BUG: unable to handle page fault for address: fffff5200002af99
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 4993 Comm: syz-executor193 Not tainted 6.4.0-rc7-syzkaller-00072-gdad9774deaf1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
RIP: 0010:hlist_move_list include/linux/list.h:1029 [inline]
RIP: 0010:collect_expired_timers+0x13b/0x200 kernel/time/timer.c:1772
Code: 49 89 45 00 48 89 44 24 10 74 29 e8 bf 21 11 00 48 8b 44 24 10 48 b9 00 00 00 00 00 fc ff df 48 8d 78 08 48 89 fa 48 c1 ea 03 <80> 3c 0a 00 75 7a 4c 89 68 08 e8 96 21 11 00 4d 89 fd 49 c7 04 24
RSP: 0018:ffffc900001e0e20 EFLAGS: 00010016
RAX: ffffc90000157cc0 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: 1ffff9200002af99 RSI: ffffffff81732551 RDI: ffffc90000157cc8
RBP: 00000000ffff9b50 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: ffff8880b993cf98 R12: ffff8880b99297e0
R13: ffffc900001e0eb8 R14: ffff8880b9929720 R15: ffffc900001e0ec0
FS: 00005555561173c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff5200002af99 CR3: 0000000079098000 CR4: 0000000000350ee0
Call Trace:
<IRQ>
----------------
Code disassembly (best guess):
0: 49 89 45 00 mov %rax,0x0(%r13)
4: 48 89 44 24 10 mov %rax,0x10(%rsp)
9: 74 29 je 0x34
b: e8 bf 21 11 00 callq 0x1121cf
10: 48 8b 44 24 10 mov 0x10(%rsp),%rax
15: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx
1c: fc ff df
1f: 48 8d 78 08 lea 0x8(%rax),%rdi
23: 48 89 fa mov %rdi,%rdx
26: 48 c1 ea 03 shr $0x3,%rdx
* 2a: 80 3c 0a 00 cmpb $0x0,(%rdx,%rcx,1) <-- trapping instruction
2e: 75 7a jne 0xaa
30: 4c 89 68 08 mov %r13,0x8(%rax)
34: e8 96 21 11 00 callq 0x1121cf
39: 4d 89 fd mov %r15,%r13
3c: 49 rex.WB
3d: c7 .byte 0xc7
3e: 04 24 add $0x24,%al