WARNING: suspicious RCU usage in hsr_node_get_first
batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
=============================
WARNING: suspicious RCU usage
5.17.0-rc3-next-20220211-syzkaller #0 Not tainted
-----------------------------
net/hsr/hsr_framereg.c:34 suspicious rcu_dereference_check() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
2 locks held by syz-executor.0/3592:
#0: ffffffff8d333028 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline]
#0: ffffffff8d333028 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 net/core/rtnetlink.c:5591
#1: ffff88801dbbd5f0 (&hsr->list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:359 [inline]
#1: ffff88801dbbd5f0 (&hsr->list_lock){+...}-{2:2}, at: hsr_create_self_node+0x225/0x650 net/hsr/hsr_framereg.c:108
stack backtrace:
CPU: 0 PID: 3592 Comm: syz-executor.0 Not tainted 5.17.0-rc3-next-20220211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
hsr_node_get_first+0x9b/0xb0 net/hsr/hsr_framereg.c:34
hsr_create_self_node+0x22d/0x650 net/hsr/hsr_framereg.c:109
hsr_dev_finalize+0x2c1/0x7d0 net/hsr/hsr_device.c:514
hsr_newlink+0x315/0x730 net/hsr/hsr_netlink.c:102
__rtnl_newlink+0x107c/0x1760 net/core/rtnetlink.c:3481
rtnl_newlink+0x64/0xa0 net/core/rtnetlink.c:3529
rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5594
netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494
netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
netlink_unicast+0x539/0x7e0 net/netlink/af_netlink.c:1343
netlink_sendmsg+0x904/0xe00 net/netlink/af_netlink.c:1919
sock_sendmsg_nosec net/socket.c:705 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:725
__sys_sendto+0x21c/0x320 net/socket.c:2040
__do_sys_sendto net/socket.c:2052 [inline]
__se_sys_sendto net/socket.c:2048 [inline]
__x64_sys_sendto+0xdd/0x1b0 net/socket.c:2048
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fd05df5de1c
Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b
RSP: 002b:00007ffe0538b4f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007fd05eff6320 RCX: 00007fd05df5de1c
RDX: 0000000000000048 RSI: 00007fd05eff6370 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffe0538b544 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00007fd05eff6370 R14: 0000000000000003 R15: 0000000000000000
device hsr_slave_0 entered promiscuous mode
device hsr_slave_1 entered promiscuous mode
netdevsim netdevsim0 netdevsim0: renamed from eth0
netdevsim netdevsim0 netdevsim1: renamed from eth1
netdevsim netdevsim0 netdevsim2: renamed from eth2
netdevsim netdevsim0 netdevsim3: renamed from eth3
bridge0: port 2(bridge_slave_1) entered blocking state
bridge0: port 2(bridge_slave_1) entered forwarding state
bridge0: port 1(bridge_slave_0) entered blocking state
bridge0: port 1(bridge_slave_0) entered forwarding state
8021q: adding VLAN 0 to HW filter on device bond0
8021q: adding VLAN 0 to HW filter on device team0
hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
8021q: adding VLAN 0 to HW filter on device batadv0
device veth0_vlan entered promiscuous mode
device veth1_vlan entered promiscuous mode
device veth0_macvtap entered promiscuous mode
device veth1_macvtap entered promiscuous mode
batman_adv: batadv0: Interface activated: batadv_slave_0
batman_adv: batadv0: Interface activated: batadv_slave_1
netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
forked to background, child pid 3169
no interfaces have a carrier
[ 20.191329][ T3170] 8021q: adding VLAN 0 to HW filter on device bond0
[ 20.201096][ T3170] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK
syzkaller
syzkaller login: [ 26.797048][ T3372] sshd (3372) used greatest stack depth: 22896 bytes left
Warning: Permanently added '10.128.1.105' (ECDSA) to the list of known hosts.
2022/02/13 14:45:46 fuzzer started
2022/02/13 14:45:46 connecting to host at 10.128.0.169:45639
2022/02/13 14:45:46 checking machine...
2022/02/13 14:45:46 checking revisions...
2022/02/13 14:45:46 testing simple program...
[ 34.624241][ T3590] cgroup: Unknown subsys name 'net'
[ 34.735576][ T3590] cgroup: Unknown subsys name 'rlimit'
[ 35.956902][ T3594] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 35.964741][ T3594] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 35.972186][ T3594] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 35.979767][ T3594] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 35.987512][ T3594] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 35.994808][ T3594] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 36.064894][ T3592] chnl_net:caif_netlink_parms(): no params data found
[ 36.099537][ T3592] bridge0: port 1(bridge_slave_0) entered blocking state
[ 36.107248][ T3592] bridge0: port 1(bridge_slave_0) entered disabled state
[ 36.115066][ T3592] device bridge_slave_0 entered promiscuous mode
[ 36.123334][ T3592] bridge0: port 2(bridge_slave_1) entered blocking state
[ 36.130393][ T3592] bridge0: port 2(bridge_slave_1) entered disabled state
[ 36.138384][ T3592] device bridge_slave_1 entered promiscuous mode
[ 36.155856][ T3592] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 36.166366][ T3592] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 36.185758][ T3592] team0: Port device team_slave_0 added
[ 36.192550][ T3592] team0: Port device team_slave_1 added
[ 36.208083][ T3592] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 36.215197][ T3592] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 36.241438][ T3592] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 36.253750][ T3592] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 36.260759][ T3592] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 36.287148][ T3592] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 36.308570][ T3592]
[ 36.310992][ T3592] =============================
[ 36.315830][ T3592] WARNING: suspicious RCU usage
[ 36.320690][ T3592] 5.17.0-rc3-next-20220211-syzkaller #0 Not tainted
[ 36.327271][ T3592] -----------------------------
[ 36.332152][ T3592] net/hsr/hsr_framereg.c:34 suspicious rcu_dereference_check() usage!
[ 36.340283][ T3592]
[ 36.340283][ T3592] other info that might help us debug this:
[ 36.340283][ T3592]
[ 36.350597][ T3592]
[ 36.350597][ T3592] rcu_scheduler_active = 2, debug_locks = 1
[ 36.358658][ T3592] 2 locks held by syz-executor.0/3592:
[ 36.364129][ T3592] #0: ffffffff8d333028 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80
[ 36.373573][ T3592] #1: ffff88801dbbd5f0 (&hsr->list_lock){+...}-{2:2}, at: hsr_create_self_node+0x225/0x650
[ 36.383685][ T3592]
[ 36.383685][ T3592] stack backtrace:
[ 36.389557][ T3592] CPU: 0 PID: 3592 Comm: syz-executor.0 Not tainted 5.17.0-rc3-next-20220211-syzkaller #0
[ 36.399520][ T3592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 36.409724][ T3592] Call Trace:
[ 36.412980][ T3592]
[ 36.415886][ T3592] dump_stack_lvl+0xcd/0x134
[ 36.420456][ T3592] hsr_node_get_first+0x9b/0xb0
[ 36.425287][ T3592] hsr_create_self_node+0x22d/0x650
[ 36.430474][ T3592] hsr_dev_finalize+0x2c1/0x7d0
[ 36.435308][ T3592] hsr_newlink+0x315/0x730
[ 36.439707][ T3592] ? hsr_dellink+0x130/0x130
[ 36.444320][ T3592] ? rtnl_create_link+0x7e8/0xc00
[ 36.449335][ T3592] ? hsr_dellink+0x130/0x130
[ 36.453922][ T3592] __rtnl_newlink+0x107c/0x1760
[ 36.458767][ T3592] ? rtnl_setlink+0x3c0/0x3c0
[ 36.463439][ T3592] ? is_bpf_text_address+0x77/0x170
[ 36.468639][ T3592] ? lock_downgrade+0x6e0/0x6e0
[ 36.473488][ T3592] ? unwind_next_frame+0xee1/0x1ce0
[ 36.478680][ T3592] ? entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.484743][ T3592] ? __sanitizer_cov_trace_cmp4+0x1c/0x70
[ 36.490454][ T3592] ? is_bpf_text_address+0x99/0x170
[ 36.495650][ T3592] ? kernel_text_address+0x39/0x80
[ 36.500756][ T3592] ? __kernel_text_address+0x9/0x30
[ 36.505943][ T3592] ? unwind_get_return_address+0x51/0x90
[ 36.511561][ T3592] ? create_prof_cpu_mask+0x20/0x20
[ 36.516751][ T3592] ? arch_stack_walk+0x93/0xe0
[ 36.521632][ T3592] ? kmem_cache_alloc_trace+0x42/0x2c0
[ 36.527089][ T3592] ? rcu_read_lock_sched_held+0x3a/0x70
[ 36.532630][ T3592] rtnl_newlink+0x64/0xa0
[ 36.536947][ T3592] ? __rtnl_newlink+0x1760/0x1760
[ 36.541957][ T3592] rtnetlink_rcv_msg+0x413/0xb80
[ 36.546886][ T3592] ? rtnl_newlink+0xa0/0xa0
[ 36.551384][ T3592] netlink_rcv_skb+0x153/0x420
[ 36.556137][ T3592] ? rtnl_newlink+0xa0/0xa0
[ 36.560626][ T3592] ? netlink_ack+0xa80/0xa80
[ 36.565197][ T3592] ? netlink_deliver_tap+0x1a2/0xc40
[ 36.570470][ T3592] ? netlink_deliver_tap+0x1b1/0xc40
[ 36.575743][ T3592] netlink_unicast+0x539/0x7e0
[ 36.580500][ T3592] ? netlink_attachskb+0x880/0x880
[ 36.585592][ T3592] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.591905][ T3592] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.598130][ T3592] ? __phys_addr_symbol+0x2c/0x70
[ 36.603144][ T3592] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 36.608850][ T3592] ? __check_object_size+0x16c/0x4f0
[ 36.614126][ T3592] netlink_sendmsg+0x904/0xe00
[ 36.618881][ T3592] ? netlink_unicast+0x7e0/0x7e0
[ 36.623808][ T3592] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.630037][ T3592] ? netlink_unicast+0x7e0/0x7e0
[ 36.634958][ T3592] sock_sendmsg+0xcf/0x120
[ 36.639363][ T3592] __sys_sendto+0x21c/0x320
[ 36.643857][ T3592] ? __ia32_sys_getpeername+0xb0/0xb0
[ 36.649218][ T3592] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 36.655202][ T3592] ? __context_tracking_exit+0xb8/0xe0
[ 36.660651][ T3592] ? lock_downgrade+0x6e0/0x6e0
[ 36.665493][ T3592] ? lock_downgrade+0x6e0/0x6e0
[ 36.670345][ T3592] __x64_sys_sendto+0xdd/0x1b0
[ 36.675095][ T3592] ? lockdep_hardirqs_on+0x79/0x100
[ 36.680281][ T3592] ? syscall_enter_from_user_mode+0x21/0x70
[ 36.686163][ T3592] do_syscall_64+0x35/0xb0
[ 36.690564][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.696446][ T3592] RIP: 0033:0x7fd05df5de1c
[ 36.700844][ T3592] Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b
[ 36.720433][ T3592] RSP: 002b:00007ffe0538b4f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 36.728828][ T3592] RAX: ffffffffffffffda RBX: 00007fd05eff6320 RCX: 00007fd05df5de1c
[ 36.736789][ T3592] RDX: 0000000000000048 RSI: 00007fd05eff6370 RDI: 0000000000000003
[ 36.744741][ T3592] RBP: 0000000000000000 R08: 00007ffe0538b544 R09: 000000000000000c
[ 36.752693][ T3592] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 36.760648][ T3592] R13: 00007fd05eff6370 R14: 0000000000000003 R15: 0000000000000000
[ 36.768611][ T3592]
[ 36.775288][ T3592] device hsr_slave_0 entered promiscuous mode
[ 36.782460][ T3592] device hsr_slave_1 entered promiscuous mode
[ 36.846281][ T3592] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 36.855721][ T3592] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 36.863966][ T3592] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 36.872804][ T3592] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 36.889634][ T3592] bridge0: port 2(bridge_slave_1) entered blocking state
[ 36.896806][ T3592] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 36.904625][ T3592] bridge0: port 1(bridge_slave_0) entered blocking state
[ 36.911712][ T3592] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 36.948739][ T3592] 8021q: adding VLAN 0 to HW filter on device bond0
[ 36.959297][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 36.968456][ T6] bridge0: port 1(bridge_slave_0) entered disabled state
[ 36.976906][ T6] bridge0: port 2(bridge_slave_1) entered disabled state
[ 36.985132][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 36.996979][ T3592] 8021q: adding VLAN 0 to HW filter on device team0
[ 37.006197][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 37.015084][ T6] bridge0: port 1(bridge_slave_0) entered blocking state
[ 37.022166][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 37.032448][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 37.041690][ T3602] bridge0: port 2(bridge_slave_1) entered blocking state
[ 37.048742][ T3602] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 37.060704][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 37.069148][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 37.082695][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 37.091804][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 37.100273][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 37.114560][ T3592] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 37.125486][ T3592] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 37.137347][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 37.145897][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 37.154473][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 37.163437][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 37.171735][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 37.179948][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 37.195638][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 37.205746][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 37.213292][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 37.224740][ T3592] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 37.333685][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 37.342498][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 37.358715][ T3592] device veth0_vlan entered promiscuous mode
[ 37.366008][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 37.374769][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 37.383555][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 37.391749][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 37.402854][ T3592] device veth1_vlan entered promiscuous mode
[ 37.418881][ T3592] device veth0_macvtap entered promiscuous mode
[ 37.426142][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 37.434094][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 37.441985][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 37.450204][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 37.459896][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 37.468965][ T3592] device veth1_macvtap entered promiscuous mode
executing program
[ 37.482028][ T3592] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 37.489657][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 37.497948][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 37.507000][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 37.517749][ T3592] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 37.526024][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 37.534374][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 37.544068][ T3592] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.553376][ T3592] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.562153][ T3592] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.571436][ T3592] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.619483][ T936] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 37.628097][ T936] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 37.641545][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 37.651904][ T936] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 37.659854][ T936] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
2022/02/13 14:45:49 building call list...
[ 37.668407][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 39.556437][ T3586] can: request_module (can-proto-0) failed.
[ 39.575148][ T3586] can: request_module (can-proto-0) failed.
[ 39.593442][ T3586] can: request_module (can-proto-0) failed.