last executing test programs: 2.290958748s ago: executing program 6 (id=464): r0 = socket(0x1e, 0x3, 0x0) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="7607d771020000004e2b1f0000000000", 0x10}], 0x1}, 0x0) 1.970720673s ago: executing program 2 (id=471): openat$bpf(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) select(0x40, &(0x7f00000000c0)={0x9, 0xd, 0x3, 0x9, 0xbd8, 0x2, 0x1000, 0x4}, &(0x7f0000000100)={0x9, 0x10, 0x1, 0x9, 0xfffffffeffffffff, 0x3, 0x57}, 0x0, 0x0) 1.885733571s ago: executing program 1 (id=475): munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) sysctl$net_inet_carp(&(0x7f0000000000)={0x4, 0x2, 0x6, 0x4}, 0x4, 0x0, 0x0, &(0x7f00000010c0)="e1000000", 0x4) 1.8832564s ago: executing program 6 (id=476): r0 = socket(0x18, 0x3, 0x3) getsockopt(r0, 0x29, 0x1b, 0x0, 0x0) 1.724693541s ago: executing program 2 (id=477): r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0xae828e137847f62, 0x0) ftruncate(r0, 0x41000000007) 1.717299288s ago: executing program 1 (id=482): r0 = open(&(0x7f0000001640)='./file0\x00', 0x615, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0xfffff000, 0x2, 0x10, r0, 0x0) 1.708683797s ago: executing program 7 (id=484): ioctl$VMM_IOC_RESETCPU(0xffffffffffffff9c, 0x82405605, &(0x7f0000000100)={0x0, 0x0, {[0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff], [0x0, 0x0, 0x0, 0xfffffffffffffffc], [], [{}, {0x0, 0xfb4c}, {0x0, 0x0, 0xfffffffe}, {0x0, 0x0, 0x6}, {}, {}, {0x4}], {0x0, 0x1000}, {0x0, 0x2d6}}}) sysctl$net_inet_tcp(&(0x7f0000000080)={0x4, 0x2, 0x6, 0x9}, 0x4, &(0x7f00000000c0)="9b1809c3dd7d3f81670e53473f11e1a4e5f2f9f220ef7f0abdbc34fe42021588dc8ff44f4b76c76d41859d85ea800dabe467badf35b6fd74c94d1b44", &(0x7f0000000040)=0xfff9, 0x0, 0x0) 1.389510102s ago: executing program 3 (id=485): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000280)="cb0000011c00a500779857d8", 0xc) 1.389423099s ago: executing program 0 (id=486): open(&(0x7f00000000c0)='./file0\x00', 0x786, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x1100, 0xffffffffffffffff) 1.389214247s ago: executing program 6 (id=487): mknod(&(0x7f0000000040)='./bus\x00', 0x2000, 0x401300) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 1.384460734s ago: executing program 7 (id=488): ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {0x1, 0x0, 0x0, 0x3}]}) sysctl$kern(&(0x7f00000000c0)={0x1, 0x37}, 0x4, &(0x7f0000000000)="71f91e3471ac0058bc5a91501d942400b5e1a0757cb9af769c7afec37082", &(0x7f0000000080)=0x7, 0x0, 0x2e) 1.322647658s ago: executing program 7 (id=491): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 1.20952462s ago: executing program 2 (id=492): mknod(&(0x7f0000000280)='./file0\x00', 0x1ffa, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) 1.206236409s ago: executing program 0 (id=493): r0 = semget$private(0x0, 0x1, 0x10) semctl$SETALL(r0, 0x0, 0x9, 0xffffffffffffffff) 1.203044058s ago: executing program 7 (id=495): r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000000)='n', 0x1}], 0x1) 1.200452565s ago: executing program 1 (id=496): r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105727, &(0x7f0000000040)={&(0x7f0000000000)=[{0x20}, {0x3}, {}], 0x3}) 1.200120352s ago: executing program 3 (id=497): r0 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000080)={0x1, 0x1}) 1.197381994s ago: executing program 4 (id=498): ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x1, 0x0, 0x0, 0x3}]}) sysctl$kern(&(0x7f00000000c0)={0x1, 0x37}, 0x4, &(0x7f0000000000)="71f91e3471ac0058bc5a91501d942400b5e1a0757cb9af769c7afec37082", &(0x7f0000000080)=0x56, 0x0, 0x2e) 1.195655132s ago: executing program 6 (id=499): r0 = socket(0x18, 0x3, 0x0) getsockopt(r0, 0x29, 0x2b, 0x0, 0x0) 1.049283795s ago: executing program 5 (id=500): r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x1000000029, 0x2f, 0x0, 0x0) 1.04715069s ago: executing program 0 (id=501): mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x200) open(&(0x7f00000000c0)='./file0\x00', 0x2, 0x0) 959.594799ms ago: executing program 7 (id=502): r0 = syz_open_pts() ioctl$TIOCSWINSZ(r0, 0x80087467, &(0x7f00000017c0)={0x9, 0x8000, 0xba, 0x40}) 955.602952ms ago: executing program 3 (id=503): mknod(&(0x7f0000000000)='./bus\x00', 0x3a0914c44f7b202d, 0x7) open(&(0x7f0000000040)='./bus\x00', 0x10005, 0x0) 819.669477ms ago: executing program 4 (id=504): r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f0000000100)={&(0x7f0000000140)=[{0x3}, {0x5, 0x7}], 0x2}) 806.469055ms ago: executing program 1 (id=505): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) utimes(&(0x7f0000000080)='./file0\x00', 0x0) 797.688036ms ago: executing program 4 (id=506): fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8000000000000005}) sysctl$net_inet_ip(&(0x7f0000000040)={0x4, 0x11}, 0x6, &(0x7f0000000080)="ae215599fed2fce97f573b9c553a0e622d29cd093849cd4fe42e0f5d2d06a4e744f0713d1fcaa1b8274dffd067d413ef9d2224d3fddc171f73a295b6ed18b3d0588be75e78a1d734e15bfe", 0x0, 0x0, 0xfffffffffffffd37) 768.980679ms ago: executing program 2 (id=507): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) pwritev(r0, &(0x7f0000000900)=[{&(0x7f0000000580)="ea", 0x1}, {&(0x7f0000000680)='{', 0x1}], 0x2, 0x0) 767.063728ms ago: executing program 5 (id=508): r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_RESETCPU(r0, 0xc0205609, &(0x7f0000000280)={0x2, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x4000000000000000], [{0x0, 0x3}, {}, {0x1}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}], {}, {0xfffd}}}) 762.610536ms ago: executing program 4 (id=509): r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1021, &(0x7f0000000000)=0x5, 0x4) 649.392546ms ago: executing program 0 (id=510): open(&(0x7f00000000c0)='./file0\x00', 0x715, 0xc3) open(&(0x7f00000000c0)='./file0\x00', 0x2e92994837ed377e, 0x0) 643.201334ms ago: executing program 3 (id=511): r0 = socket(0x18, 0x3, 0x0) setsockopt(r0, 0x1000000029, 0x1a, 0x0, 0x0) 642.980289ms ago: executing program 5 (id=512): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 641.130193ms ago: executing program 6 (id=513): mknod(&(0x7f0000000540)='./file0\x00', 0x2000, 0x177d) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 489.395484ms ago: executing program 2 (id=514): writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000040)="fb408c0a5e1b2c1d6d00000080", 0xd}], 0x1) sysctl$vm_swapencrypt(&(0x7f0000000040)={0x7, 0x2, 0x2}, 0x4, &(0x7f0000000140)="118bea625d95de8f92c010baed45ec4bf03ace254b57973bb6de7b1c90301e9d3b5e6fb6ffffffffffffffff76c775a2a4e0556565a830032eef776127fd247103c14ab0a1cea9b4593be484f46a02ea73e910d041c5777bd852e57d3248832b91d06fe47d126022a1654859149e9486306d2f11fb1cc826c42f81b0d114f8af4ceb029a5210bb6947464bf678ba1d64a2013131fedfe60443aa13e015b28a16ea924bf89ad45c006213a6d0e194b9abcb3ddfab0c69b8c280bfc9c11f26026f6231b5e725921be8b099", 0x0, 0x0, 0xfffffffffffffd2a) 487.757848ms ago: executing program 7 (id=515): r0 = syz_open_pts() ioctl$TIOCGETD(r0, 0x4004741a, &(0x7f0000000180)) 485.32628ms ago: executing program 4 (id=516): mknod(&(0x7f0000000000)='./file0\x00', 0x44bf42bca2222dfe, 0x201) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0x102) 375.825354ms ago: executing program 5 (id=517): ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x4, 0x0, 0x0, 0x9}]}) sysctl$kern(&(0x7f0000000080)={0x1, 0x31}, 0x4000000000000004, 0x0, 0x0, 0x0, 0x0) 328.89984ms ago: executing program 3 (id=518): r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000e40), 0x0, 0x0) ioctl$WSMOUSEIO_SRES(r0, 0x80045721, &(0x7f0000000e80)=0x1) 325.753322ms ago: executing program 6 (id=519): r0 = socket(0x11, 0x3, 0x8) sendto$unix(r0, &(0x7f0000000100)="b10005016000009f0500000007000000001813fecea10500fef96ecfc72fd3357ae302b37b673039d2d236acf20b7804be38164991f7c8cf5f882b297be1aa5b23edeb51e2f0ac3ebbc257699a1f139b672f4d335c223e7d026ba8af6300372821020000000000008bfbb770c116a972c881ea772ec5890400000000ff0000361b1257aea8c500002002fbff0c1300008a09000000000008e37195f800040700000080042000"/177, 0xb1, 0x0, 0x0, 0x0) 325.487409ms ago: executing program 1 (id=520): r0 = syz_open_pts() ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000002e80)=0x7fff) 320.440212ms ago: executing program 0 (id=521): ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{}, {0x1, 0xc7}, {0x6, 0x3, 0x0, 0x85}]}) sysctl$kern(&(0x7f00000000c0)={0x1, 0x42}, 0x6, &(0x7f0000000100)="71f91e3471ac0058bc5a91501d94a34b8e5f84cf71b59c7afec37082", &(0x7f0000000080)=0x1918, 0x0, 0x37) 169.085544ms ago: executing program 4 (id=522): r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f00000000c0)="b10005010000009f050007de63000000211c13fecea70500fef96ecfc72fd3007ae30200fdef3044d2d236acf20bf404be01000000f7c8cf5f8823297be1aa0504000051dcf0ad3ebbc257699a1f139b672f335c22db83d77a2bfa896443c32118210000720fd38bfb0000fd54c125191b1257aea8c500001602fbfe0c2300008abfba0900000008e37183f8343712050500b71dc000090005080000fca65361ba84913f01000500"/177, 0xb1, 0x10, 0x0, 0x0) 164.431348ms ago: executing program 0 (id=523): sysctl$net_inet_icmp(&(0x7f0000000040), 0x4, 0x0, 0x0, 0x0, 0x0) sysctl$kern(&(0x7f0000000040)={0x1, 0x4f}, 0x3, 0x0, 0x0, &(0x7f0000000080)="4f1d4c6344b80ed788b6a4515248df3aa745bb992c574ab4cdf5587145812eab4a988f7fafd7a01d99776d988908cd186b51f34f8c15ffa0c685ad4116c783959eff4278384b4000384dbb1c2aaeff10b4135529a1da6fda67c67469d954be811b25ec5521559154c586eefff122009f659cd3e27e98a3241495005f102d9101d158284c0ee3250aa7c11042330de22a299ab00894fdc9bac6042d", 0xfffffc56) 162.844687ms ago: executing program 2 (id=524): r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f00000000c0)="b100051360000004000000000700000008008106cfa1e4fffdf96ecfc73fd3357ae36caa0416fa4f376b36acf00b7805be301e4991f7c8cf5f3fc303ebe1aa5323edeb51e2f0ca3ebbc257699a1f133ea7acb5d602000d7d026ba8af6300371c2102000000720fd38bfbb770c1f5a8aec872ea772ec58904000000008d9800361b1257aba8c500002012010000de5000"/177, 0xb1, 0x0, 0x0, 0x4f) 69.436531ms ago: executing program 3 (id=525): r0 = socket$inet(0x2, 0x3, 0x102) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x10}, 0x0) 67.880116ms ago: executing program 5 (id=526): r0 = getpgid(0x0) getpgid(r0) 65.624759ms ago: executing program 1 (id=527): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200100000001d, &(0x7f0000000000), 0x4) 0s ago: executing program 5 (id=528): r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) ioctl$FIOASYNC(r0, 0x8004667d, &(0x7f0000000140)=0x1ff) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.166' (ED25519) to the list of known hosts. malloc(): allocation too large, type = 6, size = 4076793856 panic: kernel diagnostic assertion "map->limit == rtmap_limit" failed: file "/syzkaller/managers/main/kernel/sys/net/rtable.c", line 131 Starting stack trace... panic(ffffffff830b361a) at panic+0x1ba __assert(ffffffff830686a1,ffffffff8303b3b4,83,ffffffff830aba09) at __assert+0x29 rtmap_grow(6,21) at rtmap_grow+0x1f3 rtable_add(5) at rtable_add+0x279 route_output(fffffd806b65ce00,fffffd80728aa600) at route_output+0x525 route_send(fffffd80728aa600,fffffd806b65ce00,0,0) at route_send+0xd7 sosend(fffffd80728aa600,0,ffff80002f3e7788,0,0,10) at sosend+0xa40 sendit(ffff80002a4d1970,3,ffff80002f3e7880,10,ffff80002f3e7930) at sendit+0x721 sys_sendto(ffff80002a4d1970,ffff80002f3e79e0,ffff80002f3e7930) at sys_sendto+0x8d syscall(ffff80002f3e79e0) at syscall+0x97e Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0xde4adf682c0, count: 246 End of stack trace.