Oops: general protection fault, probably for non-canonical address 0xeffffc0000000000: 0000 [#1] SMP KASAN PTI
KASAN: maybe wild-memory-access in range [0x8000000000000000-0x8000000000000007]
CPU: 1 UID: 0 PID: 15801 Comm: syz.6.2459 Tainted: G             L      syzkaller #0 PREEMPT_{RT,(full)} 
Tainted: [L]=SOFTLOCKUP
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:try_module_get+0x24/0xc0
Code: 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 b0 01 48 85 ff 74 72 48 89 fb 49 bf 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 64 83 3b 02 74 5b 4c 8d b3 f8 04 00 00 4c
RSP: 0018:ffffc900097a76f0 EFLAGS: 00010a06
RAX: 1000000000000000 RBX: 8000000000000001 RCX: ffffffff8b29fea6
RDX: 0000000000000001 RSI: 0000000000000004 RDI: 8000000000000001
RBP: ffff8881765c2400 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffff520012f4ed0 R12: ffff88810d2c5c18
R13: ffff888112641300 R14: ffff88810c985bb0 R15: dffffc0000000000
FS:  00007f178e5456c0(0000) GS:ffff8882a9f1f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f17902f6980 CR3: 000000010ed00000 CR4: 00000000000006f0
Call Trace:
 <TASK>
 dvb_device_open+0xef/0x360
 chrdev_open+0x4d0/0x5f0
 do_dentry_open+0x83d/0x13e0
 vfs_open+0x3b/0x350
 path_openat+0x2e43/0x38a0
 do_file_open+0x23e/0x4a0
 do_sys_openat2+0x113/0x200
 __x64_sys_openat+0x138/0x170
 do_syscall_64+0x15f/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f17902cd60e
Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 <c3> 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08
RSP: 002b:00007f178e544b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007f178e5456c0 RCX: 00007f17902cd60e
RDX: 0000000000040002 RSI: 00007f178e544c00 RDI: ffffffffffffff9c
RBP: 00007f178e544c00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd
R13: 00007f1790586128 R14: 00007f1790586090 R15: 00007fff19fe5b48
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:try_module_get+0x24/0xc0
Code: 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 b0 01 48 85 ff 74 72 48 89 fb 49 bf 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 64 83 3b 02 74 5b 4c 8d b3 f8 04 00 00 4c
RSP: 0018:ffffc900097a76f0 EFLAGS: 00010a06
RAX: 1000000000000000 RBX: 8000000000000001 RCX: ffffffff8b29fea6
RDX: 0000000000000001 RSI: 0000000000000004 RDI: 8000000000000001
RBP: ffff8881765c2400 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffff520012f4ed0 R12: ffff88810d2c5c18
R13: ffff888112641300 R14: ffff88810c985bb0 R15: dffffc0000000000
FS:  00007f178e5456c0(0000) GS:ffff8882a9f1f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f17902f6980 CR3: 000000010ed00000 CR4: 00000000000006f0
