make -C tools/testing/selftests TARGETS="drivers/net/hw" TEST_PROGS=nic_peerformance.py TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-22/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' TAP version 13 1..1 # overriding timeout to 360 # selftests: drivers/net/hw: nic_performance.py # Warning: file nic_performance.py is not executable # # Partner Interface name: eth1 # Traceback (most recent call last): # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 137, in # main() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 131, in main # link_config = LinkConfig(cfg) # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 20, in __init__ # self.common_link_modes = self.get_common_link_modes() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 171, in get_common_link_modes # partner_link_modes = self.get_ethtool_field("link-partner-advertised-link-modes") # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 221, in get_ethtool_field # raise KsftSkipEx(f'Field {field} does not exist in the output of interface {json_data["ifname"]}') # net.lib.py.ksft.KsftSkipEx: Field link-partner-advertised-link-modes does not exist in the output of interface eth0 not ok 1 selftests: drivers/net/hw: nic_performance.py # exit=1 make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make: Leaving directory '/home/virtme/testing-22/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800a4b1380 (size 264): comm "sh", pid 1179, jiffies 4294817642 hex dump (first 32 bytes): 04 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 6b 6b 6b 6b ff ff ff ff ff ff ff ff ....kkkk........ backtrace (crc 817c2258): kmem_cache_alloc_noprof+0x2ad/0x350 alloc_pid+0xad/0xfd0 copy_process+0x24b4/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone+0xb6/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800ac5bc30 (size 312): comm "sh", pid 1180, jiffies 4294817643 hex dump (first 32 bytes): 0c 80 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 bd 76 b3 ff ff ff ff 00 00 00 00 00 00 00 00 `.v............. backtrace (crc aa7308db): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 __lookup_slow+0x17f/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x350/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800ae65838 (size 1184): comm "sh", pid 1180, jiffies 4294817643 hex dump (first 32 bytes): 80 13 4b 0a 80 88 ff ff 00 00 00 00 5a 5a 5a 5a ..K.........ZZZZ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f879f1c9): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_pid_make_base_inode.constprop.0+0x19/0x160 proc_pid_instantiate+0x4a/0x1d0 proc_pid_lookup+0x180/0x3b0 proc_root_lookup+0x21/0x50 __lookup_slow+0x209/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x350/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 unreferenced object 0xffff88800ac5bdd8 (size 312): comm "sh", pid 1180, jiffies 4294817643 hex dump (first 32 bytes): 0c 80 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 bd 76 b3 ff ff ff ff 00 00 00 00 00 00 00 00 `.v............. backtrace (crc 926f42c8): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 __lookup_slow+0x17f/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x416/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800ae62458 (size 1184): comm "sh", pid 1180, jiffies 4294817643 hex dump (first 32 bytes): 80 13 4b 0a 80 88 ff ff 00 00 00 00 5a 5a 5a 5a ..K.........ZZZZ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 44070851): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_pident_instantiate+0x83/0x310 proc_tgid_base_lookup+0x1a6/0x220 __lookup_slow+0x209/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x416/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff88800ae61f28 (size 1184): comm "sh", pid 1180, jiffies 4294817643 hex dump (first 32 bytes): 80 13 4b 0a 80 88 ff ff 01 00 00 00 5a 5a 5a 5a ..K.........ZZZZ e0 54 10 ae ff ff ff ff 00 00 00 00 00 00 00 00 .T.............. backtrace (crc e28e97f2): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_fd_instantiate+0x51/0x2a0 proc_lookupfd+0x103/0x1e0 lookup_open.isra.0+0x6da/0x1350 open_last_lookups+0x697/0x1280 path_openat+0x169/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f xx__->