WARNING: suspicious RCU usage in hsr_node_get_first batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active ============================= WARNING: suspicious RCU usage 5.17.0-rc3-next-20220211-syzkaller #0 Not tainted ----------------------------- net/hsr/hsr_framereg.c:34 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor.0/3592: #0: ffffffff8d333028 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline] #0: ffffffff8d333028 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 net/core/rtnetlink.c:5591 #1: ffff88801dbbd5f0 (&hsr->list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:359 [inline] #1: ffff88801dbbd5f0 (&hsr->list_lock){+...}-{2:2}, at: hsr_create_self_node+0x225/0x650 net/hsr/hsr_framereg.c:108 stack backtrace: CPU: 0 PID: 3592 Comm: syz-executor.0 Not tainted 5.17.0-rc3-next-20220211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 hsr_node_get_first+0x9b/0xb0 net/hsr/hsr_framereg.c:34 hsr_create_self_node+0x22d/0x650 net/hsr/hsr_framereg.c:109 hsr_dev_finalize+0x2c1/0x7d0 net/hsr/hsr_device.c:514 hsr_newlink+0x315/0x730 net/hsr/hsr_netlink.c:102 __rtnl_newlink+0x107c/0x1760 net/core/rtnetlink.c:3481 rtnl_newlink+0x64/0xa0 net/core/rtnetlink.c:3529 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5594 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494 netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline] netlink_unicast+0x539/0x7e0 net/netlink/af_netlink.c:1343 netlink_sendmsg+0x904/0xe00 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:705 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:725 __sys_sendto+0x21c/0x320 net/socket.c:2040 __do_sys_sendto net/socket.c:2052 [inline] __se_sys_sendto net/socket.c:2048 [inline] __x64_sys_sendto+0xdd/0x1b0 net/socket.c:2048 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fd05df5de1c Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b RSP: 002b:00007ffe0538b4f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007fd05eff6320 RCX: 00007fd05df5de1c RDX: 0000000000000048 RSI: 00007fd05eff6370 RDI: 0000000000000003 RBP: 0000000000000000 R08: 00007ffe0538b544 R09: 000000000000000c R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007fd05eff6370 R14: 0000000000000003 R15: 0000000000000000 device hsr_slave_0 entered promiscuous mode device hsr_slave_1 entered promiscuous mode netdevsim netdevsim0 netdevsim0: renamed from eth0 netdevsim netdevsim0 netdevsim1: renamed from eth1 netdevsim netdevsim0 netdevsim2: renamed from eth2 netdevsim netdevsim0 netdevsim3: renamed from eth3 bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered forwarding state bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered forwarding state 8021q: adding VLAN 0 to HW filter on device bond0 8021q: adding VLAN 0 to HW filter on device team0 hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 8021q: adding VLAN 0 to HW filter on device batadv0 device veth0_vlan entered promiscuous mode device veth1_vlan entered promiscuous mode device veth0_macvtap entered promiscuous mode device veth1_macvtap entered promiscuous mode batman_adv: batadv0: Interface activated: batadv_slave_0 batman_adv: batadv0: Interface activated: batadv_slave_1 netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 forked to background, child pid 3169 no interfaces have a carrier [ 20.191329][ T3170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 20.201096][ T3170] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 26.797048][ T3372] sshd (3372) used greatest stack depth: 22896 bytes left Warning: Permanently added '10.128.1.105' (ECDSA) to the list of known hosts. 2022/02/13 14:45:46 fuzzer started 2022/02/13 14:45:46 connecting to host at 10.128.0.169:45639 2022/02/13 14:45:46 checking machine... 2022/02/13 14:45:46 checking revisions... 2022/02/13 14:45:46 testing simple program... [ 34.624241][ T3590] cgroup: Unknown subsys name 'net' [ 34.735576][ T3590] cgroup: Unknown subsys name 'rlimit' [ 35.956902][ T3594] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 35.964741][ T3594] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 35.972186][ T3594] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 35.979767][ T3594] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 35.987512][ T3594] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 35.994808][ T3594] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 36.064894][ T3592] chnl_net:caif_netlink_parms(): no params data found [ 36.099537][ T3592] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.107248][ T3592] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.115066][ T3592] device bridge_slave_0 entered promiscuous mode [ 36.123334][ T3592] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.130393][ T3592] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.138384][ T3592] device bridge_slave_1 entered promiscuous mode [ 36.155856][ T3592] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.166366][ T3592] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.185758][ T3592] team0: Port device team_slave_0 added [ 36.192550][ T3592] team0: Port device team_slave_1 added [ 36.208083][ T3592] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.215197][ T3592] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.241438][ T3592] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.253750][ T3592] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.260759][ T3592] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.287148][ T3592] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.308570][ T3592] [ 36.310992][ T3592] ============================= [ 36.315830][ T3592] WARNING: suspicious RCU usage [ 36.320690][ T3592] 5.17.0-rc3-next-20220211-syzkaller #0 Not tainted [ 36.327271][ T3592] ----------------------------- [ 36.332152][ T3592] net/hsr/hsr_framereg.c:34 suspicious rcu_dereference_check() usage! [ 36.340283][ T3592] [ 36.340283][ T3592] other info that might help us debug this: [ 36.340283][ T3592] [ 36.350597][ T3592] [ 36.350597][ T3592] rcu_scheduler_active = 2, debug_locks = 1 [ 36.358658][ T3592] 2 locks held by syz-executor.0/3592: [ 36.364129][ T3592] #0: ffffffff8d333028 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 36.373573][ T3592] #1: ffff88801dbbd5f0 (&hsr->list_lock){+...}-{2:2}, at: hsr_create_self_node+0x225/0x650 [ 36.383685][ T3592] [ 36.383685][ T3592] stack backtrace: [ 36.389557][ T3592] CPU: 0 PID: 3592 Comm: syz-executor.0 Not tainted 5.17.0-rc3-next-20220211-syzkaller #0 [ 36.399520][ T3592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.409724][ T3592] Call Trace: [ 36.412980][ T3592] [ 36.415886][ T3592] dump_stack_lvl+0xcd/0x134 [ 36.420456][ T3592] hsr_node_get_first+0x9b/0xb0 [ 36.425287][ T3592] hsr_create_self_node+0x22d/0x650 [ 36.430474][ T3592] hsr_dev_finalize+0x2c1/0x7d0 [ 36.435308][ T3592] hsr_newlink+0x315/0x730 [ 36.439707][ T3592] ? hsr_dellink+0x130/0x130 [ 36.444320][ T3592] ? rtnl_create_link+0x7e8/0xc00 [ 36.449335][ T3592] ? hsr_dellink+0x130/0x130 [ 36.453922][ T3592] __rtnl_newlink+0x107c/0x1760 [ 36.458767][ T3592] ? rtnl_setlink+0x3c0/0x3c0 [ 36.463439][ T3592] ? is_bpf_text_address+0x77/0x170 [ 36.468639][ T3592] ? lock_downgrade+0x6e0/0x6e0 [ 36.473488][ T3592] ? unwind_next_frame+0xee1/0x1ce0 [ 36.478680][ T3592] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 36.484743][ T3592] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 36.490454][ T3592] ? is_bpf_text_address+0x99/0x170 [ 36.495650][ T3592] ? kernel_text_address+0x39/0x80 [ 36.500756][ T3592] ? __kernel_text_address+0x9/0x30 [ 36.505943][ T3592] ? unwind_get_return_address+0x51/0x90 [ 36.511561][ T3592] ? create_prof_cpu_mask+0x20/0x20 [ 36.516751][ T3592] ? arch_stack_walk+0x93/0xe0 [ 36.521632][ T3592] ? kmem_cache_alloc_trace+0x42/0x2c0 [ 36.527089][ T3592] ? rcu_read_lock_sched_held+0x3a/0x70 [ 36.532630][ T3592] rtnl_newlink+0x64/0xa0 [ 36.536947][ T3592] ? __rtnl_newlink+0x1760/0x1760 [ 36.541957][ T3592] rtnetlink_rcv_msg+0x413/0xb80 [ 36.546886][ T3592] ? rtnl_newlink+0xa0/0xa0 [ 36.551384][ T3592] netlink_rcv_skb+0x153/0x420 [ 36.556137][ T3592] ? rtnl_newlink+0xa0/0xa0 [ 36.560626][ T3592] ? netlink_ack+0xa80/0xa80 [ 36.565197][ T3592] ? netlink_deliver_tap+0x1a2/0xc40 [ 36.570470][ T3592] ? netlink_deliver_tap+0x1b1/0xc40 [ 36.575743][ T3592] netlink_unicast+0x539/0x7e0 [ 36.580500][ T3592] ? netlink_attachskb+0x880/0x880 [ 36.585592][ T3592] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.591905][ T3592] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.598130][ T3592] ? __phys_addr_symbol+0x2c/0x70 [ 36.603144][ T3592] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 36.608850][ T3592] ? __check_object_size+0x16c/0x4f0 [ 36.614126][ T3592] netlink_sendmsg+0x904/0xe00 [ 36.618881][ T3592] ? netlink_unicast+0x7e0/0x7e0 [ 36.623808][ T3592] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 36.630037][ T3592] ? netlink_unicast+0x7e0/0x7e0 [ 36.634958][ T3592] sock_sendmsg+0xcf/0x120 [ 36.639363][ T3592] __sys_sendto+0x21c/0x320 [ 36.643857][ T3592] ? __ia32_sys_getpeername+0xb0/0xb0 [ 36.649218][ T3592] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 36.655202][ T3592] ? __context_tracking_exit+0xb8/0xe0 [ 36.660651][ T3592] ? lock_downgrade+0x6e0/0x6e0 [ 36.665493][ T3592] ? lock_downgrade+0x6e0/0x6e0 [ 36.670345][ T3592] __x64_sys_sendto+0xdd/0x1b0 [ 36.675095][ T3592] ? lockdep_hardirqs_on+0x79/0x100 [ 36.680281][ T3592] ? syscall_enter_from_user_mode+0x21/0x70 [ 36.686163][ T3592] do_syscall_64+0x35/0xb0 [ 36.690564][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 36.696446][ T3592] RIP: 0033:0x7fd05df5de1c [ 36.700844][ T3592] Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b [ 36.720433][ T3592] RSP: 002b:00007ffe0538b4f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 36.728828][ T3592] RAX: ffffffffffffffda RBX: 00007fd05eff6320 RCX: 00007fd05df5de1c [ 36.736789][ T3592] RDX: 0000000000000048 RSI: 00007fd05eff6370 RDI: 0000000000000003 [ 36.744741][ T3592] RBP: 0000000000000000 R08: 00007ffe0538b544 R09: 000000000000000c [ 36.752693][ T3592] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 36.760648][ T3592] R13: 00007fd05eff6370 R14: 0000000000000003 R15: 0000000000000000 [ 36.768611][ T3592] [ 36.775288][ T3592] device hsr_slave_0 entered promiscuous mode [ 36.782460][ T3592] device hsr_slave_1 entered promiscuous mode [ 36.846281][ T3592] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.855721][ T3592] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.863966][ T3592] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.872804][ T3592] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.889634][ T3592] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.896806][ T3592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.904625][ T3592] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.911712][ T3592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.948739][ T3592] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.959297][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.968456][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.976906][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.985132][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 36.996979][ T3592] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.006197][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.015084][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.022166][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.032448][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.041690][ T3602] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.048742][ T3602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.060704][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 37.069148][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 37.082695][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 37.091804][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.100273][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.114560][ T3592] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.125486][ T3592] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.137347][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.145897][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.154473][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.163437][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.171735][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.179948][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.195638][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.205746][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.213292][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.224740][ T3592] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.333685][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.342498][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.358715][ T3592] device veth0_vlan entered promiscuous mode [ 37.366008][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.374769][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.383555][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.391749][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.402854][ T3592] device veth1_vlan entered promiscuous mode [ 37.418881][ T3592] device veth0_macvtap entered promiscuous mode [ 37.426142][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.434094][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.441985][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.450204][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.459896][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.468965][ T3592] device veth1_macvtap entered promiscuous mode executing program [ 37.482028][ T3592] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.489657][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.497948][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.507000][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.517749][ T3592] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.526024][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.534374][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.544068][ T3592] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.553376][ T3592] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.562153][ T3592] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.571436][ T3592] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.619483][ T936] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 37.628097][ T936] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 37.641545][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 37.651904][ T936] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 37.659854][ T936] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2022/02/13 14:45:49 building call list... [ 37.668407][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 39.556437][ T3586] can: request_module (can-proto-0) failed. [ 39.575148][ T3586] can: request_module (can-proto-0) failed. [ 39.593442][ T3586] can: request_module (can-proto-0) failed.