BUG: Bad page map in process syz-executor.4 pte:ffff8881e5e27140 pmd:1db353067 addr:0000000020039000 vm_flags:00100077 anon_vma:ffff8881e7e281f8 mapping:0000000000000000 index:20039 file:(null) fault:0x0 mmap:0x0 readpage:0x0 CPU: 0 PID: 899 Comm: syz-executor.4 Not tainted 5.4.254-syzkaller-00010-g5f1cbd78af59 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d8/0x241 lib/dump_stack.c:118 print_bad_pte+0x511/0x530 mm/memory.c:559 vm_normal_page+0x135/0x1d0 mm/memory.c:648 zap_pte_range mm/memory.c:1077 [inline] zap_pmd_range mm/memory.c:1221 [inline] zap_pud_range mm/memory.c:1250 [inline] zap_p4d_range mm/memory.c:1271 [inline] unmap_page_range+0xc00/0x2620 mm/memory.c:1292 unmap_single_vma mm/memory.c:1337 [inline] unmap_vmas+0x355/0x4b0 mm/memory.c:1369 exit_mmap+0x2bc/0x520 mm/mmap.c:3186 __mmput+0x8e/0x2c0 kernel/fork.c:1093 exit_mm kernel/exit.c:536 [inline] do_exit+0xc08/0x2bc0 kernel/exit.c:846 do_group_exit+0x138/0x300 kernel/exit.c:982 get_signal+0xdb1/0x1440 kernel/signal.c:2735 do_signal+0xb0/0x11f0 arch/x86/kernel/signal.c:809 exit_to_usermode_loop+0xc0/0x1a0 arch/x86/entry/common.c:159 prepare_exit_to_usermode+0x199/0x200 arch/x86/entry/common.c:194 entry_SYSCALL_64_after_hwframe+0x5c/0xc1