TAP version 13 1..1 # timeout set to 360 # selftests: drivers/net: macsec.py # TAP version 13 # 1..8 # # Exception| Traceback (most recent call last): # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/ksft.py", line 361, in ksft_run # # Exception| func(*args) # # Exception| ~~~~^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 147, in test_offload_api # # Exception| ip(f"link add link {cfg.ifname} {ms0} type macsec " # # Exception| ~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| f"port 4 encrypt on offload mac") # # Exception| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 238, in ip # # Exception| return tool('ip', args, json=json, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 225, in tool # # Exception| cmd_obj = cmd(cmd_str, ns=ns, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 91, in __init__ # # Exception| self.process(terminate=False, fail=fail, timeout=timeout) # # Exception| ~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 117, in process # # Exception| raise CmdExitFailure("Command failed", self) # # Exception| net.lib.py.utils.CmdExitFailure: Command failed # # Exception| CMD: ip link add link ens25f1np1 ms6565_0 type macsec port 4 encrypt on offload mac # # Exception| EXIT: 2 # # Exception| STDERR: Error: Unknown device type. # # Exception| # not ok 1 macsec.test_offload_api # ok 2 macsec.test_max_secy # XFAIL Test only works on netdevsim # ok 3 macsec.test_max_sc # XFAIL Test only works on netdevsim # # Exception| Traceback (most recent call last): # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/ksft.py", line 361, in ksft_run # # Exception| func(*args) # # Exception| ~~~~^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 231, in test_offload_state # # Exception| ip(f"link add link {cfg.ifname} {ms0} type macsec " # # Exception| ~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| f"encrypt on offload mac") # # Exception| ^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 238, in ip # # Exception| return tool('ip', args, json=json, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 225, in tool # # Exception| cmd_obj = cmd(cmd_str, ns=ns, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 91, in __init__ # # Exception| self.process(terminate=False, fail=fail, timeout=timeout) # # Exception| ~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 117, in process # # Exception| raise CmdExitFailure("Command failed", self) # # Exception| net.lib.py.utils.CmdExitFailure: Command failed # # Exception| CMD: ip link add link ens25f1np1 ms6565_0 type macsec encrypt on offload mac # # Exception| EXIT: 2 # # Exception| STDERR: Error: Unknown device type. # # Exception| # not ok 4 macsec.test_offload_state # # Exception| Traceback (most recent call last): # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/ksft.py", line 361, in ksft_run # # Exception| func(*args) # # Exception| ~~~~^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 295, in test_vlan # # Exception| _setup_macsec_devs(cfg, name, offload=offload) # # Exception| ~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 97, in _setup_macsec_devs # # Exception| ip(f"link add link {cfg.ifname} {name} " # # Exception| ~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| f"type macsec encrypt on offload {offload_arg}") # # Exception| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 238, in ip # # Exception| return tool('ip', args, json=json, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 225, in tool # # Exception| cmd_obj = cmd(cmd_str, ns=ns, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 91, in __init__ # # Exception| self.process(terminate=False, fail=fail, timeout=timeout) # # Exception| ~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 117, in process # # Exception| raise CmdExitFailure("Command failed", self) # # Exception| net.lib.py.utils.CmdExitFailure: Command failed # # Exception| CMD: ip link add link ens25f1np1 ms6565_0 type macsec encrypt on offload mac # # Exception| EXIT: 2 # # Exception| STDERR: Error: Unknown device type. # # Exception| # not ok 5 macsec.test_vlan.offloaded # # Exception| Traceback (most recent call last): # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/ksft.py", line 361, in ksft_run # # Exception| func(*args) # # Exception| ~~~~^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 295, in test_vlan # # Exception| _setup_macsec_devs(cfg, name, offload=offload) # # Exception| ~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 97, in _setup_macsec_devs # # Exception| ip(f"link add link {cfg.ifname} {name} " # # Exception| ~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| f"type macsec encrypt on offload {offload_arg}") # # Exception| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 238, in ip # # Exception| return tool('ip', args, json=json, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 225, in tool # # Exception| cmd_obj = cmd(cmd_str, ns=ns, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 91, in __init__ # # Exception| self.process(terminate=False, fail=fail, timeout=timeout) # # Exception| ~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 117, in process # # Exception| raise CmdExitFailure("Command failed", self) # # Exception| net.lib.py.utils.CmdExitFailure: Command failed # # Exception| CMD: ip link add link ens25f1np1 ms6565_0 type macsec encrypt on offload off # # Exception| EXIT: 2 # # Exception| STDERR: Error: Unknown device type. # # Exception| # not ok 6 macsec.test_vlan.software # # Exception| Traceback (most recent call last): # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/ksft.py", line 361, in ksft_run # # Exception| func(*args) # # Exception| ~~~~^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 316, in test_vlan_toggle # # Exception| _setup_macsec_devs(cfg, name, offload=offload) # # Exception| ~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 97, in _setup_macsec_devs # # Exception| ip(f"link add link {cfg.ifname} {name} " # # Exception| ~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| f"type macsec encrypt on offload {offload_arg}") # # Exception| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 238, in ip # # Exception| return tool('ip', args, json=json, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 225, in tool # # Exception| cmd_obj = cmd(cmd_str, ns=ns, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 91, in __init__ # # Exception| self.process(terminate=False, fail=fail, timeout=timeout) # # Exception| ~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 117, in process # # Exception| raise CmdExitFailure("Command failed", self) # # Exception| net.lib.py.utils.CmdExitFailure: Command failed # # Exception| CMD: ip link add link ens25f1np1 ms6565_0 type macsec encrypt on offload mac # # Exception| EXIT: 2 # # Exception| STDERR: Error: Unknown device type. # # Exception| # not ok 7 macsec.test_vlan_toggle.on_to_off # # Exception| Traceback (most recent call last): # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/ksft.py", line 361, in ksft_run # # Exception| func(*args) # # Exception| ~~~~^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 316, in test_vlan_toggle # # Exception| _setup_macsec_devs(cfg, name, offload=offload) # # Exception| ~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/drivers/net/./macsec.py", line 97, in _setup_macsec_devs # # Exception| ip(f"link add link {cfg.ifname} {name} " # # Exception| ~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| f"type macsec encrypt on offload {offload_arg}") # # Exception| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 238, in ip # # Exception| return tool('ip', args, json=json, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 225, in tool # # Exception| cmd_obj = cmd(cmd_str, ns=ns, host=host) # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 91, in __init__ # # Exception| self.process(terminate=False, fail=fail, timeout=timeout) # # Exception| ~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # # Exception| File "/srv/hw-worker/tests/630/net/lib/py/utils.py", line 117, in process # # Exception| raise CmdExitFailure("Command failed", self) # # Exception| net.lib.py.utils.CmdExitFailure: Command failed # # Exception| CMD: ip link add link ens25f1np1 ms6565_0 type macsec encrypt on offload off # # Exception| EXIT: 2 # # Exception| STDERR: Error: Unknown device type. # # Exception| # not ok 8 macsec.test_vlan_toggle.off_to_on # # Totals: pass:0 fail:6 xfail:2 xpass:0 skip:0 error:0 not ok 1 selftests: drivers/net: macsec.py # exit=1