make -C tools/testing/selftests TARGETS="drivers/net/hw" TEST_PROGS=nic_peerformance.py TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-22/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' TAP version 13 1..1 # overriding timeout to 360 # selftests: drivers/net/hw: nic_performance.py # Warning: file nic_performance.py is not executable # # Partner Interface name: eth1 # Traceback (most recent call last): # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 137, in # main() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 131, in main # link_config = LinkConfig(cfg) # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 20, in __init__ # self.common_link_modes = self.get_common_link_modes() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 171, in get_common_link_modes # partner_link_modes = self.get_ethtool_field("link-partner-advertised-link-modes") # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 221, in get_ethtool_field # raise KsftSkipEx(f'Field {field} does not exist in the output of interface {json_data["ifname"]}') # net.lib.py.ksft.KsftSkipEx: Field link-partner-advertised-link-modes does not exist in the output of interface eth0 not ok 1 selftests: drivers/net/hw: nic_performance.py # exit=1 make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make: Leaving directory '/home/virtme/testing-22/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff8880091e0040 (size 176): comm "sh", pid 1172, jiffies 4294812114 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc ecee6c8b): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 prepare_exec_creds+0x11/0x250 bprm_execve+0x5f/0x540 do_execveat_common.isra.0+0x3f5/0x550 __x64_sys_execve+0x8c/0xb0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff8880091e13c0 (size 176): comm "timeout", pid 1171, jiffies 4294812148 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 77232ff1): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 copy_creds+0x73/0x6b0 copy_process+0x6e0/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888008ceb380 (size 264): comm "timeout", pid 1173, jiffies 4294812193 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 6b 6b 6b 6b ff ff ff ff ff ff ff ff ....kkkk........ backtrace (crc c211c3e3): kmem_cache_alloc_noprof+0x2ad/0x350 alloc_pid+0xad/0xfd0 copy_process+0x24b4/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff8880091e07c0 (size 176): comm "stdbuf", pid 1174, jiffies 4294812235 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 378e8e0f): kmem_cache_alloc_noprof+0x2ad/0x350 prepare_creds+0x29/0x4a0 prepare_exec_creds+0x11/0x250 bprm_execve+0x5f/0x540 do_execveat_common.isra.0+0x3f5/0x550 __x64_sys_execve+0x8c/0xb0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800a2eeaa8 (size 160): comm "python3", pid 1174, jiffies 4294812549 hex dump (first 32 bytes): 48 ca a8 0a 80 88 ff ff d0 4c 04 8f ff ff ff ff H........L...... 80 44 17 0d 80 88 ff ff 25 00 00 00 00 00 00 80 .D......%....... backtrace (crc 3e91a216): kmem_cache_alloc_noprof+0x2ad/0x350 vm_area_alloc+0x20/0x1c0 __mmap_region+0x734/0x18e0 do_mmap+0x9c7/0xf20 vm_mmap_pgoff+0x152/0x2e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff8880059c1088 (size 152): comm "python3", pid 1174, jiffies 4294812549 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 6b 6b 6b 6b 00 00 00 00 ad 4e ad de ....kkkk.....N.. backtrace (crc a27ad0e2): kmem_cache_alloc_noprof+0x2ad/0x350 vm_area_alloc+0xe4/0x1c0 __mmap_region+0x734/0x18e0 do_mmap+0x9c7/0xf20 vm_mmap_pgoff+0x152/0x2e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800a1fca00 (size 256): comm "python3", pid 1174, jiffies 4294812689 hex dump (first 32 bytes): 00 ca 1f 0a 80 88 ff ff 08 74 fe 0b 80 88 ff ff .........t...... 20 43 8a 91 ff ff ff ff ff df 7e 16 d1 7f 00 00 C........~..... backtrace (crc 99e2ee2): kmem_cache_alloc_bulk_noprof+0x119/0x170 mas_alloc_nodes+0x1f9/0x810 mas_preallocate+0x213/0x5d0 __split_vma+0x2a5/0xe00 vms_gather_munmap_vmas+0x12c/0xf90 __mmap_prepare+0x569/0x1190 __mmap_region+0x15b/0x18e0 do_mmap+0x9c7/0xf20 vm_mmap_pgoff+0x152/0x2e0 ksys_mmap_pgoff+0x1b4/0x420 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f xx__->