make -C tools/testing/selftests TARGETS="drivers/net/hw" TEST_PROGS=nic_peerformance.py TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-22/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' TAP version 13 1..1 # overriding timeout to 360 # selftests: drivers/net/hw: nic_performance.py # Warning: file nic_performance.py is not executable # # Partner Interface name: eth1 # Traceback (most recent call last): # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 137, in # main() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 131, in main # link_config = LinkConfig(cfg) # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 20, in __init__ # self.common_link_modes = self.get_common_link_modes() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 171, in get_common_link_modes # partner_link_modes = self.get_ethtool_field("link-partner-advertised-link-modes") # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 221, in get_ethtool_field # raise KsftSkipEx(f'Field {field} does not exist in the output of interface {json_data["ifname"]}') # net.lib.py.ksft.KsftSkipEx: Field link-partner-advertised-link-modes does not exist in the output of interface eth0 not ok 1 selftests: drivers/net/hw: nic_performance.py # exit=1 make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make: Leaving directory '/home/virtme/testing-22/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800541be40 (size 176): comm "bash", pid 187, jiffies 4294805619 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 71148cfc): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 copy_creds+0x73/0x6b0 copy_process+0x6e0/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800596d6c0 (size 176): comm "make", pid 1066, jiffies 4294806424 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8360fe8f): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 copy_creds+0x73/0x6b0 copy_process+0x6e0/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone3+0x150/0x1a0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888001435098 (size 312): comm "sh", pid 1080, jiffies 4294806478 hex dump (first 32 bytes): 0c 80 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 ad b6 89 ff ff ff ff 00 00 00 00 00 00 00 00 `............... backtrace (crc aee11cc6): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 __lookup_slow+0x17f/0x3c0 walk_component+0x2ab/0x4f0 path_lookupat+0x120/0x660 filename_lookup+0x1c2/0x470 vfs_statx+0xac/0x150 vfs_fstatat+0x68/0xa0 __do_sys_newfstatat+0x75/0xd0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800a6d3e48 (size 1184): comm "sh", pid 1080, jiffies 4294806478 hex dump (first 32 bytes): c0 31 69 05 80 88 ff ff 00 00 00 00 5a 5a 5a 5a .1i.........ZZZZ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8f6e9cb2): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_pid_make_base_inode.constprop.0+0x19/0x160 proc_pid_instantiate+0x4a/0x1d0 proc_pid_lookup+0x180/0x3b0 proc_root_lookup+0x21/0x50 __lookup_slow+0x209/0x3c0 walk_component+0x2ab/0x4f0 path_lookupat+0x120/0x660 filename_lookup+0x1c2/0x470 vfs_statx+0xac/0x150 vfs_fstatat+0x68/0xa0 __do_sys_newfstatat+0x75/0xd0 unreferenced object 0xffff88800596cdc0 (size 176): comm "sh", pid 1080, jiffies 4294806489 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 25fae058): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 copy_creds+0x73/0x6b0 copy_process+0x6e0/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888005692ac0 (size 264): comm "sh", pid 1080, jiffies 4294806492 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 6b 6b 6b 6b ff ff ff ff ff ff ff ff ....kkkk........ backtrace (crc 183b55ee): kmem_cache_alloc_noprof+0x2ad/0x350 alloc_pid+0xad/0xfd0 copy_process+0x24b4/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800c267738 (size 312): comm "sh", pid 1086, jiffies 4294806779 hex dump (first 32 bytes): 0c 80 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 ad b6 89 ff ff ff ff 00 00 00 00 00 00 00 00 `............... backtrace (crc 47329cec): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 __lookup_slow+0x17f/0x3c0 walk_component+0x2ab/0x4f0 path_lookupat+0x120/0x660 filename_lookup+0x1c2/0x470 vfs_statx+0xac/0x150 vfs_fstatat+0x68/0xa0 __do_sys_newfstatat+0x75/0xd0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800a6d19f8 (size 1184): comm "sh", pid 1086, jiffies 4294806779 hex dump (first 32 bytes): c0 38 69 05 80 88 ff ff 00 00 00 00 5a 5a 5a 5a .8i.........ZZZZ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 67fd8012): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_pid_make_base_inode.constprop.0+0x19/0x160 proc_pid_instantiate+0x4a/0x1d0 proc_pid_lookup+0x180/0x3b0 proc_root_lookup+0x21/0x50 __lookup_slow+0x209/0x3c0 walk_component+0x2ab/0x4f0 path_lookupat+0x120/0x660 filename_lookup+0x1c2/0x470 vfs_statx+0xac/0x150 vfs_fstatat+0x68/0xa0 __do_sys_newfstatat+0x75/0xd0 unreferenced object 0xffff88800c30aba0 (size 312): comm "sh", pid 1086, jiffies 4294807190 hex dump (first 32 bytes): 0c 80 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 ad b6 89 ff ff ff ff 00 00 00 00 00 00 00 00 `............... backtrace (crc 2b9498bd): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 __lookup_slow+0x17f/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x416/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800a6d5838 (size 1184): comm "sh", pid 1086, jiffies 4294807190 hex dump (first 32 bytes): c0 38 69 05 80 88 ff ff 00 00 00 00 5a 5a 5a 5a .8i.........ZZZZ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 9a459d2f): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_pident_instantiate+0x83/0x310 proc_tgid_base_lookup+0x1a6/0x220 __lookup_slow+0x209/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x416/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800c30a850 (size 312): comm "sh", pid 1086, jiffies 4294807190 hex dump (first 32 bytes): 0c 81 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 ad b6 89 ff ff ff ff 00 00 00 00 00 00 00 00 `............... backtrace (crc e24b4975): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 lookup_open.isra.0+0x8fe/0x1350 open_last_lookups+0x697/0x1280 path_openat+0x169/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800a6d0538 (size 1184): comm "sh", pid 1086, jiffies 4294807190 hex dump (first 32 bytes): c0 38 69 05 80 88 ff ff 01 00 00 00 5a 5a 5a 5a .8i.........ZZZZ a0 4f 50 84 ff ff ff ff 00 00 00 00 00 00 00 00 .OP............. backtrace (crc b6d38c42): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_fd_instantiate+0x51/0x2a0 proc_lookupfd+0x103/0x1e0 lookup_open.isra.0+0x6da/0x1350 open_last_lookups+0x697/0x1280 path_openat+0x169/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888009653540 (size 176): comm "sh", pid 1120, jiffies 4294807391 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 9e079019): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 prepare_exec_creds+0x11/0x250 bprm_execve+0x5f/0x540 do_execveat_common.isra.0+0x3f5/0x550 __x64_sys_execve+0x8c/0xb0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f xx__->