make -C tools/testing/selftests TARGETS="drivers/net/hw" TEST_PROGS=nic_peerformance.py TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-22/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' TAP version 13 1..1 # overriding timeout to 360 # selftests: drivers/net/hw: nic_performance.py # Warning: file nic_performance.py is not executable # # Partner Interface name: eth1 # Traceback (most recent call last): # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 137, in # main() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 131, in main # link_config = LinkConfig(cfg) # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 20, in __init__ # self.common_link_modes = self.get_common_link_modes() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 171, in get_common_link_modes # partner_link_modes = self.get_ethtool_field("link-partner-advertised-link-modes") # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 221, in get_ethtool_field # raise KsftSkipEx(f'Field {field} does not exist in the output of interface {json_data["ifname"]}') # net.lib.py.ksft.KsftSkipEx: Field link-partner-advertised-link-modes does not exist in the output of interface eth0 not ok 1 selftests: drivers/net/hw: nic_performance.py # exit=1 make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make: Leaving directory '/home/virtme/testing-22/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800ded0040 (size 8520): comm "sh", pid 1206, jiffies 4294799050 hex dump (first 32 bytes): 02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@.............. 00 00 00 00 01 00 00 00 80 00 00 00 00 00 00 00 ................ backtrace (crc 16f3bd20): kmem_cache_alloc_node_noprof+0x2b1/0x360 dup_task_struct+0x34/0x600 copy_process+0x356/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff8880026e0dc0 (size 1528): comm "sh", pid 1206, jiffies 4294799050 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ d0 0d 6e 02 80 88 ff ff d0 0d 6e 02 80 88 ff ff ..n.......n..... backtrace (crc e2858f6d): kmem_cache_alloc_noprof+0x2ad/0x350 copy_signal+0x2e/0x840 copy_process+0x1a3f/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888005204580 (size 264): comm "sh", pid 1206, jiffies 4294799054 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 6b 6b 6b 6b ff ff ff ff ff ff ff ff ....kkkk........ backtrace (crc 44f1bd98): kmem_cache_alloc_noprof+0x2ad/0x350 alloc_pid+0xad/0xfd0 copy_process+0x24b4/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888009a9c340 (size 176): comm "sh", pid 1208, jiffies 4294799055 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f9b35a74): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 prepare_exec_creds+0x11/0x250 bprm_execve+0x5f/0x540 do_execveat_common.isra.0+0x3f5/0x550 __x64_sys_execve+0x8c/0xb0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f xx__->