Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2225212/?format=api
{ "id": 2225212, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2225212/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260420161958.584407-9-vsementsov@yandex-team.ru/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/1.1/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260420161958.584407-9-vsementsov@yandex-team.ru>", "date": "2026-04-20T16:19:58", "name": "[v14,8/8] tests/functional: add test_tap_migration", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "62dd256aeabbbddb623ace2735c6160640c29bb2", "submitter": { "id": 84116, "url": "http://patchwork.ozlabs.org/api/1.1/people/84116/?format=api", "name": "Vladimir Sementsov-Ogievskiy", "email": "vsementsov@yandex-team.ru" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260420161958.584407-9-vsementsov@yandex-team.ru/mbox/", "series": [ { "id": 500626, "url": "http://patchwork.ozlabs.org/api/1.1/series/500626/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=500626", "date": "2026-04-20T16:19:57", "name": "virtio-net: live-TAP local migration", "version": 14, "mbox": "http://patchwork.ozlabs.org/series/500626/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2225212/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2225212/checks/", "tags": {}, "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=yandex-team.ru header.i=@yandex-team.ru\n header.a=rsa-sha256 header.s=default header.b=KbiG/exx;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)", "mail-nwsmtp-smtp-corp-main-68.klg.yp-c.yandex.net;\n dkim=pass header.i=@yandex-team.ru" ], "Received": [ "from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzrMm2lQWz1yHr\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 02:21:24 +1000 (AEST)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wErMH-0005fD-Q7; Mon, 20 Apr 2026 12:20:25 -0400", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <vsementsov@yandex-team.ru>)\n id 1wErMG-0005eo-4x\n for qemu-devel@nongnu.org; Mon, 20 Apr 2026 12:20:24 -0400", "from forwardcorp1d.mail.yandex.net ([178.154.239.200])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <vsementsov@yandex-team.ru>)\n id 1wErMD-0003IF-BN\n for qemu-devel@nongnu.org; Mon, 20 Apr 2026 12:20:23 -0400", "from mail-nwsmtp-smtp-corp-main-68.klg.yp-c.yandex.net\n (mail-nwsmtp-smtp-corp-main-68.klg.yp-c.yandex.net\n [IPv6:2a02:6b8:c42:94a9:0:640:a3fa:0])\n by forwardcorp1d.mail.yandex.net (Yandex) with ESMTPS id 053298074D;\n Mon, 20 Apr 2026 19:20:20 +0300 (MSK)", "from vsementsov-lin (unknown [2a02:6bf:8080:54b::1:34])\n by mail-nwsmtp-smtp-corp-main-68.klg.yp-c.yandex.net (smtpcorp) with ESMTPSA\n id 0KUTY10KuKo0-VcojL0Ye; Mon, 20 Apr 2026 19:20:18 +0300" ], "Precedence": "bulk", "X-Yandex-Fwd": "1", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru;\n s=default; t=1776702019;\n bh=6a9DQkeSjlDkNwesqOaWiTsuM7Nd1SYaBiw2MNxBDNY=;\n h=Message-ID:Date:In-Reply-To:Cc:Subject:References:To:From;\n b=KbiG/exxQP0SPHdrU4kt4pXjNyx8H5FkgZBMb/YIr6fy3fzhm7oXRnwicKpveQ0lA\n fDSl6T7zJDkkSkUKwn6kwukF19d7zJyX2fa/lkRB6PqEHjEcE4pLhbuojWmxVxAyr4\n /bcSFhHehhZeZ4rJQybX/wXdjWtKbhLlCc0rTe50=", "From": "Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>", "To": "jasowang@redhat.com,\n\tmst@redhat.com", "Cc": "armbru@redhat.com, peterx@redhat.com, farosas@suse.de,\n raphael.s.norwitz@gmail.com, bchaney@akamai.com, vsementsov@yandex-team.ru,\n qemu-devel@nongnu.org, berrange@redhat.com, pbonzini@redhat.com,\n yc-core@yandex-team.ru, Zhao Liu <zhao1.liu@intel.com>", "Subject": "[PATCH v14 8/8] tests/functional: add test_tap_migration", "Date": "Mon, 20 Apr 2026 19:19:58 +0300", "Message-ID": "<20260420161958.584407-9-vsementsov@yandex-team.ru>", "X-Mailer": "git-send-email 2.52.0", "In-Reply-To": "<20260420161958.584407-1-vsementsov@yandex-team.ru>", "References": "<20260420161958.584407-1-vsementsov@yandex-team.ru>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=178.154.239.200;\n envelope-from=vsementsov@yandex-team.ru; helo=forwardcorp1d.mail.yandex.net", "X-Spam_score_int": "-20", "X-Spam_score": "-2.1", "X-Spam_bar": "--", "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Add test for a new local-migration migration of virtio-net/tap, with fd\npassing through UNIX socket.\n\nSigned-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>\n---\n tests/functional/x86_64/meson.build | 1 +\n tests/functional/x86_64/test_tap_migration.py | 456 ++++++++++++++++++\n 2 files changed, 457 insertions(+)\n create mode 100755 tests/functional/x86_64/test_tap_migration.py", "diff": "diff --git a/tests/functional/x86_64/meson.build b/tests/functional/x86_64/meson.build\nindex 1ed10ad6c29..c4bb14f034b 100644\n--- a/tests/functional/x86_64/meson.build\n+++ b/tests/functional/x86_64/meson.build\n@@ -45,4 +45,5 @@ tests_x86_64_system_thorough = [\n 'virtio_balloon',\n 'virtio_gpu',\n 'rebuild_vmfd',\n+ 'tap_migration',\n ]\ndiff --git a/tests/functional/x86_64/test_tap_migration.py b/tests/functional/x86_64/test_tap_migration.py\nnew file mode 100755\nindex 00000000000..6c4edd4c787\n--- /dev/null\n+++ b/tests/functional/x86_64/test_tap_migration.py\n@@ -0,0 +1,456 @@\n+#!/usr/bin/env python3\n+#\n+# Functional test that tests TAP local migration\n+# with fd passing\n+#\n+# Copyright (c) Yandex Technologies LLC, 2026\n+#\n+# SPDX-License-Identifier: GPL-2.0-or-later\n+\n+import os\n+import time\n+import subprocess\n+from subprocess import run\n+import signal\n+import ctypes\n+import ctypes.util\n+import unittest\n+from contextlib import contextmanager, ExitStack\n+from typing import Tuple\n+\n+from qemu_test import (\n+ LinuxKernelTest,\n+ Asset,\n+ exec_command_and_wait_for_pattern,\n+)\n+from qemu_test.decorators import skipWithoutSudo\n+\n+\n+GUEST_IP = \"192.168.100.2\"\n+GUEST_IP_MASK = f\"{GUEST_IP}/24\"\n+GUEST_MAC = \"d6:0d:75:f8:0f:b7\"\n+HOST_IP = \"192.168.100.1\"\n+HOST_IP_MASK = f\"{HOST_IP}/24\"\n+TAP_ID = \"tap0\"\n+TAP_ID2 = \"tap1\"\n+TAP_MAC = \"e6:1d:44:b5:03:5d\"\n+NETNS = f\"qemu_test_ns_{os.getpid()}\"\n+\n+\n+def ip(args, check=True) -> None:\n+ \"\"\"Run ip command with sudo\"\"\"\n+ run([\"sudo\", \"ip\"] + args, check=check)\n+\n+\n+@contextmanager\n+def switch_netns(netns_name):\n+ libc = ctypes.CDLL(ctypes.util.find_library(\"c\"))\n+ netns_path = f\"/var/run/netns/{netns_name}\"\n+\n+ def switch_to_fd(fd, check: bool = False):\n+ \"\"\"Switch to netns by file descriptor\"\"\"\n+ SYS_setns = 308\n+ CLONE_NEWNET = 0x40000000\n+ ret = libc.syscall(SYS_setns, fd, CLONE_NEWNET)\n+ if check and ret != 0:\n+ raise RuntimeError(\"syscall SETNS failed\")\n+\n+ with ExitStack() as stack:\n+ original_netns_fd = os.open(\"/proc/self/ns/net\", os.O_RDONLY)\n+ stack.callback(os.close, original_netns_fd)\n+\n+ ip([\"netns\", \"add\", netns_name])\n+ stack.callback(ip, [\"netns\", \"del\", netns_name], check=False)\n+\n+ new_netns_fd = os.open(netns_path, os.O_RDONLY)\n+ stack.callback(os.close, new_netns_fd)\n+\n+ switch_to_fd(new_netns_fd)\n+ stack.callback(switch_to_fd, original_netns_fd, check=False)\n+\n+ yield\n+\n+\n+def del_tap(tap_name: str = TAP_ID) -> None:\n+ ip([\"tuntap\", \"del\", tap_name, \"mode\", \"tap\", \"multi_queue\"], check=False)\n+\n+\n+def init_tap(tap_name: str = TAP_ID, with_ip: bool = True) -> None:\n+ ip([\"tuntap\", \"add\", \"dev\", tap_name, \"mode\", \"tap\", \"multi_queue\"])\n+ if with_ip:\n+ ip([\"link\", \"set\", \"dev\", tap_name, \"address\", TAP_MAC])\n+ ip([\"addr\", \"add\", HOST_IP_MASK, \"dev\", tap_name])\n+ ip([\"link\", \"set\", tap_name, \"up\"])\n+\n+\n+def switch_network_to_tap2() -> None:\n+ ip([\"link\", \"set\", TAP_ID2, \"down\"])\n+ ip([\"link\", \"set\", TAP_ID, \"down\"])\n+ ip([\"addr\", \"delete\", HOST_IP_MASK, \"dev\", TAP_ID])\n+ ip([\"link\", \"set\", \"dev\", TAP_ID2, \"address\", TAP_MAC])\n+ ip([\"addr\", \"add\", HOST_IP_MASK, \"dev\", TAP_ID2])\n+ ip([\"link\", \"set\", TAP_ID2, \"up\"])\n+\n+\n+def parse_ping_line(line: str) -> float:\n+ # suspect lines like\n+ # [1748524876.590509] 64 bytes from 94.245.155.3 \\\n+ # (94.245.155.3): icmp_seq=1 ttl=250 time=101 ms\n+ spl = line.split()\n+ return float(spl[0][1:-1])\n+\n+\n+def parse_ping_output(out) -> Tuple[bool, float, float]:\n+ lines = [x for x in out.split(\"\\n\") if x.startswith(\"[\")]\n+\n+ try:\n+ first_no_ans = next(\n+ (ind for ind in range(len(lines)) if lines[ind][20:26] == \"no ans\")\n+ )\n+ except StopIteration:\n+ return False, parse_ping_line(lines[0]), parse_ping_line(lines[-1])\n+\n+ last_no_ans = next(\n+ ind\n+ for ind in range(len(lines) - 1, -1, -1)\n+ if lines[ind][20:26] == \"no ans\"\n+ )\n+\n+ return (\n+ True,\n+ parse_ping_line(lines[first_no_ans]),\n+ parse_ping_line(lines[last_no_ans]),\n+ )\n+\n+\n+def wait_migration_finish(source_vm, target_vm):\n+ migr_events = (\n+ (\"MIGRATION\", {\"data\": {\"status\": \"completed\"}}),\n+ (\"MIGRATION\", {\"data\": {\"status\": \"failed\"}}),\n+ )\n+\n+ source_e = source_vm.events_wait(migr_events)[\"data\"]\n+ target_e = target_vm.events_wait(migr_events)[\"data\"]\n+\n+ source_s = source_vm.cmd(\"query-status\")[\"status\"]\n+ target_s = target_vm.cmd(\"query-status\")[\"status\"]\n+\n+ assert (\n+ source_e[\"status\"] == \"completed\"\n+ and target_e[\"status\"] == \"completed\"\n+ and source_s == \"postmigrate\"\n+ and target_s == \"paused\"\n+ ), f\"\"\"Migration failed:\n+ SRC status: {source_s}\n+ SRC event: {source_e}\n+ TGT status: {target_s}\n+ TGT event:{target_e}\"\"\"\n+\n+\n+@skipWithoutSudo()\n+class TAPFdMigration(LinuxKernelTest):\n+\n+ ASSET_KERNEL = Asset(\n+ (\n+ \"https://archives.fedoraproject.org/pub/archive/fedora/linux/releases\"\n+ \"/31/Server/x86_64/os/images/pxeboot/vmlinuz\"\n+ ),\n+ \"d4738d03dbbe083ca610d0821d0a8f1488bebbdccef54ce33e3adb35fda00129\",\n+ )\n+\n+ ASSET_INITRD = Asset(\n+ (\n+ \"https://archives.fedoraproject.org/pub/archive/fedora/linux/releases\"\n+ \"/31/Server/x86_64/os/images/pxeboot/initrd.img\"\n+ ),\n+ \"277cd6c7adf77c7e63d73bbb2cded8ef9e2d3a2f100000e92ff1f8396513cd8b\",\n+ )\n+\n+ ASSET_ALPINE_ISO = Asset(\n+ (\n+ \"https://dl-cdn.alpinelinux.org/\"\n+ \"alpine/v3.22/releases/x86_64/alpine-standard-3.22.1-x86_64.iso\"\n+ ),\n+ \"96d1b44ea1b8a5a884f193526d92edb4676054e9fa903ad2f016441a0fe13089\",\n+ )\n+\n+ @classmethod\n+ def setUpClass(cls):\n+ super().setUpClass()\n+\n+ try:\n+ cls.netns_context = switch_netns(NETNS)\n+ cls.netns_context.__enter__()\n+ except (OSError, subprocess.CalledProcessError) as e:\n+ raise unittest.SkipTest(f\"can't switch network namespace: {e}\")\n+\n+ @classmethod\n+ def tearDownClass(cls):\n+ if hasattr(cls, \"netns_context\"):\n+ cls.netns_context.__exit__(None, None, None)\n+ super().tearDownClass()\n+\n+ def setUp(self):\n+ super().setUp()\n+\n+ init_tap()\n+\n+ self.outer_ping_proc = None\n+ self.shm_path = None\n+\n+ def tearDown(self):\n+ try:\n+ del_tap(TAP_ID)\n+ del_tap(TAP_ID2)\n+\n+ if self.outer_ping_proc:\n+ self.stop_outer_ping()\n+\n+ if self.shm_path:\n+ os.unlink(self.shm_path)\n+ finally:\n+ super().tearDown()\n+\n+ def start_outer_ping(self) -> None:\n+ assert self.outer_ping_proc is None\n+ self.outer_ping_log = self.scratch_file(\"ping.log\")\n+ with open(self.outer_ping_log, \"w\") as f:\n+ self.outer_ping_proc = subprocess.Popen(\n+ [\"ping\", \"-i\", \"0\", \"-O\", \"-D\", GUEST_IP],\n+ text=True,\n+ stdout=f,\n+ )\n+\n+ def stop_outer_ping(self) -> str:\n+ assert self.outer_ping_proc\n+ self.outer_ping_proc.send_signal(signal.SIGINT)\n+\n+ self.outer_ping_proc.communicate(timeout=5)\n+ self.outer_ping_proc = None\n+\n+ with open(self.outer_ping_log) as f:\n+ return f.read()\n+\n+ def stop_ping_and_check(self, stop_time, resume_time):\n+ ping_res = self.stop_outer_ping()\n+\n+ discon, a, b = parse_ping_output(ping_res)\n+\n+ if not discon:\n+ text = (\n+ f\"STOP: {stop_time}, RESUME: {resume_time},\" f\"PING: {a} - {b}\"\n+ )\n+ if a > stop_time or b < resume_time:\n+ self.fail(f\"PING failed: {text}\")\n+ self.log.info(f\"PING: no packets lost: {text}\")\n+ return\n+\n+ text = (\n+ f\"STOP: {stop_time}, RESUME: {resume_time},\"\n+ f\"PING: disconnect: {a} - {b}\"\n+ )\n+ self.log.info(text)\n+ eps = 0.05\n+ if a < stop_time - eps or b > resume_time + eps:\n+ self.fail(text)\n+\n+ def one_ping_from_guest(self, vm) -> None:\n+ exec_command_and_wait_for_pattern(\n+ self,\n+ f\"ping -c 1 -W 1 {HOST_IP}\",\n+ \"1 packets transmitted, 1 packets received\",\n+ \"1 packets transmitted, 0 packets received\",\n+ vm=vm,\n+ )\n+ self.wait_for_console_pattern(\"# \", vm=vm)\n+\n+ def one_ping_from_host(self) -> None:\n+ run(\n+ [\"ping\", \"-c\", \"1\", \"-W\", \"1\", GUEST_IP],\n+ stdout=subprocess.DEVNULL,\n+ check=True,\n+ )\n+\n+ def setup_shared_memory(self):\n+ self.shm_path = f\"/dev/shm/qemu_test_{os.getpid()}\"\n+\n+ try:\n+ with open(self.shm_path, \"wb\") as f:\n+ f.write(b\"\\0\" * (1024 * 1024 * 1024)) # 1GB\n+ except Exception as e:\n+ self.fail(f\"Failed to create shared memory file: {e}\")\n+\n+ def prepare_and_launch_vm(\n+ self, shm_path, vhost, incoming=False, vm=None, local=True\n+ ):\n+ if not vm:\n+ vm = self.vm\n+\n+ vm.set_console()\n+ vm.add_args(\"-accel\", \"kvm\")\n+ vm.add_args(\"-device\", \"pcie-pci-bridge,id=pci.1,bus=pcie.0\")\n+ vm.add_args(\"-m\", \"1G\")\n+\n+ vm.add_args(\n+ \"-object\",\n+ f\"memory-backend-file,id=ram0,size=1G,mem-path={shm_path},share=on\",\n+ )\n+ vm.add_args(\"-machine\", \"memory-backend=ram0\")\n+\n+ vm.add_args(\n+ \"-drive\",\n+ f\"file={self.ASSET_ALPINE_ISO.fetch()},media=cdrom,format=raw\",\n+ )\n+\n+ vm.add_args(\"-S\")\n+\n+ if incoming:\n+ vm.add_args(\"-incoming\", \"defer\")\n+\n+ vm_s = \"target\" if incoming else \"source\"\n+ self.log.info(f\"Launching {vm_s} VM\")\n+ vm.launch()\n+\n+ if not local:\n+ tap_name = TAP_ID2 if incoming else TAP_ID\n+ else:\n+ tap_name = TAP_ID\n+\n+ self.add_virtio_net(vm, vhost, tap_name, local, incoming)\n+\n+ self.set_migration_capabilities(vm, local)\n+\n+ def add_virtio_net(\n+ self, vm, vhost: bool, tap_name: str, local: bool, incoming: bool\n+ ):\n+ incoming_fds = local and incoming\n+ netdev_params = {\n+ \"id\": \"netdev.1\",\n+ \"vhost\": vhost,\n+ \"type\": \"tap\",\n+ \"ifname\": tap_name,\n+ \"queues\": 4,\n+ \"vnet_hdr\": True,\n+ \"incoming-fds\": incoming_fds,\n+ \"script\": \"no\",\n+ \"downscript\": \"no\",\n+ }\n+\n+ vm.cmd(\"netdev_add\", netdev_params)\n+\n+ vm.cmd(\n+ \"device_add\",\n+ driver=\"virtio-net-pci\",\n+ romfile=\"\",\n+ id=\"vnet.1\",\n+ netdev=\"netdev.1\",\n+ mq=True,\n+ vectors=18,\n+ bus=\"pci.1\",\n+ mac=GUEST_MAC,\n+ disable_legacy=\"off\",\n+ local_migration=local,\n+ )\n+\n+ def set_migration_capabilities(self, vm, local=True):\n+ vm.cmd(\n+ \"migrate-set-capabilities\",\n+ {\n+ \"capabilities\": [\n+ {\"capability\": \"events\", \"state\": True},\n+ {\"capability\": \"x-ignore-shared\", \"state\": True},\n+ ]\n+ },\n+ )\n+ vm.cmd(\"migrate-set-parameters\", {\"local\": local})\n+\n+ def setup_guest_network(self) -> None:\n+ exec_command_and_wait_for_pattern(self, \"ip addr\", \"# \")\n+ exec_command_and_wait_for_pattern(\n+ self,\n+ f\"ip addr add {GUEST_IP_MASK} dev eth0 && \"\n+ \"ip link set eth0 up && echo OK\",\n+ \"OK\",\n+ )\n+ self.wait_for_console_pattern(\"# \")\n+\n+ def do_test_tap_fd_migration(self, vhost, local=True):\n+ self.require_accelerator(\"kvm\")\n+ self.set_machine(\"q35\")\n+\n+ socket_dir = self.socket_dir()\n+ migration_socket = os.path.join(socket_dir.name, \"migration.sock\")\n+\n+ self.setup_shared_memory()\n+\n+ # Setup second TAP if needed\n+ if not local:\n+ del_tap(TAP_ID2)\n+ init_tap(TAP_ID2, with_ip=False)\n+\n+ self.prepare_and_launch_vm(self.shm_path, vhost, local=local)\n+ self.vm.cmd(\"cont\")\n+ self.wait_for_console_pattern(\"login:\")\n+ exec_command_and_wait_for_pattern(self, \"root\", \"# \")\n+\n+ self.setup_guest_network()\n+\n+ self.one_ping_from_guest(self.vm)\n+ self.one_ping_from_host()\n+ self.start_outer_ping()\n+\n+ # Get some successful pings before migration\n+ time.sleep(0.5)\n+\n+ target_vm = self.get_vm(name=\"target\")\n+ self.prepare_and_launch_vm(\n+ self.shm_path,\n+ vhost,\n+ incoming=True,\n+ vm=target_vm,\n+ local=local,\n+ )\n+\n+ target_vm.cmd(\"migrate-incoming\", {\"uri\": f\"unix:{migration_socket}\"})\n+\n+ self.log.info(\"Starting migration\")\n+ freeze_start = time.time()\n+ self.vm.cmd(\"migrate\", {\"uri\": f\"unix:{migration_socket}\"})\n+\n+ self.log.info(\"Waiting for migration completion\")\n+ wait_migration_finish(self.vm, target_vm)\n+\n+ # Switch network to tap1 if not using local-migration\n+ if not local:\n+ switch_network_to_tap2()\n+\n+ target_vm.cmd(\"cont\")\n+ freeze_end = time.time()\n+\n+ self.vm.shutdown()\n+\n+ self.log.info(\"Verifying PING on target VM after migration\")\n+ self.one_ping_from_guest(target_vm)\n+ self.one_ping_from_host()\n+\n+ # And a bit more pings after source shutdown\n+ time.sleep(0.3)\n+ self.stop_ping_and_check(freeze_start, freeze_end)\n+\n+ target_vm.shutdown()\n+\n+ def test_tap_fd_migration(self):\n+ self.do_test_tap_fd_migration(False)\n+\n+ def test_tap_fd_migration_vhost(self):\n+ self.do_test_tap_fd_migration(True)\n+\n+ def test_tap_new_tap_migration(self):\n+ self.do_test_tap_fd_migration(False, local=False)\n+\n+ def test_tap_new_tap_migration_vhost(self):\n+ self.do_test_tap_fd_migration(True, local=False)\n+\n+\n+if __name__ == \"__main__\":\n+ LinuxKernelTest.main()\n", "prefixes": [ "v14", "8/8" ] }