==================================================================
BUG: KASAN: out-of-bounds in __dev_queue_xmit+0x16bb/0x1cd0 net/core/dev.c:3483
Read of size 4 at addr ffff8881d4c0c20c by task syz-executor.3/15762
CPU: 1 PID: 15762 Comm: syz-executor.3 Not tainted 4.14.98+ #7
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0xb9/0x10e lib/dump_stack.c:53
print_address_description+0x60/0x226 mm/kasan/report.c:252
kasan_report_error mm/kasan/report.c:351 [inline]
kasan_report mm/kasan/report.c:409 [inline]
kasan_report.cold+0x88/0x2a5 mm/kasan/report.c:393
The buggy address belongs to the page:
page:ffffea0007530300 count:1 mapcount:0 mapping: (null) index:0x0
flags: 0x4000000000000000()
raw: 4000000000000000 0000000000000000 0000000000000000 00000001ffffffff
raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff8881d4c0c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff8881d4c0c180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff8881d4c0c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
^
ffff8881d4c0c280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff8881d4c0c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================