\n for qemu-devel@nongnu.org; Thu, 19 Feb 2026 06:55:46 -0500", "from mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net\n (mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net\n [IPv6:2a02:6b8:c24:fa2:0:640:41ee:0])\n by forwardcorp1b.mail.yandex.net (Yandex) with ESMTPS id 1F6DC808BD;\n Thu, 19 Feb 2026 14:55:43 +0300 (MSK)", "from vsementsov-lin (unknown [2a02:6bf:8080:192::1:26])\n by mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net (smtpcorp/Yandex) with\n ESMTPSA id VtZwpM4A6uQ0-jhlTe4AL; Thu, 19 Feb 2026 14:55:42 +0300" ], "Precedence": "bulk", "X-Yandex-Fwd": "1", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru;\n s=default; t=1771502142;\n bh=bv+h0ky3kuHd26CI9BYW5NIpJ70FtkIctv7hzQb+hYs=;\n h=Message-ID:Date:In-Reply-To:Cc:Subject:References:To:From;\n b=lr8kfW6CMq8TyaNi9GTRHW0MVLGloRPnI4usDZPddtc1AhHBLVjMhi8VTeQDifbHc\n ffrjhUj7GzbKplMsTXTLyuo9O6Dgf3NprV6SpHSX8XMFNMftUFNcj05F4JGSfYpY3O\n t4paYyEVlEgXZw0mUqF6W4VIW+trsJTJzUp66x/Q=", "From": "Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>", "To": "jasowang@redhat.com,\n\tmst@redhat.com", "Cc": "thuth@redhat.com, armbru@redhat.com, eblake@redhat.com, farosas@suse.de,\n peterx@redhat.com, zhao1.liu@intel.com, wangyanan55@huawei.com,\n philmd@linaro.org, marcel.apfelbaum@gmail.com, eduardo@habkost.net,\n davydov-max@yandex-team.ru, qemu-devel@nongnu.org,\n vsementsov@yandex-team.ru, yc-core@yandex-team.ru, leiyang@redhat.com,\n raphael.s.norwitz@gmail.com, bchaney@akamai.com,\n Paolo Bonzini <pbonzini@redhat.com>", "Subject": "[PATCH v11 8/8] tests/functional: add test_tap_migration", "Date": "Thu, 19 Feb 2026 14:55:29 +0300", "Message-ID": "<20260219115530.2019498-9-vsementsov@yandex-team.ru>", "X-Mailer": "git-send-email 2.52.0", "In-Reply-To": "<20260219115530.2019498-1-vsementsov@yandex-team.ru>", "References": "<20260219115530.2019498-1-vsementsov@yandex-team.ru>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=2a02:6b8:c02:900:1:45:d181:df01;\n envelope-from=vsementsov@yandex-team.ru; helo=forwardcorp1b.mail.yandex.net", "X-Spam_score_int": "-20", "X-Spam_score": "-2.1", "X-Spam_bar": "--", "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Add test for a new local-migration migration of virtio-net/tap, with fd\npassing through UNIX socket.\n\nSigned-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>\n---\n tests/functional/x86_64/meson.build | 1 +\n tests/functional/x86_64/test_tap_migration.py | 401 ++++++++++++++++++\n 2 files changed, 402 insertions(+)\n create mode 100755 tests/functional/x86_64/test_tap_migration.py", "diff": "diff --git a/tests/functional/x86_64/meson.build b/tests/functional/x86_64/meson.build\nindex f78eec5e6c..d23b0cc727 100644\n--- a/tests/functional/x86_64/meson.build\n+++ b/tests/functional/x86_64/meson.build\n@@ -36,4 +36,5 @@ tests_x86_64_system_thorough = [\n 'vfio_user_client',\n 'virtio_balloon',\n 'virtio_gpu',\n+ 'tap_migration',\n ]\ndiff --git a/tests/functional/x86_64/test_tap_migration.py b/tests/functional/x86_64/test_tap_migration.py\nnew file mode 100755\nindex 0000000000..c629b44f66\n--- /dev/null\n+++ b/tests/functional/x86_64/test_tap_migration.py\n@@ -0,0 +1,401 @@\n+#!/usr/bin/env python3\n+#\n+# Functional test that tests TAP local migration\n+# with fd passing\n+#\n+# Copyright (c) Yandex Technologies LLC, 2026\n+#\n+# SPDX-License-Identifier: GPL-2.0-or-later\n+\n+import os\n+import time\n+import subprocess\n+from subprocess import run\n+import signal\n+from typing import Tuple\n+\n+from qemu_test import (\n+ LinuxKernelTest,\n+ Asset,\n+ exec_command_and_wait_for_pattern,\n+)\n+from qemu_test.decorators import skipWithoutSudo\n+\n+GUEST_IP = \"10.0.1.2\"\n+GUEST_IP_MASK = f\"{GUEST_IP}/24\"\n+GUEST_MAC = \"d6:0d:75:f8:0f:b7\"\n+HOST_IP = \"10.0.1.1\"\n+HOST_IP_MASK = f\"{HOST_IP}/24\"\n+TAP_ID = \"tap0\"\n+TAP_ID2 = \"tap1\"\n+TAP_MAC = \"e6:1d:44:b5:03:5d\"\n+\n+\n+def ip(args, check=True) -> None:\n+ \"\"\"Run ip command with sudo\"\"\"\n+ run([\"sudo\", \"ip\"] + args, check=check)\n+\n+\n+def del_tap(tap_name: str = TAP_ID) -> None:\n+ ip([\"tuntap\", \"del\", tap_name, \"mode\", \"tap\", \"multi_queue\"], check=False)\n+\n+\n+def init_tap(tap_name: str = TAP_ID, with_ip: bool = True) -> None:\n+ ip([\"tuntap\", \"add\", \"dev\", tap_name, \"mode\", \"tap\", \"multi_queue\"])\n+ if with_ip:\n+ ip([\"link\", \"set\", \"dev\", tap_name, \"address\", TAP_MAC])\n+ ip([\"addr\", \"add\", HOST_IP_MASK, \"dev\", tap_name])\n+ ip([\"link\", \"set\", tap_name, \"up\"])\n+\n+\n+def switch_network_to_tap2() -> None:\n+ ip([\"link\", \"set\", TAP_ID2, \"down\"])\n+ ip([\"link\", \"set\", TAP_ID, \"down\"])\n+ ip([\"addr\", \"delete\", HOST_IP_MASK, \"dev\", TAP_ID])\n+ ip([\"link\", \"set\", \"dev\", TAP_ID2, \"address\", TAP_MAC])\n+ ip([\"addr\", \"add\", HOST_IP_MASK, \"dev\", TAP_ID2])\n+ ip([\"link\", \"set\", TAP_ID2, \"up\"])\n+\n+\n+def parse_ping_line(line: str) -> float:\n+ # suspect lines like\n+ # [1748524876.590509] 64 bytes from 94.245.155.3 \\\n+ # (94.245.155.3): icmp_seq=1 ttl=250 time=101 ms\n+ spl = line.split()\n+ return float(spl[0][1:-1])\n+\n+\n+def parse_ping_output(out) -> Tuple[bool, float, float]:\n+ lines = [x for x in out.split(\"\\n\") if x.startswith(\"[\")]\n+\n+ try:\n+ first_no_ans = next(\n+ (ind for ind in range(len(lines)) if lines[ind][20:26] == \"no ans\")\n+ )\n+ except StopIteration:\n+ return False, parse_ping_line(lines[0]), parse_ping_line(lines[-1])\n+\n+ last_no_ans = next(\n+ ind\n+ for ind in range(len(lines) - 1, -1, -1)\n+ if lines[ind][20:26] == \"no ans\"\n+ )\n+\n+ return (\n+ True,\n+ parse_ping_line(lines[first_no_ans]),\n+ parse_ping_line(lines[last_no_ans]),\n+ )\n+\n+\n+def wait_migration_finish(source_vm, target_vm):\n+ migr_events = (\n+ (\"MIGRATION\", {\"data\": {\"status\": \"completed\"}}),\n+ (\"MIGRATION\", {\"data\": {\"status\": \"failed\"}}),\n+ )\n+\n+ source_e = source_vm.events_wait(migr_events)[\"data\"]\n+ target_e = target_vm.events_wait(migr_events)[\"data\"]\n+\n+ source_s = source_vm.cmd(\"query-status\")[\"status\"]\n+ target_s = target_vm.cmd(\"query-status\")[\"status\"]\n+\n+ assert (\n+ source_e[\"status\"] == \"completed\"\n+ and target_e[\"status\"] == \"completed\"\n+ and source_s == \"postmigrate\"\n+ and target_s == \"paused\"\n+ ), f\"\"\"Migration failed:\n+ SRC status: {source_s}\n+ SRC event: {source_e}\n+ TGT status: {target_s}\n+ TGT event:{target_e}\"\"\"\n+\n+\n+@skipWithoutSudo()\n+class TAPFdMigration(LinuxKernelTest):\n+\n+ ASSET_KERNEL = Asset(\n+ (\n+ \"https://archives.fedoraproject.org/pub/archive/fedora/linux/releases\"\n+ \"/31/Server/x86_64/os/images/pxeboot/vmlinuz\"\n+ ),\n+ \"d4738d03dbbe083ca610d0821d0a8f1488bebbdccef54ce33e3adb35fda00129\",\n+ )\n+\n+ ASSET_INITRD = Asset(\n+ (\n+ \"https://archives.fedoraproject.org/pub/archive/fedora/linux/releases\"\n+ \"/31/Server/x86_64/os/images/pxeboot/initrd.img\"\n+ ),\n+ \"277cd6c7adf77c7e63d73bbb2cded8ef9e2d3a2f100000e92ff1f8396513cd8b\",\n+ )\n+\n+ ASSET_ALPINE_ISO = Asset(\n+ (\n+ \"https://dl-cdn.alpinelinux.org/\"\n+ \"alpine/v3.22/releases/x86_64/alpine-standard-3.22.1-x86_64.iso\"\n+ ),\n+ \"96d1b44ea1b8a5a884f193526d92edb4676054e9fa903ad2f016441a0fe13089\",\n+ )\n+\n+ def setUp(self):\n+ super().setUp()\n+\n+ init_tap()\n+\n+ self.outer_ping_proc = None\n+ self.shm_path = None\n+\n+ def tearDown(self):\n+ try:\n+ del_tap(TAP_ID)\n+ del_tap(TAP_ID2)\n+\n+ if self.outer_ping_proc:\n+ self.stop_outer_ping()\n+\n+ if self.shm_path:\n+ os.unlink(self.shm_path)\n+ finally:\n+ super().tearDown()\n+\n+ def start_outer_ping(self) -> None:\n+ assert self.outer_ping_proc is None\n+ self.outer_ping_log = self.scratch_file(\"ping.log\")\n+ with open(self.outer_ping_log, \"w\") as f:\n+ self.outer_ping_proc = subprocess.Popen(\n+ [\"ping\", \"-i\", \"0\", \"-O\", \"-D\", GUEST_IP],\n+ text=True,\n+ stdout=f,\n+ )\n+\n+ def stop_outer_ping(self) -> str:\n+ assert self.outer_ping_proc\n+ self.outer_ping_proc.send_signal(signal.SIGINT)\n+\n+ self.outer_ping_proc.communicate(timeout=5)\n+ self.outer_ping_proc = None\n+\n+ with open(self.outer_ping_log) as f:\n+ return f.read()\n+\n+ def stop_ping_and_check(self, stop_time, resume_time):\n+ ping_res = self.stop_outer_ping()\n+\n+ discon, a, b = parse_ping_output(ping_res)\n+\n+ if not discon:\n+ text = (\n+ f\"STOP: {stop_time}, RESUME: {resume_time},\" f\"PING: {a} - {b}\"\n+ )\n+ if a > stop_time or b < resume_time:\n+ self.fail(f\"PING failed: {text}\")\n+ self.log.info(f\"PING: no packets lost: {text}\")\n+ return\n+\n+ text = (\n+ f\"STOP: {stop_time}, RESUME: {resume_time},\"\n+ f\"PING: disconnect: {a} - {b}\"\n+ )\n+ self.log.info(text)\n+ eps = 0.05\n+ if a < stop_time - eps or b > resume_time + eps:\n+ self.fail(text)\n+\n+ def one_ping_from_guest(self, vm) -> None:\n+ exec_command_and_wait_for_pattern(\n+ self,\n+ f\"ping -c 1 -W 1 {HOST_IP}\",\n+ \"1 packets transmitted, 1 packets received\",\n+ \"1 packets transmitted, 0 packets received\",\n+ vm=vm,\n+ )\n+ self.wait_for_console_pattern(\"# \", vm=vm)\n+\n+ def one_ping_from_host(self) -> None:\n+ run([\"ping\", \"-c\", \"1\", \"-W\", \"1\", GUEST_IP], stdout=subprocess.DEVNULL)\n+\n+ def setup_shared_memory(self):\n+ self.shm_path = f\"/dev/shm/qemu_test_{os.getpid()}\"\n+\n+ try:\n+ with open(self.shm_path, \"wb\") as f:\n+ f.write(b\"\\0\" * (1024 * 1024 * 1024)) # 1GB\n+ except Exception as e:\n+ self.fail(f\"Failed to create shared memory file: {e}\")\n+\n+ def prepare_and_launch_vm(\n+ self, shm_path, vhost, incoming=False, vm=None, local=True\n+ ):\n+ if not vm:\n+ vm = self.vm\n+\n+ vm.set_console()\n+ vm.add_args(\"-accel\", \"kvm\")\n+ vm.add_args(\"-device\", \"pcie-pci-bridge,id=pci.1,bus=pcie.0\")\n+ vm.add_args(\"-m\", \"1G\")\n+\n+ vm.add_args(\n+ \"-object\",\n+ f\"memory-backend-file,id=ram0,size=1G,mem-path={shm_path},share=on\",\n+ )\n+ vm.add_args(\"-machine\", \"memory-backend=ram0\")\n+\n+ vm.add_args(\n+ \"-drive\",\n+ f\"file={self.ASSET_ALPINE_ISO.fetch()},media=cdrom,format=raw\",\n+ )\n+\n+ vm.add_args(\"-S\")\n+\n+ if incoming:\n+ vm.add_args(\"-incoming\", \"defer\")\n+\n+ vm_s = \"target\" if incoming else \"source\"\n+ self.log.info(f\"Launching {vm_s} VM\")\n+ vm.launch()\n+\n+ if not local:\n+ tap_name = TAP_ID2 if incoming else TAP_ID\n+ else:\n+ tap_name = TAP_ID\n+\n+ self.add_virtio_net(vm, vhost, tap_name, local, incoming)\n+\n+ self.set_migration_capabilities(vm, local)\n+\n+ def add_virtio_net(self, vm, vhost: bool, tap_name: str,\n+ local: bool, incoming: bool):\n+ incoming_fds = local and incoming\n+ netdev_params = {\n+ \"id\": \"netdev.1\",\n+ \"vhost\": vhost,\n+ \"type\": \"tap\",\n+ \"ifname\": tap_name,\n+ \"queues\": 4,\n+ \"vnet_hdr\": True,\n+ \"incoming-fds\": incoming_fds,\n+ }\n+\n+ if not incoming_fds:\n+ netdev_params[\"script\"] = \"no\"\n+ netdev_params[\"downscript\"] = \"no\"\n+\n+ vm.cmd(\"netdev_add\", netdev_params)\n+\n+ vm.cmd(\n+ \"device_add\",\n+ driver=\"virtio-net-pci\",\n+ romfile=\"\",\n+ id=\"vnet.1\",\n+ netdev=\"netdev.1\",\n+ mq=True,\n+ vectors=18,\n+ bus=\"pci.1\",\n+ mac=GUEST_MAC,\n+ disable_legacy=\"off\",\n+ local_migration=local,\n+ )\n+\n+ def set_migration_capabilities(self, vm, local=True):\n+ vm.cmd(\"migrate-set-capabilities\", { \"capabilities\": [\n+ {\"capability\": \"events\", \"state\": True},\n+ {\"capability\": \"x-ignore-shared\", \"state\": True},\n+ ]})\n+ vm.cmd(\"migrate-set-parameters\", {\n+ \"local\": local\n+ })\n+\n+ def setup_guest_network(self) -> None:\n+ exec_command_and_wait_for_pattern(self, \"ip addr\", \"# \")\n+ exec_command_and_wait_for_pattern(\n+ self,\n+ f\"ip addr add {GUEST_IP_MASK} dev eth0 && \"\n+ \"ip link set eth0 up && echo OK\",\n+ \"OK\",\n+ )\n+ self.wait_for_console_pattern(\"# \")\n+\n+ def do_test_tap_fd_migration(self, vhost, local=True):\n+ self.require_accelerator(\"kvm\")\n+ self.set_machine(\"q35\")\n+\n+ socket_dir = self.socket_dir()\n+ migration_socket = os.path.join(socket_dir.name, \"migration.sock\")\n+\n+ self.setup_shared_memory()\n+\n+ # Setup second TAP if needed\n+ if not local:\n+ del_tap(TAP_ID2)\n+ init_tap(TAP_ID2, with_ip=False)\n+\n+ self.prepare_and_launch_vm(\n+ self.shm_path, vhost, local=local\n+ )\n+ self.vm.cmd(\"cont\")\n+ self.wait_for_console_pattern(\"login:\")\n+ exec_command_and_wait_for_pattern(self, \"root\", \"# \")\n+\n+ self.setup_guest_network()\n+\n+ self.one_ping_from_guest(self.vm)\n+ self.one_ping_from_host()\n+ self.start_outer_ping()\n+\n+ # Get some successful pings before migration\n+ time.sleep(0.5)\n+\n+ target_vm = self.get_vm(name=\"target\")\n+ self.prepare_and_launch_vm(\n+ self.shm_path,\n+ vhost,\n+ incoming=True,\n+ vm=target_vm,\n+ local=local,\n+ )\n+\n+ target_vm.cmd(\"migrate-incoming\", {\"uri\": f\"unix:{migration_socket}\"})\n+\n+ self.log.info(\"Starting migration\")\n+ freeze_start = time.time()\n+ self.vm.cmd(\"migrate\", {\"uri\": f\"unix:{migration_socket}\"})\n+\n+ self.log.info(\"Waiting for migration completion\")\n+ wait_migration_finish(self.vm, target_vm)\n+\n+ # Switch network to tap1 if not using local-migration\n+ if not local:\n+ switch_network_to_tap2()\n+\n+ target_vm.cmd(\"cont\")\n+ freeze_end = time.time()\n+\n+ self.vm.shutdown()\n+\n+ self.log.info(\"Verifying PING on target VM after migration\")\n+ self.one_ping_from_guest(target_vm)\n+ self.one_ping_from_host()\n+\n+ # And a bit more pings after source shutdown\n+ time.sleep(0.3)\n+ self.stop_ping_and_check(freeze_start, freeze_end)\n+\n+ target_vm.shutdown()\n+\n+ def test_tap_fd_migration(self):\n+ self.do_test_tap_fd_migration(False)\n+\n+ def test_tap_fd_migration_vhost(self):\n+ self.do_test_tap_fd_migration(True)\n+\n+ def test_tap_new_tap_migration(self):\n+ self.do_test_tap_fd_migration(False, local=False)\n+\n+ def test_tap_new_tap_migration_vhost(self):\n+ self.do_test_tap_fd_migration(True, local=False)\n+\n+\n+if __name__ == \"__main__\":\n+ LinuxKernelTest.main()\n", "prefixes": [ "v11", "8/8" ] }