make -C tools/testing/selftests TARGETS="drivers/net/hw" TEST_PROGS=nic_peerformance.py TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-22/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' TAP version 13 1..1 # overriding timeout to 360 # selftests: drivers/net/hw: nic_performance.py # Warning: file nic_performance.py is not executable # # Partner Interface name: eth1 # Traceback (most recent call last): # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 137, in # main() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 131, in main # link_config = LinkConfig(cfg) # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 20, in __init__ # self.common_link_modes = self.get_common_link_modes() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 171, in get_common_link_modes # partner_link_modes = self.get_ethtool_field("link-partner-advertised-link-modes") # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 221, in get_ethtool_field # raise KsftSkipEx(f'Field {field} does not exist in the output of interface {json_data["ifname"]}') # net.lib.py.ksft.KsftSkipEx: Field link-partner-advertised-link-modes does not exist in the output of interface eth0 not ok 1 selftests: drivers/net/hw: nic_performance.py # exit=1 make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make: Leaving directory '/home/virtme/testing-22/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800f61d700 (size 264): comm "make", pid 1347, jiffies 4294819899 hex dump (first 32 bytes): 04 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 6b 6b 6b 6b ff ff ff ff ff ff ff ff ....kkkk........ backtrace (crc d0d30c66): kmem_cache_alloc_noprof+0x2ad/0x350 alloc_pid+0xad/0xfd0 copy_process+0x24b4/0x5180 kernel_clone+0xc2/0x510 __do_sys_clone3+0x150/0x1a0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888010e36500 (size 312): comm "sh", pid 1352, jiffies 4294819946 hex dump (first 32 bytes): 0c 80 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 bd f6 af ff ff ff ff 00 00 00 00 00 00 00 00 `............... backtrace (crc 1e2fd7aa): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 __lookup_slow+0x17f/0x3c0 walk_component+0x2ab/0x4f0 path_lookupat+0x120/0x660 filename_lookup+0x1c2/0x470 vfs_statx+0xac/0x150 vfs_fstatat+0x68/0xa0 __do_sys_newfstatat+0x75/0xd0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff8880017cf228 (size 1184): comm "sh", pid 1352, jiffies 4294819946 hex dump (first 32 bytes): 00 d7 61 0f 80 88 ff ff 00 00 00 00 5a 5a 5a 5a ..a.........ZZZZ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc d8108741): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_pid_make_base_inode.constprop.0+0x19/0x160 proc_pid_instantiate+0x4a/0x1d0 proc_pid_lookup+0x180/0x3b0 proc_root_lookup+0x21/0x50 __lookup_slow+0x209/0x3c0 walk_component+0x2ab/0x4f0 path_lookupat+0x120/0x660 filename_lookup+0x1c2/0x470 vfs_statx+0xac/0x150 vfs_fstatat+0x68/0xa0 __do_sys_newfstatat+0x75/0xd0 unreferenced object 0xffff88801306c850 (size 312): comm "sh", pid 1352, jiffies 4294820303 hex dump (first 32 bytes): 0c 80 00 00 6b 6b 6b 6b 06 00 00 00 6b 6b 6b 6b ....kkkk....kkkk 60 bd f6 af ff ff ff ff 00 00 00 00 00 00 00 00 `............... backtrace (crc 1da8440a): kmem_cache_alloc_lru_noprof+0x2ad/0x350 __d_alloc+0x31/0x8d0 d_alloc+0x48/0x1d0 d_alloc_parallel+0xdc/0xe70 __lookup_slow+0x17f/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x416/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888010f82eb8 (size 1184): comm "sh", pid 1352, jiffies 4294820303 hex dump (first 32 bytes): 00 d7 61 0f 80 88 ff ff 00 00 00 00 5a 5a 5a 5a ..a.........ZZZZ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 7674fed5): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_pident_instantiate+0x83/0x310 proc_tgid_base_lookup+0x1a6/0x220 __lookup_slow+0x209/0x3c0 walk_component+0x2ab/0x4f0 link_path_walk.part.0.constprop.0+0x416/0x940 path_openat+0x1b8/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f unreferenced object 0xffff888010f819f8 (size 1184): comm "sh", pid 1352, jiffies 4294820303 hex dump (first 32 bytes): 00 d7 61 0f 80 88 ff ff 01 00 00 00 5a 5a 5a 5a ..a.........ZZZZ e0 54 90 aa ff ff ff ff 00 00 00 00 00 00 00 00 .T.............. backtrace (crc 10277493): kmem_cache_alloc_lru_noprof+0x2ad/0x350 proc_alloc_inode+0x25/0x240 alloc_inode+0x5b/0x200 new_inode+0x10/0x30 proc_pid_make_inode+0x1b/0x140 proc_fd_instantiate+0x51/0x2a0 proc_lookupfd+0x103/0x1e0 lookup_open.isra.0+0x6da/0x1350 open_last_lookups+0x697/0x1280 path_openat+0x169/0x430 do_filp_open+0x1d8/0x430 do_sys_openat2+0x122/0x160 __x64_sys_openat+0x123/0x1e0 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f xx__->