BUG: Bad page map in process syz-executor.4 pte:ffff8881e687f1c0 pmd:1a9863067 addr:00007f5640c39000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffff8881f1127c48 index:35 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 0 PID: 18179 Comm: syz-executor.4 Not tainted 5.4.254-syzkaller-00010-g5f1cbd78af59 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d8/0x241 lib/dump_stack.c:118 print_bad_pte+0x511/0x530 mm/memory.c:559 vm_normal_page+0x135/0x1d0 mm/memory.c:648 zap_pte_range mm/memory.c:1077 [inline] zap_pmd_range mm/memory.c:1221 [inline] zap_pud_range mm/memory.c:1250 [inline] zap_p4d_range mm/memory.c:1271 [inline] unmap_page_range+0xc00/0x2620 mm/memory.c:1292 unmap_single_vma mm/memory.c:1337 [inline] unmap_vmas+0x355/0x4b0 mm/memory.c:1369 exit_mmap+0x2bc/0x520 mm/mmap.c:3186 __mmput+0x8e/0x2c0 kernel/fork.c:1093 exit_mm kernel/exit.c:536 [inline] do_exit+0xc08/0x2bc0 kernel/exit.c:846 do_group_exit+0x138/0x300 kernel/exit.c:982 get_signal+0xdb1/0x1440 kernel/signal.c:2735 do_signal+0xb0/0x11f0 arch/x86/kernel/signal.c:809 exit_to_usermode_loop+0xc0/0x1a0 arch/x86/entry/common.c:159 prepare_exit_to_usermode+0x199/0x200 arch/x86/entry/common.c:194 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 BUG: Bad rss-counter state mm:ffff8881e4b6c980 type:MM_FILEPAGES val:1