BUG: Bad page map in process syz-executor.2 pte:ffff8881d0b6b1c0 pmd:1d0097067 addr:00007fdbff039000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffff8881f110e6a0 index:53 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 5632 Comm: syz-executor.2 Tainted: G W 5.4.268-syzkaller-00001-g8322246edffa #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d8/0x241 lib/dump_stack.c:118 print_bad_pte+0x511/0x530 mm/memory.c:560 vm_normal_page+0x135/0x1d0 mm/memory.c:649 zap_pte_range mm/memory.c:1078 [inline] zap_pmd_range mm/memory.c:1222 [inline] zap_pud_range mm/memory.c:1251 [inline] zap_p4d_range mm/memory.c:1272 [inline] unmap_page_range+0xc00/0x2620 mm/memory.c:1293 unmap_single_vma mm/memory.c:1338 [inline] unmap_vmas+0x355/0x4b0 mm/memory.c:1370 exit_mmap+0x2bc/0x520 mm/mmap.c:3191 __mmput+0x8e/0x2c0 kernel/fork.c:1101 exit_mm kernel/exit.c:536 [inline] do_exit+0xc08/0x2bc0 kernel/exit.c:846 do_group_exit+0x138/0x300 kernel/exit.c:982 get_signal+0xdb1/0x1440 kernel/signal.c:2735 do_signal+0xb0/0x11f0 arch/x86/kernel/signal.c:809 exit_to_usermode_loop+0xc0/0x1a0 arch/x86/entry/common.c:159 prepare_exit_to_usermode+0x199/0x200 arch/x86/entry/common.c:194 entry_SYSCALL_64_after_hwframe+0x5c/0xc1