Oops: general protection fault, probably for non-canonical address 0xe000080fe299279b: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0000607f14c93cd8-0x0000607f14c93cdf] CPU: 1 UID: 0 PID: 7110 Comm: syz.3.247 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:module_is_live include/linux/module.h:612 [inline] RIP: 0010:try_module_get+0x23/0xd0 kernel/module/main.c:913 Code: 90 90 90 90 90 90 90 f3 0f 1e fa 48 85 ff 0f 84 9b 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 89 fb <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 89 00 00 00 83 3b 02 74 67 48 RSP: 0000:ffffc90003cbf8b8 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000607f14c93cd8 RCX: ffffc9000ca21000 RDX: 00000c0fe299279b RSI: ffffffff87dbf1f0 RDI: 0000607f14c93cd8 RBP: ffff888043f42a00 R08: 0000000000000001 R09: fffffbfff1f97e3d R10: ffffffff8fcbf1ef R11: 0000000000000000 R12: ffff88804c108c40 R13: ffff88804d767a00 R14: ffff888027c74230 R15: ffff88804c108c88 FS: 0000000000000000(0000) GS:ffff8880974b1000(0063) knlGS:00000000f549db40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f53e4da4 CR3: 000000006fa82000 CR4: 0000000000352ef0 Call Trace: dvb_device_open+0x124/0x3b0 drivers/media/dvb-core/dvbdev.c:103 chrdev_open+0x234/0x6a0 fs/char_dev.c:411 do_dentry_open+0x6d8/0x1660 fs/open.c:949 vfs_open+0x82/0x3f0 fs/open.c:1081 do_open fs/namei.c:4671 [inline] path_openat+0x208c/0x31a0 fs/namei.c:4830 do_file_open+0x20e/0x430 fs/namei.c:4859 do_sys_openat2+0x10d/0x1e0 fs/open.c:1366 do_sys_open fs/open.c:1372 [inline] __do_compat_sys_openat fs/open.c:1434 [inline] __se_compat_sys_openat fs/open.c:1432 [inline] __ia32_compat_sys_openat+0x12d/0x210 fs/open.c:1432 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] do_int80_emulation+0x141/0x6b0 arch/x86/entry/syscall_32.c:172 asm_int80_emulation+0x1a/0x20 arch/x86/include/asm/idtentry.h:621 RIP: 0023:0xf71e572b Code: 57 56 53 8b 44 24 14 f6 00 08 75 23 8b 44 24 18 8b 5c 24 1c 8b 4c 24 20 8b 54 24 24 8b 74 24 28 8b 7c 24 2c 8b 6c 24 30 cd 80 <5b> 5e 5f 5d c3 5b 5e 5f 5d e9 f7 a1 ff ff 66 90 66 90 66 90 90 53 RSP: 002b:00000000f549d03c EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f549d100 RDX: 000000000000413f RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:module_is_live include/linux/module.h:612 [inline] RIP: 0010:try_module_get+0x23/0xd0 kernel/module/main.c:913 Code: 90 90 90 90 90 90 90 f3 0f 1e fa 48 85 ff 0f 84 9b 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 89 fb <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 89 00 00 00 83 3b 02 74 67 48 RSP: 0000:ffffc90003cbf8b8 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000607f14c93cd8 RCX: ffffc9000ca21000 RDX: 00000c0fe299279b RSI: ffffffff87dbf1f0 RDI: 0000607f14c93cd8 RBP: ffff888043f42a00 R08: 0000000000000001 R09: fffffbfff1f97e3d R10: ffffffff8fcbf1ef R11: 0000000000000000 R12: ffff88804c108c40 R13: ffff88804d767a00 R14: ffff888027c74230 R15: ffff88804c108c88 FS: 0000000000000000(0000) GS:ffff8880974b1000(0063) knlGS:00000000f549db40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f7404068 CR3: 000000006fa82000 CR4: 0000000000352ef0 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 90 nop 4: 90 nop 5: 90 nop 6: 90 nop 7: f3 0f 1e fa endbr64 b: 48 85 ff test %rdi,%rdi e: 0f 84 9b 00 00 00 je 0xaf 14: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1b: fc ff df 1e: 48 89 fa mov %rdi,%rdx 21: 55 push %rbp 22: 48 c1 ea 03 shr $0x3,%rdx 26: 53 push %rbx 27: 48 89 fb mov %rdi,%rbx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 89 00 00 00 jle 0xc3 3a: 83 3b 02 cmpl $0x2,(%rbx) 3d: 74 67 je 0xa6 3f: 48 rex.W