From nobody Mon Oct 6 06:31:23 2025 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 61CA81FE44B for ; Thu, 24 Jul 2025 04:55:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1753332936; cv=none; b=OvDA1zljgZjrPq/gEkLxlbKzxgGOSorKN3Gt5UW+atjuvVo5w1lbvnPbOEvw0dGlN6cnWlZXu4FCA4Afeh9jSOWLy3Kpkk0owhaOTYWPNKRbLsLVpU3YDujoSZt4iQMQ6TiOlPEChnwpBMK8QV84hwI59B5oycjli+kpP8XV8aA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1753332936; c=relaxed/simple; bh=WBrmB23zqf17QstavV6HWjSUrFh/p2tqMwe3/b9u46A=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=PJBoRpWaLb5LsGSDNmoCh1jP5epz+BbnN3ZU1zNgzXiGUjR8gGfhH7ctvTxQR00HpF9JPy34HL+JelOiI7s+3iHaTl/lkMrLjPb7xjk4RJvuVxmC6JMpwGfn3nXwy9dMMrzLeEDlQwtsRQ9EPiatjXWbHLRPNIv4o+opkKNw7x4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=bLvLmlUp; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="bLvLmlUp" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1753332934; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=6aGM+vPHWZhwm3WRlGCSLPtcgnNJ0f9Z26DvH8FdAxc=; b=bLvLmlUp2Yee5SHtVXoHP2D6TkP2umnZdSca1USRls3+tY+zjFG2rW+AYcBOcAnsaVeUoc 2fAOlgtu041zKAF8H08qUEf2lxniueUXtFLBUG6Tq/nruxXBpa+a4A0aQRKXai/8Yqr4dy z9GsJRyionzUvztdQYCNNC05Wlacrww= Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-689-m-jDCLADNiOYw7AmlQbZkA-1; Thu, 24 Jul 2025 00:55:27 -0400 X-MC-Unique: m-jDCLADNiOYw7AmlQbZkA-1 X-Mimecast-MFC-AGG-ID: m-jDCLADNiOYw7AmlQbZkA_1753332926 Received: from mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.111]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 97F4319560B0; Thu, 24 Jul 2025 04:55:25 +0000 (UTC) Received: from xmu-thinkpadx1carbon3rd.raycom.csb (unknown [10.72.120.34]) by mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id CA41218002AF; Thu, 24 Jul 2025 04:55:19 +0000 (UTC) From: Xiumei Mu To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Shuah Khan Cc: Simon Horman , netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Long Xin , Sabrina Dubroca Subject: [PATCH net] selftests: rtnetlink.sh: remove esp4_offload after test Date: Thu, 24 Jul 2025 12:55:02 +0800 Message-ID: <238b803af900dfc5f87f6ddc03805cc42da2ca35.1753332902.git.xmu@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.4.1 on 10.30.177.111 Content-Type: text/plain; charset="utf-8" The esp4_offload module, loaded during IPsec offload tests, should be reset to its default settings after testing. Otherwise, leaving it enabled could unintentionally affect subsequence test cases by keeping offload active. Fixes: 2766a11161cc ("selftests: rtnetlink: add ipsec offload API test") Signed-off-by: Xiumei Mu --- tools/testing/selftests/net/rtnetlink.sh | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/tools/testing/selftests/net/rtnetlink.sh b/tools/testing/selft= ests/net/rtnetlink.sh index 2e8243a65b50..5cc1b5340a1a 100755 --- a/tools/testing/selftests/net/rtnetlink.sh +++ b/tools/testing/selftests/net/rtnetlink.sh @@ -673,6 +673,11 @@ kci_test_ipsec_offload() sysfsf=3D$sysfsd/ipsec sysfsnet=3D/sys/bus/netdevsim/devices/netdevsim0/net/ probed=3Dfalse + esp4_offload_probed_default=3Dfalse + + if lsmod | grep -q esp4_offload; then + esp4_offload_probed_default=3Dtrue + fi =20 if ! mount | grep -q debugfs; then mount -t debugfs none /sys/kernel/debug/ &> /dev/null @@ -766,6 +771,7 @@ EOF fi =20 # clean up any leftovers + [ $esp4_offload_probed_default =3D=3D false ] && rmmod esp4_offload echo 0 > /sys/bus/netdevsim/del_device $probed && rmmod netdevsim =20 --=20 2.50.1