make -C tools/testing/selftests TARGETS="drivers/net/hw" TEST_PROGS=nic_peerformance.py TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-22/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make[1]: Entering directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' TAP version 13 1..1 # overriding timeout to 360 # selftests: drivers/net/hw: nic_performance.py # Warning: file nic_performance.py is not executable # # Partner Interface name: eth1 # Traceback (most recent call last): # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 137, in # main() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/./nic_performance.py", line 131, in main # link_config = LinkConfig(cfg) # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 20, in __init__ # self.common_link_modes = self.get_common_link_modes() # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 171, in get_common_link_modes # partner_link_modes = self.get_ethtool_field("link-partner-advertised-link-modes") # File "/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw/lib/py/linkconfig.py", line 221, in get_ethtool_field # raise KsftSkipEx(f'Field {field} does not exist in the output of interface {json_data["ifname"]}') # net.lib.py.ksft.KsftSkipEx: Field link-partner-advertised-link-modes does not exist in the output of interface eth0 not ok 1 selftests: drivers/net/hw: nic_performance.py # exit=1 make[1]: Leaving directory '/home/virtme/testing-22/tools/testing/selftests/drivers/net/hw' make: Leaving directory '/home/virtme/testing-22/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800d138580 (size 264): comm "sh", pid 1689, jiffies 4294854013 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 6b 6b 6b 6b ff ff ff ff ff ff ff ff ....kkkk........ backtrace (crc e6b12fbc): kmem_cache_alloc_noprof+0x2ad/0x350 alloc_pid+0xad/0xeb0 copy_process+0x24b2/0x5190 kernel_clone+0xc1/0x510 __do_sys_clone+0xb5/0x100 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f xx__->