Oops: general protection fault, probably for non-canonical address 0xe82ae42abf43c1fe: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x41574155fa1e0ff0-0x41574155fa1e0ff7] CPU: 1 UID: 0 PID: 20989 Comm: syz.3.3095 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:module_is_live include/linux/module.h:612 [inline] RIP: 0010:try_module_get+0x24/0xc0 kernel/module/main.c:913 Code: 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 b0 01 48 85 ff 74 72 48 89 fb 49 bf 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 64 83 3b 02 74 5b 4c 8d b3 f8 04 00 00 4c RSP: 0018:ffffc90004cff750 EFLAGS: 00010212 RAX: 082ae82abf43c1fe RBX: 41574155fa1e0ff3 RCX: 0000000000000000 RDX: 0000000000000001 RSI: 0000000000000008 RDI: 41574155fa1e0ff3 RBP: ffff888032822fc0 R08: ffffffff8f6bc5af R09: 1ffffffff1ed78b5 R10: dffffc0000000000 R11: fffffbfff1ed78b6 R12: ffff88802b200e18 R13: ffffffff81891290 R14: ffff88802c0b6288 R15: dffffc0000000000 FS: 00007fafc2ae06c0(0000) GS:ffff888125560000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fafc1b85440 CR3: 0000000086fee000 CR4: 0000000000350ef0 Call Trace: dvb_device_open+0xef/0x350 drivers/media/dvb-core/dvbdev.c:103 chrdev_open+0x4cd/0x5e0 fs/char_dev.c:411 do_dentry_open+0x785/0x14e0 fs/open.c:949 vfs_open+0x3b/0x340 fs/open.c:1081 do_open fs/namei.c:4671 [inline] path_openat+0x2e08/0x3860 fs/namei.c:4830 do_file_open+0x23e/0x4a0 fs/namei.c:4859 do_sys_openat2+0x113/0x200 fs/open.c:1366 do_sys_open fs/open.c:1372 [inline] __do_sys_openat fs/open.c:1388 [inline] __se_sys_openat fs/open.c:1383 [inline] __x64_sys_openat+0x138/0x170 fs/open.c:1383 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fafc1b5cfce Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 RSP: 002b:00007fafc2adfb28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007fafc2ae06c0 RCX: 00007fafc1b5cfce RDX: 0000000000000002 RSI: 00007fafc2adfc00 RDI: ffffffffffffff9c RBP: 00007fafc2adfc00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd R13: 00007fafc1e16038 R14: 00007fafc1e15fa0 R15: 00007ffecb2ec4f8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:module_is_live include/linux/module.h:612 [inline] RIP: 0010:try_module_get+0x24/0xc0 kernel/module/main.c:913 Code: 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 b0 01 48 85 ff 74 72 48 89 fb 49 bf 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 64 83 3b 02 74 5b 4c 8d b3 f8 04 00 00 4c RSP: 0018:ffffc90004cff750 EFLAGS: 00010212 RAX: 082ae82abf43c1fe RBX: 41574155fa1e0ff3 RCX: 0000000000000000 RDX: 0000000000000001 RSI: 0000000000000008 RDI: 41574155fa1e0ff3 RBP: ffff888032822fc0 R08: ffffffff8f6bc5af R09: 1ffffffff1ed78b5 R10: dffffc0000000000 R11: fffffbfff1ed78b6 R12: ffff88802b200e18 R13: ffffffff81891290 R14: ffff88802c0b6288 R15: dffffc0000000000 FS: 00007fafc2ae06c0(0000) GS:ffff888125560000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055c5fd3fd950 CR3: 0000000086fee000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 90 nop 4: 90 nop 5: 90 nop 6: f3 0f 1e fa endbr64 a: 41 57 push %r15 c: 41 56 push %r14 e: 53 push %rbx f: b0 01 mov $0x1,%al 11: 48 85 ff test %rdi,%rdi 14: 74 72 je 0x88 16: 48 89 fb mov %rdi,%rbx 19: 49 bf 00 00 00 00 00 movabs $0xdffffc0000000000,%r15 20: fc ff df 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 38 movzbl (%rax,%r15,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 75 64 jne 0x97 33: 83 3b 02 cmpl $0x2,(%rbx) 36: 74 5b je 0x93 38: 4c 8d b3 f8 04 00 00 lea 0x4f8(%rbx),%r14 3f: 4c rex.WR