[ 72.282119][ T145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.290444][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.298992][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.307897][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.316066][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.325129][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.336058][ T3677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.355697][ T3677] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.463084][ T3685] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 76.246632][ T14] cfg80211: failed to load regulatory.db [ 432.315697][ T41] device hsr_slave_0 left promiscuous mode [ 432.322282][ T41] device hsr_slave_1 left promiscuous mode [ 432.330351][ T41] device bridge_slave_1 left promiscuous mode [ 432.337472][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.348235][ T41] device bridge_slave_0 left promiscuous mode [ 432.354890][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.412372][ T41] team0 (unregistering): Port device team_slave_1 removed [ 432.426961][ T41] team0 (unregistering): Port device team_slave_0 removed [ 432.441429][ T41] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 432.455472][ T41] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 432.499175][ T41] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts.