================================================================== BUG: KASAN: global-out-of-bounds in instrument_atomic_read_write include/linux/instrumented.h:112 [inline] BUG: KASAN: global-out-of-bounds in atomic_inc_not_zero include/linux/atomic/atomic-instrumented.h:1536 [inline] BUG: KASAN: global-out-of-bounds in try_module_get+0x46/0xc0 kernel/module/main.c:913 Write of size 4 at addr ffffffff8c51de98 by task syz.7.7301/2415 CPU: 0 UID: 0 PID: 2415 Comm: syz.7.7301 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xba/0x230 mm/kasan/report.c:482 kasan_report+0x117/0x150 mm/kasan/report.c:595 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x264/0x2c0 mm/kasan/generic.c:200 instrument_atomic_read_write include/linux/instrumented.h:112 [inline] atomic_inc_not_zero include/linux/atomic/atomic-instrumented.h:1536 [inline] try_module_get+0x46/0xc0 kernel/module/main.c:913 dvb_device_open+0xef/0x350 drivers/media/dvb-core/dvbdev.c:103 chrdev_open+0x4cd/0x5e0 fs/char_dev.c:411 do_dentry_open+0x785/0x14e0 fs/open.c:949 vfs_open+0x3b/0x340 fs/open.c:1081 do_open fs/namei.c:4671 [inline] path_openat+0x2e08/0x3860 fs/namei.c:4830 do_file_open+0x23e/0x4a0 fs/namei.c:4859 do_sys_openat2+0x113/0x200 fs/open.c:1366 do_sys_open fs/open.c:1372 [inline] __do_sys_openat fs/open.c:1388 [inline] __se_sys_openat fs/open.c:1383 [inline] __x64_sys_openat+0x138/0x170 fs/open.c:1383 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f757bb5c84e Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 RSP: 002b:00007f757ca5fb28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f757ca606c0 RCX: 00007f757bb5c84e RDX: 0000000000000002 RSI: 00007f757ca5fc00 RDI: ffffffffffffff9c RBP: 00007f757ca5fc00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd R13: 00007f757be16038 R14: 00007f757be15fa0 R15: 00007f757bf3fa48 The buggy address belongs to the variable: .str.6+0x18/0x20 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc51d flags: 0xfff00000002000(reserved|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000002000 ffffea0000314748 ffffea0000314748 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffffffff8c51dd80: f9 f9 f9 f9 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 ffffffff8c51de00: 00 00 00 02 f9 f9 f9 f9 00 00 00 04 f9 f9 f9 f9 >ffffffff8c51de80: 00 f9 f9 f9 00 00 00 00 00 05 f9 f9 f9 f9 f9 f9 ^ ffffffff8c51df00: 00 00 00 06 f9 f9 f9 f9 00 00 00 00 00 04 f9 f9 ffffffff8c51df80: f9 f9 f9 f9 00 00 01 f9 f9 f9 f9 f9 00 00 02 f9 ==================================================================