On Tue, Mar 08, 2016 at 07:16:23PM -0700, subas...@codeaurora.org wrote:
>
> 2. Encrypted packet queued for decryption (asynchronous)
>
> static int esp_input(struct xfrm_state *x, struct sk_buff *skb)
> ...
> aead_request_set_callback(req, 0, esp_input_done, skb);
I suppose we'll have t
I am observing a crash originating from XFRM framework on a 3.18 ARM64
kernel.
get_rps_cpus tries to dereference the skb->dev fields but it appears
that
the device is freed from the poison pattern.
The following is the crash call stack -
55428.227024: <2> [] get_rps_cpu+0x94/0x2f0
55428.22