{"id":2198126,"url":"http://patchwork.ozlabs.org/api/1.0/patches/2198126/?format=json","project":{"id":14,"url":"http://patchwork.ozlabs.org/api/1.0/projects/14/?format=json","name":"QEMU Development","link_name":"qemu-devel","list_id":"qemu-devel.nongnu.org","list_email":"qemu-devel@nongnu.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<20260219115530.2019498-9-vsementsov@yandex-team.ru>","date":"2026-02-19T11:55:29","name":"[v11,8/8] tests/functional: add test_tap_migration","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"0eb51038462ff77bc806a1c78e72b5e3b536333d","submitter":{"id":84116,"url":"http://patchwork.ozlabs.org/api/1.0/people/84116/?format=json","name":"Vladimir Sementsov-Ogievskiy","email":"vsementsov@yandex-team.ru"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260219115530.2019498-9-vsementsov@yandex-team.ru/mbox/","series":[{"id":492667,"url":"http://patchwork.ozlabs.org/api/1.0/series/492667/?format=json","date":"2026-02-19T11:55:27","name":"virtio-net: live-TAP local migration","version":11,"mbox":"http://patchwork.ozlabs.org/series/492667/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2198126/checks/","tags":{},"headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=yandex-team.ru header.i=@yandex-team.ru\n header.a=rsa-sha256 header.s=default header.b=lr8kfW6C;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)","mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net;\n dkim=pass header.i=@yandex-team.ru"],"Received":["from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fGsLx14Pgz1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 19 Feb 2026 22:57:29 +1100 (AEDT)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vt2dV-0004S2-3e; Thu, 19 Feb 2026 06:56:01 -0500","from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <vsementsov@yandex-team.ru>)\n id 1vt2dH-0004OQ-63\n for qemu-devel@nongnu.org; Thu, 19 Feb 2026 06:55:47 -0500","from forwardcorp1b.mail.yandex.net\n ([2a02:6b8:c02:900:1:45:d181:df01])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <vsementsov@yandex-team.ru>)\n id 1vt2dE-0006F4-Os\n for qemu-devel@nongnu.org; Thu, 19 Feb 2026 06:55:46 -0500","from mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net\n (mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net\n [IPv6:2a02:6b8:c24:fa2:0:640:41ee:0])\n by forwardcorp1b.mail.yandex.net (Yandex) with ESMTPS id 1F6DC808BD;\n Thu, 19 Feb 2026 14:55:43 +0300 (MSK)","from vsementsov-lin (unknown [2a02:6bf:8080:192::1:26])\n by mail-nwsmtp-smtp-corp-main-34.sas.yp-c.yandex.net (smtpcorp/Yandex) with\n ESMTPSA id VtZwpM4A6uQ0-jhlTe4AL; Thu, 19 Feb 2026 14:55:42 +0300"],"Precedence":"bulk","X-Yandex-Fwd":"1","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru;\n s=default; t=1771502142;\n bh=bv+h0ky3kuHd26CI9BYW5NIpJ70FtkIctv7hzQb+hYs=;\n h=Message-ID:Date:In-Reply-To:Cc:Subject:References:To:From;\n b=lr8kfW6CMq8TyaNi9GTRHW0MVLGloRPnI4usDZPddtc1AhHBLVjMhi8VTeQDifbHc\n ffrjhUj7GzbKplMsTXTLyuo9O6Dgf3NprV6SpHSX8XMFNMftUFNcj05F4JGSfYpY3O\n t4paYyEVlEgXZw0mUqF6W4VIW+trsJTJzUp66x/Q=","From":"Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>","To":"jasowang@redhat.com,\n\tmst@redhat.com","Cc":"thuth@redhat.com, armbru@redhat.com, eblake@redhat.com, farosas@suse.de,\n peterx@redhat.com, zhao1.liu@intel.com, wangyanan55@huawei.com,\n philmd@linaro.org, marcel.apfelbaum@gmail.com, eduardo@habkost.net,\n davydov-max@yandex-team.ru, qemu-devel@nongnu.org,\n vsementsov@yandex-team.ru, yc-core@yandex-team.ru, leiyang@redhat.com,\n raphael.s.norwitz@gmail.com, bchaney@akamai.com,\n Paolo Bonzini <pbonzini@redhat.com>","Subject":"[PATCH v11 8/8] tests/functional: add test_tap_migration","Date":"Thu, 19 Feb 2026 14:55:29 +0300","Message-ID":"<20260219115530.2019498-9-vsementsov@yandex-team.ru>","X-Mailer":"git-send-email 2.52.0","In-Reply-To":"<20260219115530.2019498-1-vsementsov@yandex-team.ru>","References":"<20260219115530.2019498-1-vsementsov@yandex-team.ru>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=2a02:6b8:c02:900:1:45:d181:df01;\n envelope-from=vsementsov@yandex-team.ru; helo=forwardcorp1b.mail.yandex.net","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"},"content":"Add test for a new local-migration migration of virtio-net/tap, with fd\npassing through UNIX socket.\n\nSigned-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>\n---\n tests/functional/x86_64/meson.build           |   1 +\n tests/functional/x86_64/test_tap_migration.py | 401 ++++++++++++++++++\n 2 files changed, 402 insertions(+)\n create mode 100755 tests/functional/x86_64/test_tap_migration.py","diff":"diff --git a/tests/functional/x86_64/meson.build b/tests/functional/x86_64/meson.build\nindex f78eec5e6c..d23b0cc727 100644\n--- a/tests/functional/x86_64/meson.build\n+++ b/tests/functional/x86_64/meson.build\n@@ -36,4 +36,5 @@ tests_x86_64_system_thorough = [\n   'vfio_user_client',\n   'virtio_balloon',\n   'virtio_gpu',\n+  'tap_migration',\n ]\ndiff --git a/tests/functional/x86_64/test_tap_migration.py b/tests/functional/x86_64/test_tap_migration.py\nnew file mode 100755\nindex 0000000000..c629b44f66\n--- /dev/null\n+++ b/tests/functional/x86_64/test_tap_migration.py\n@@ -0,0 +1,401 @@\n+#!/usr/bin/env python3\n+#\n+# Functional test that tests TAP local migration\n+# with fd passing\n+#\n+# Copyright (c) Yandex Technologies LLC, 2026\n+#\n+# SPDX-License-Identifier: GPL-2.0-or-later\n+\n+import os\n+import time\n+import subprocess\n+from subprocess import run\n+import signal\n+from typing import Tuple\n+\n+from qemu_test import (\n+    LinuxKernelTest,\n+    Asset,\n+    exec_command_and_wait_for_pattern,\n+)\n+from qemu_test.decorators import skipWithoutSudo\n+\n+GUEST_IP = \"10.0.1.2\"\n+GUEST_IP_MASK = f\"{GUEST_IP}/24\"\n+GUEST_MAC = \"d6:0d:75:f8:0f:b7\"\n+HOST_IP = \"10.0.1.1\"\n+HOST_IP_MASK = f\"{HOST_IP}/24\"\n+TAP_ID = \"tap0\"\n+TAP_ID2 = \"tap1\"\n+TAP_MAC = \"e6:1d:44:b5:03:5d\"\n+\n+\n+def ip(args, check=True) -> None:\n+    \"\"\"Run ip command with sudo\"\"\"\n+    run([\"sudo\", \"ip\"] + args, check=check)\n+\n+\n+def del_tap(tap_name: str = TAP_ID) -> None:\n+    ip([\"tuntap\", \"del\", tap_name, \"mode\", \"tap\", \"multi_queue\"], check=False)\n+\n+\n+def init_tap(tap_name: str = TAP_ID, with_ip: bool = True) -> None:\n+    ip([\"tuntap\", \"add\", \"dev\", tap_name, \"mode\", \"tap\", \"multi_queue\"])\n+    if with_ip:\n+        ip([\"link\", \"set\", \"dev\", tap_name, \"address\", TAP_MAC])\n+        ip([\"addr\", \"add\", HOST_IP_MASK, \"dev\", tap_name])\n+    ip([\"link\", \"set\", tap_name, \"up\"])\n+\n+\n+def switch_network_to_tap2() -> None:\n+    ip([\"link\", \"set\", TAP_ID2, \"down\"])\n+    ip([\"link\", \"set\", TAP_ID, \"down\"])\n+    ip([\"addr\", \"delete\", HOST_IP_MASK, \"dev\", TAP_ID])\n+    ip([\"link\", \"set\", \"dev\", TAP_ID2, \"address\", TAP_MAC])\n+    ip([\"addr\", \"add\", HOST_IP_MASK, \"dev\", TAP_ID2])\n+    ip([\"link\", \"set\", TAP_ID2, \"up\"])\n+\n+\n+def parse_ping_line(line: str) -> float:\n+    # suspect lines like\n+    # [1748524876.590509] 64 bytes from 94.245.155.3 \\\n+    #      (94.245.155.3): icmp_seq=1 ttl=250 time=101 ms\n+    spl = line.split()\n+    return float(spl[0][1:-1])\n+\n+\n+def parse_ping_output(out) -> Tuple[bool, float, float]:\n+    lines = [x for x in out.split(\"\\n\") if x.startswith(\"[\")]\n+\n+    try:\n+        first_no_ans = next(\n+            (ind for ind in range(len(lines)) if lines[ind][20:26] == \"no ans\")\n+        )\n+    except StopIteration:\n+        return False, parse_ping_line(lines[0]), parse_ping_line(lines[-1])\n+\n+    last_no_ans = next(\n+        ind\n+        for ind in range(len(lines) - 1, -1, -1)\n+        if lines[ind][20:26] == \"no ans\"\n+    )\n+\n+    return (\n+        True,\n+        parse_ping_line(lines[first_no_ans]),\n+        parse_ping_line(lines[last_no_ans]),\n+    )\n+\n+\n+def wait_migration_finish(source_vm, target_vm):\n+    migr_events = (\n+        (\"MIGRATION\", {\"data\": {\"status\": \"completed\"}}),\n+        (\"MIGRATION\", {\"data\": {\"status\": \"failed\"}}),\n+    )\n+\n+    source_e = source_vm.events_wait(migr_events)[\"data\"]\n+    target_e = target_vm.events_wait(migr_events)[\"data\"]\n+\n+    source_s = source_vm.cmd(\"query-status\")[\"status\"]\n+    target_s = target_vm.cmd(\"query-status\")[\"status\"]\n+\n+    assert (\n+        source_e[\"status\"] == \"completed\"\n+        and target_e[\"status\"] == \"completed\"\n+        and source_s == \"postmigrate\"\n+        and target_s == \"paused\"\n+    ), f\"\"\"Migration failed:\n+    SRC status: {source_s}\n+    SRC event: {source_e}\n+    TGT status: {target_s}\n+    TGT event:{target_e}\"\"\"\n+\n+\n+@skipWithoutSudo()\n+class TAPFdMigration(LinuxKernelTest):\n+\n+    ASSET_KERNEL = Asset(\n+        (\n+            \"https://archives.fedoraproject.org/pub/archive/fedora/linux/releases\"\n+            \"/31/Server/x86_64/os/images/pxeboot/vmlinuz\"\n+        ),\n+        \"d4738d03dbbe083ca610d0821d0a8f1488bebbdccef54ce33e3adb35fda00129\",\n+    )\n+\n+    ASSET_INITRD = Asset(\n+        (\n+            \"https://archives.fedoraproject.org/pub/archive/fedora/linux/releases\"\n+            \"/31/Server/x86_64/os/images/pxeboot/initrd.img\"\n+        ),\n+        \"277cd6c7adf77c7e63d73bbb2cded8ef9e2d3a2f100000e92ff1f8396513cd8b\",\n+    )\n+\n+    ASSET_ALPINE_ISO = Asset(\n+        (\n+            \"https://dl-cdn.alpinelinux.org/\"\n+            \"alpine/v3.22/releases/x86_64/alpine-standard-3.22.1-x86_64.iso\"\n+        ),\n+        \"96d1b44ea1b8a5a884f193526d92edb4676054e9fa903ad2f016441a0fe13089\",\n+    )\n+\n+    def setUp(self):\n+        super().setUp()\n+\n+        init_tap()\n+\n+        self.outer_ping_proc = None\n+        self.shm_path = None\n+\n+    def tearDown(self):\n+        try:\n+            del_tap(TAP_ID)\n+            del_tap(TAP_ID2)\n+\n+            if self.outer_ping_proc:\n+                self.stop_outer_ping()\n+\n+            if self.shm_path:\n+                os.unlink(self.shm_path)\n+        finally:\n+            super().tearDown()\n+\n+    def start_outer_ping(self) -> None:\n+        assert self.outer_ping_proc is None\n+        self.outer_ping_log = self.scratch_file(\"ping.log\")\n+        with open(self.outer_ping_log, \"w\") as f:\n+            self.outer_ping_proc = subprocess.Popen(\n+                [\"ping\", \"-i\", \"0\", \"-O\", \"-D\", GUEST_IP],\n+                text=True,\n+                stdout=f,\n+            )\n+\n+    def stop_outer_ping(self) -> str:\n+        assert self.outer_ping_proc\n+        self.outer_ping_proc.send_signal(signal.SIGINT)\n+\n+        self.outer_ping_proc.communicate(timeout=5)\n+        self.outer_ping_proc = None\n+\n+        with open(self.outer_ping_log) as f:\n+            return f.read()\n+\n+    def stop_ping_and_check(self, stop_time, resume_time):\n+        ping_res = self.stop_outer_ping()\n+\n+        discon, a, b = parse_ping_output(ping_res)\n+\n+        if not discon:\n+            text = (\n+                f\"STOP: {stop_time}, RESUME: {resume_time},\" f\"PING: {a} - {b}\"\n+            )\n+            if a > stop_time or b < resume_time:\n+                self.fail(f\"PING failed: {text}\")\n+            self.log.info(f\"PING: no packets lost: {text}\")\n+            return\n+\n+        text = (\n+            f\"STOP: {stop_time}, RESUME: {resume_time},\"\n+            f\"PING: disconnect: {a} - {b}\"\n+        )\n+        self.log.info(text)\n+        eps = 0.05\n+        if a < stop_time - eps or b > resume_time + eps:\n+            self.fail(text)\n+\n+    def one_ping_from_guest(self, vm) -> None:\n+        exec_command_and_wait_for_pattern(\n+            self,\n+            f\"ping -c 1 -W 1 {HOST_IP}\",\n+            \"1 packets transmitted, 1 packets received\",\n+            \"1 packets transmitted, 0 packets received\",\n+            vm=vm,\n+        )\n+        self.wait_for_console_pattern(\"# \", vm=vm)\n+\n+    def one_ping_from_host(self) -> None:\n+        run([\"ping\", \"-c\", \"1\", \"-W\", \"1\", GUEST_IP], stdout=subprocess.DEVNULL)\n+\n+    def setup_shared_memory(self):\n+        self.shm_path = f\"/dev/shm/qemu_test_{os.getpid()}\"\n+\n+        try:\n+            with open(self.shm_path, \"wb\") as f:\n+                f.write(b\"\\0\" * (1024 * 1024 * 1024))  # 1GB\n+        except Exception as e:\n+            self.fail(f\"Failed to create shared memory file: {e}\")\n+\n+    def prepare_and_launch_vm(\n+        self, shm_path, vhost, incoming=False, vm=None, local=True\n+    ):\n+        if not vm:\n+            vm = self.vm\n+\n+        vm.set_console()\n+        vm.add_args(\"-accel\", \"kvm\")\n+        vm.add_args(\"-device\", \"pcie-pci-bridge,id=pci.1,bus=pcie.0\")\n+        vm.add_args(\"-m\", \"1G\")\n+\n+        vm.add_args(\n+            \"-object\",\n+            f\"memory-backend-file,id=ram0,size=1G,mem-path={shm_path},share=on\",\n+        )\n+        vm.add_args(\"-machine\", \"memory-backend=ram0\")\n+\n+        vm.add_args(\n+            \"-drive\",\n+            f\"file={self.ASSET_ALPINE_ISO.fetch()},media=cdrom,format=raw\",\n+        )\n+\n+        vm.add_args(\"-S\")\n+\n+        if incoming:\n+            vm.add_args(\"-incoming\", \"defer\")\n+\n+        vm_s = \"target\" if incoming else \"source\"\n+        self.log.info(f\"Launching {vm_s} VM\")\n+        vm.launch()\n+\n+        if not local:\n+            tap_name = TAP_ID2 if incoming else TAP_ID\n+        else:\n+            tap_name = TAP_ID\n+\n+        self.add_virtio_net(vm, vhost, tap_name, local, incoming)\n+\n+        self.set_migration_capabilities(vm, local)\n+\n+    def add_virtio_net(self, vm, vhost: bool, tap_name: str,\n+                       local: bool, incoming: bool):\n+        incoming_fds = local and incoming\n+        netdev_params = {\n+            \"id\": \"netdev.1\",\n+            \"vhost\": vhost,\n+            \"type\": \"tap\",\n+            \"ifname\": tap_name,\n+            \"queues\": 4,\n+            \"vnet_hdr\": True,\n+            \"incoming-fds\": incoming_fds,\n+        }\n+\n+        if not incoming_fds:\n+            netdev_params[\"script\"] = \"no\"\n+            netdev_params[\"downscript\"] = \"no\"\n+\n+        vm.cmd(\"netdev_add\", netdev_params)\n+\n+        vm.cmd(\n+            \"device_add\",\n+            driver=\"virtio-net-pci\",\n+            romfile=\"\",\n+            id=\"vnet.1\",\n+            netdev=\"netdev.1\",\n+            mq=True,\n+            vectors=18,\n+            bus=\"pci.1\",\n+            mac=GUEST_MAC,\n+            disable_legacy=\"off\",\n+            local_migration=local,\n+        )\n+\n+    def set_migration_capabilities(self, vm, local=True):\n+        vm.cmd(\"migrate-set-capabilities\", { \"capabilities\": [\n+            {\"capability\": \"events\", \"state\": True},\n+            {\"capability\": \"x-ignore-shared\", \"state\": True},\n+        ]})\n+        vm.cmd(\"migrate-set-parameters\", {\n+            \"local\": local\n+        })\n+\n+    def setup_guest_network(self) -> None:\n+        exec_command_and_wait_for_pattern(self, \"ip addr\", \"# \")\n+        exec_command_and_wait_for_pattern(\n+            self,\n+            f\"ip addr add {GUEST_IP_MASK} dev eth0 && \"\n+            \"ip link set eth0 up && echo OK\",\n+            \"OK\",\n+        )\n+        self.wait_for_console_pattern(\"# \")\n+\n+    def do_test_tap_fd_migration(self, vhost, local=True):\n+        self.require_accelerator(\"kvm\")\n+        self.set_machine(\"q35\")\n+\n+        socket_dir = self.socket_dir()\n+        migration_socket = os.path.join(socket_dir.name, \"migration.sock\")\n+\n+        self.setup_shared_memory()\n+\n+        # Setup second TAP if needed\n+        if not local:\n+            del_tap(TAP_ID2)\n+            init_tap(TAP_ID2, with_ip=False)\n+\n+        self.prepare_and_launch_vm(\n+            self.shm_path, vhost, local=local\n+        )\n+        self.vm.cmd(\"cont\")\n+        self.wait_for_console_pattern(\"login:\")\n+        exec_command_and_wait_for_pattern(self, \"root\", \"# \")\n+\n+        self.setup_guest_network()\n+\n+        self.one_ping_from_guest(self.vm)\n+        self.one_ping_from_host()\n+        self.start_outer_ping()\n+\n+        # Get some successful pings before migration\n+        time.sleep(0.5)\n+\n+        target_vm = self.get_vm(name=\"target\")\n+        self.prepare_and_launch_vm(\n+            self.shm_path,\n+            vhost,\n+            incoming=True,\n+            vm=target_vm,\n+            local=local,\n+        )\n+\n+        target_vm.cmd(\"migrate-incoming\", {\"uri\": f\"unix:{migration_socket}\"})\n+\n+        self.log.info(\"Starting migration\")\n+        freeze_start = time.time()\n+        self.vm.cmd(\"migrate\", {\"uri\": f\"unix:{migration_socket}\"})\n+\n+        self.log.info(\"Waiting for migration completion\")\n+        wait_migration_finish(self.vm, target_vm)\n+\n+        # Switch network to tap1 if not using local-migration\n+        if not local:\n+            switch_network_to_tap2()\n+\n+        target_vm.cmd(\"cont\")\n+        freeze_end = time.time()\n+\n+        self.vm.shutdown()\n+\n+        self.log.info(\"Verifying PING on target VM after migration\")\n+        self.one_ping_from_guest(target_vm)\n+        self.one_ping_from_host()\n+\n+        # And a bit more pings after source shutdown\n+        time.sleep(0.3)\n+        self.stop_ping_and_check(freeze_start, freeze_end)\n+\n+        target_vm.shutdown()\n+\n+    def test_tap_fd_migration(self):\n+        self.do_test_tap_fd_migration(False)\n+\n+    def test_tap_fd_migration_vhost(self):\n+        self.do_test_tap_fd_migration(True)\n+\n+    def test_tap_new_tap_migration(self):\n+        self.do_test_tap_fd_migration(False, local=False)\n+\n+    def test_tap_new_tap_migration_vhost(self):\n+        self.do_test_tap_fd_migration(True, local=False)\n+\n+\n+if __name__ == \"__main__\":\n+    LinuxKernelTest.main()\n","prefixes":["v11","8/8"]}