Oops: general protection fault, probably for non-canonical address 0xe000080fe29e0db3: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0000607f14f06d98-0x0000607f14f06d9f] CPU: 0 UID: 0 PID: 14935 Comm: syz.0.4226 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:module_is_live include/linux/module.h:611 [inline] RIP: 0010:try_module_get+0x23/0xd0 kernel/module/main.c:941 Code: 90 90 90 90 90 90 90 f3 0f 1e fa 48 85 ff 0f 84 9b 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 89 fb <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 89 00 00 00 83 3b 02 74 67 48 RSP: 0000:ffffc9000d8178b8 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000607f14f06d98 RCX: ffffc90007be1000 RDX: 00000c0fe29e0db3 RSI: ffffffff87efb960 RDI: 0000607f14f06d98 RBP: ffff888021e08c00 R08: 0000000000000001 R09: fffffbfff1fdce79 R10: ffffffff8fee73cf R11: 0000000000000000 R12: ffff8880706ecc40 R13: ffff88804d456c00 R14: ffff88802aa68140 R15: ffff8880706ecc88 FS: 0000000000000000(0000) GS:ffff888097174000(0063) knlGS:00000000f53edb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f702c5d0 CR3: 0000000076837000 CR4: 0000000000352ef0 Call Trace: dvb_device_open+0x124/0x3b0 drivers/media/dvb-core/dvbdev.c:103 chrdev_open+0x234/0x6a0 fs/char_dev.c:411 do_dentry_open+0x6d8/0x1660 fs/open.c:947 vfs_open+0x82/0x3f0 fs/open.c:1079 do_open fs/namei.c:4699 [inline] path_openat+0x208c/0x31a0 fs/namei.c:4858 do_file_open+0x20e/0x430 fs/namei.c:4887 do_sys_openat2+0x10d/0x1e0 fs/open.c:1364 do_sys_open fs/open.c:1370 [inline] __do_compat_sys_openat fs/open.c:1432 [inline] __se_compat_sys_openat fs/open.c:1430 [inline] __ia32_compat_sys_openat+0x12d/0x210 fs/open.c:1430 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] do_int80_emulation+0x141/0x700 arch/x86/entry/syscall_32.c:172 asm_int80_emulation+0x1a/0x20 arch/x86/include/asm/idtentry.h:621 RIP: 0023:0xf71361ab Code: 57 56 53 8b 44 24 14 f6 00 08 75 23 8b 44 24 18 8b 5c 24 1c 8b 4c 24 20 8b 54 24 24 8b 74 24 28 8b 7c 24 2c 8b 6c 24 30 cd 80 <5b> 5e 5f 5d c3 5b 5e 5f 5d e9 f7 a1 ff ff 66 90 66 90 66 90 90 53 RSP: 002b:00000000f53ed03c EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f53ed100 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000292 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:module_is_live include/linux/module.h:611 [inline] RIP: 0010:try_module_get+0x23/0xd0 kernel/module/main.c:941 Code: 90 90 90 90 90 90 90 f3 0f 1e fa 48 85 ff 0f 84 9b 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 89 fb <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 89 00 00 00 83 3b 02 74 67 48 RSP: 0000:ffffc9000d8178b8 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000607f14f06d98 RCX: ffffc90007be1000 RDX: 00000c0fe29e0db3 RSI: ffffffff87efb960 RDI: 0000607f14f06d98 RBP: ffff888021e08c00 R08: 0000000000000001 R09: fffffbfff1fdce79 R10: ffffffff8fee73cf R11: 0000000000000000 R12: ffff8880706ecc40 R13: ffff88804d456c00 R14: ffff88802aa68140 R15: ffff8880706ecc88 FS: 0000000000000000(0000) GS:ffff888097174000(0063) knlGS:00000000f53edb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00007f0038f8fd20 CR3: 0000000076837000 CR4: 0000000000352ef0 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 90 nop 4: 90 nop 5: 90 nop 6: 90 nop 7: f3 0f 1e fa endbr64 b: 48 85 ff test %rdi,%rdi e: 0f 84 9b 00 00 00 je 0xaf 14: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1b: fc ff df 1e: 48 89 fa mov %rdi,%rdx 21: 55 push %rbp 22: 48 c1 ea 03 shr $0x3,%rdx 26: 53 push %rbx 27: 48 89 fb mov %rdi,%rbx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 89 00 00 00 jle 0xc3 3a: 83 3b 02 cmpl $0x2,(%rbx) 3d: 74 67 je 0xa6 3f: 48 rex.W