workhorsy / py-cpuinfo

A module for getting CPU info with pure Python
MIT License
310 stars 59 forks source link

raspberrypi 4 - can this work? #175

Open viotemp1 opened 2 years ago

viotemp1 commented 2 years ago

In your bug report please include:

===============================================================================

cat system_info.txt sys.executable:

/usr/local/bin/python

sys.version_info:

sys.version_info(major=3, minor=10, micro=5, releaselevel='final', serial=0)

sys.maxsize:

9223372036854775807 (64 bit)

multiprocessing.cpu_count:

4

os.cpu_count:

4

os.sysconf('SC_NPROCESSORS_ONLN'):

4

sysctl -n hw.ncpu:

platform.uname:

uname_result(system='Linux', node='homeassistant', release='5.15.32-v8', version='#1 SMP PREEMPT Sat Jul 23 18:06:19 UTC 2022', machine='aarch64')

platform.architecture:

('64bit', '')

platform.system:

Linux

platform.machine:

aarch64

cat /proc/cpuinfo:

processor : 0 BogoMIPS : 108.00 Features : fp asimd evtstrm crc32 cpuid CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd08 CPU revision : 3

processor : 1 BogoMIPS : 108.00 Features : fp asimd evtstrm crc32 cpuid CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd08 CPU revision : 3

processor : 2 BogoMIPS : 108.00 Features : fp asimd evtstrm crc32 cpuid CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd08 CPU revision : 3

processor : 3 BogoMIPS : 108.00 Features : fp asimd evtstrm crc32 cpuid CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd08 CPU revision : 3

Hardware : BCM2835 Revision : c03115 Serial : 10000000e0e3a489 Model : Raspberry Pi 4 Model B Rev 1.5

sysctl machdep.cpu hw.cpufrequency:

sysctl hw.model hw.machine:

dmesg -a:

[107712.154937] audit: type=1327 audit(1661108338.427:2010): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4C002D6E [107712.170058] audit: type=1325 audit(1661108338.443:2011): table=nat family=2 entries=5 op=xt_replace pid=329842 subj==unconfined comm="iptables" [107712.265326] eth0: renamed from vethee625b8 [107712.297080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0c5356c: link becomes ready [107712.297231] hassio: port 10(veth0c5356c) entered blocking state [107712.297250] hassio: port 10(veth0c5356c) entered forwarding state [107730.859678] vethee625b8: renamed from eth0 [107730.876280] hassio: port 10(veth0c5356c) entered disabled state [107730.919561] hassio: port 10(veth0c5356c) entered disabled state [107730.921662] device veth0c5356c left promiscuous mode [107730.921700] hassio: port 10(veth0c5356c) entered disabled state [107730.921731] kauditd_printk_skb: 23 callbacks suppressed [107730.921738] audit: type=1700 audit(1661108357.186:2019): dev=veth0c5356c prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 [107730.968657] audit: type=1300 audit(1661108357.186:2019): arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=4000c7c2c0 a2=20 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [107730.968722] audit: type=1327 audit(1661108357.186:2019): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [107731.049281] audit: type=1325 audit(1661108357.322:2020): table=nat family=2 entries=15 op=xt_unregister pid=328620 subj==unconfined comm="kworker/u8:1" [107731.049327] audit: type=1325 audit(1661108357.322:2021): table=filter family=2 entries=4 op=xt_unregister pid=328620 subj==unconfined comm="kworker/u8:1" [108354.269627] hassio: port 10(veth1fadb09) entered blocking state [108354.269657] hassio: port 10(veth1fadb09) entered disabled state [108354.270420] device veth1fadb09 entered promiscuous mode [108354.270502] audit: type=1700 audit(1661108980.533:2022): dev=veth1fadb09 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 [108354.271331] audit: type=1300 audit(1661108980.533:2022): arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=4001648570 a2=28 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [108354.271365] audit: type=1327 audit(1661108980.533:2022): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [108354.932567] audit: type=1325 audit(1661108981.193:2023): table=nat family=2 entries=0 op=xt_register pid=332828 subj==unconfined comm="iptables" [108354.932607] audit: type=1300 audit(1661108981.193:2023): arch=c00000b7 syscall=209 success=yes exit=0 a0=4 a1=0 a2=40 a3=7fc7e04eb0 items=0 ppid=332821 pid=332828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-legacy-multi" subj==unconfined key=(null) [108354.932622] audit: type=1327 audit(1661108981.193:2023): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4C002D6E [108354.946234] audit: type=1325 audit(1661108981.209:2024): table=filter family=2 entries=0 op=xt_register pid=332830 subj==unconfined comm="iptables" [108354.946269] audit: type=1300 audit(1661108981.209:2024): arch=c00000b7 syscall=209 success=yes exit=0 a0=4 a1=0 a2=40 a3=7fc697e950 items=0 ppid=332821 pid=332830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-legacy-multi" subj==unconfined key=(null) [108354.947116] audit: type=1327 audit(1661108981.209:2024): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4C002D6E [108354.958854] audit: type=1325 audit(1661108981.221:2025): table=nat family=2 entries=5 op=xt_replace pid=332833 subj==unconfined comm="iptables" [108355.024495] eth0: renamed from vethb46c987 [108355.042571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1fadb09: link becomes ready [108355.042739] hassio: port 10(veth1fadb09) entered blocking state [108355.042754] hassio: port 10(veth1fadb09) entered forwarding state [111408.500831] hassio: port 10(veth1fadb09) entered disabled state [111408.501308] vethb46c987: renamed from eth0 [111408.580146] hassio: port 10(veth1fadb09) entered disabled state [111408.582247] device veth1fadb09 left promiscuous mode [111408.582289] hassio: port 10(veth1fadb09) entered disabled state [111408.582377] kauditd_printk_skb: 23 callbacks suppressed [111408.582384] audit: type=1700 audit(1661112034.792:2033): dev=veth1fadb09 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 [111408.650653] audit: type=1300 audit(1661112034.792:2033): arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=4000c7c680 a2=20 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111408.650708] audit: type=1327 audit(1661112034.792:2033): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111408.751670] audit: type=1325 audit(1661112034.972:2034): table=nat family=2 entries=15 op=xt_unregister pid=336971 subj==unconfined comm="kworker/u8:0" [111408.751709] audit: type=1325 audit(1661112034.972:2035): table=filter family=2 entries=4 op=xt_unregister pid=336971 subj==unconfined comm="kworker/u8:0" [111409.011362] hassio: port 10(vethf0b7903) entered blocking state [111409.011385] hassio: port 10(vethf0b7903) entered disabled state [111409.011772] device vethf0b7903 entered promiscuous mode [111409.011845] audit: type=1700 audit(1661112035.232:2036): dev=vethf0b7903 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 [111409.013647] audit: type=1300 audit(1661112035.232:2036): arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=4000e1fb90 a2=28 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111409.013676] audit: type=1327 audit(1661112035.232:2036): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111409.014024] hassio: port 10(vethf0b7903) entered blocking state [111409.014038] hassio: port 10(vethf0b7903) entered forwarding state [111409.502541] hassio: port 10(vethf0b7903) entered disabled state [111409.582507] audit: type=1325 audit(1661112035.800:2037): table=nat family=2 entries=0 op=xt_register pid=338049 subj==unconfined comm="iptables" [111409.583182] audit: type=1300 audit(1661112035.800:2037): arch=c00000b7 syscall=209 success=yes exit=0 a0=4 a1=0 a2=40 a3=7fe5aafff0 items=0 ppid=338041 pid=338049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-legacy-multi" subj==unconfined key=(null) [111409.676049] eth0: renamed from vetha02d7e7 [111409.696803] IPv6: ADDRCONF(NETDEV_CHANGE): vethf0b7903: link becomes ready [111409.696981] hassio: port 10(vethf0b7903) entered blocking state [111409.696995] hassio: port 10(vethf0b7903) entered forwarding state [111427.331717] hassio: port 10(vethf0b7903) entered disabled state [111427.332187] vetha02d7e7: renamed from eth0 [111427.404961] hassio: port 10(vethf0b7903) entered disabled state [111427.407567] device vethf0b7903 left promiscuous mode [111427.407641] kauditd_printk_skb: 28 callbacks suppressed [111427.407647] audit: type=1700 audit(1661112053.619:2047): dev=vethf0b7903 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 [111427.407664] hassio: port 10(vethf0b7903) entered disabled state [111427.451050] audit: type=1300 audit(1661112053.619:2047): arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=4000c0b420 a2=20 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111427.451088] audit: type=1327 audit(1661112053.619:2047): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111427.559861] audit: type=1325 audit(1661112053.779:2048): table=nat family=2 entries=15 op=xt_unregister pid=336971 subj==unconfined comm="kworker/u8:0" [111427.559899] audit: type=1325 audit(1661112053.779:2049): table=filter family=2 entries=4 op=xt_unregister pid=336971 subj==unconfined comm="kworker/u8:0" [111427.827924] hassio: port 10(vethdefca93) entered blocking state [111427.827952] hassio: port 10(vethdefca93) entered disabled state [111427.828379] device vethdefca93 entered promiscuous mode [111427.828465] audit: type=1700 audit(1661112054.047:2050): dev=vethdefca93 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 [111427.829322] audit: type=1300 audit(1661112054.047:2050): arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=4001ccfbc0 a2=28 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111427.830117] audit: type=1327 audit(1661112054.047:2050): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111427.834924] hassio: port 10(vethdefca93) entered blocking state [111427.834947] hassio: port 10(vethdefca93) entered forwarding state [111428.350921] hassio: port 10(vethdefca93) entered disabled state [111428.388248] audit: type=1325 audit(1661112054.607:2051): table=nat family=2 entries=0 op=xt_register pid=338530 subj==unconfined comm="iptables" [111428.388282] audit: type=1300 audit(1661112054.607:2051): arch=c00000b7 syscall=209 success=yes exit=0 a0=4 a1=0 a2=40 a3=7fce86a1e0 items=0 ppid=338522 pid=338530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-legacy-multi" subj==unconfined key=(null) [111428.505571] eth0: renamed from veth994629d [111428.533061] IPv6: ADDRCONF(NETDEV_CHANGE): vethdefca93: link becomes ready [111428.533289] hassio: port 10(vethdefca93) entered blocking state [111428.533308] hassio: port 10(vethdefca93) entered forwarding state [111443.786138] veth994629d: renamed from eth0 [111443.799560] hassio: port 10(vethdefca93) entered disabled state [111443.854192] hassio: port 10(vethdefca93) entered disabled state [111443.856115] device vethdefca93 left promiscuous mode [111443.856186] kauditd_printk_skb: 28 callbacks suppressed [111443.856190] audit: type=1700 audit(1661112070.063:2061): dev=vethdefca93 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 [111443.856208] hassio: port 10(vethdefca93) entered disabled state [111443.919099] audit: type=1300 audit(1661112070.063:2061): arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=4000c0bb40 a2=20 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111443.919133] audit: type=1327 audit(1661112070.063:2061): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111443.997415] audit: type=1325 audit(1661112070.215:2062): table=nat family=2 entries=15 op=xt_unregister pid=337602 subj==unconfined comm="kworker/u8:2" [111443.997450] audit: type=1325 audit(1661112070.215:2063): table=filter family=2 entries=4 op=xt_unregister pid=337602 subj==unconfined comm="kworker/u8:2" [111444.361110] hassio: port 10(veth64737f3) entered blocking state [111444.361132] hassio: port 10(veth64737f3) entered disabled state [111444.361448] device veth64737f3 entered promiscuous mode [111444.361550] audit: type=1700 audit(1661112070.579:2064): dev=veth64737f3 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 [111444.362481] audit: type=1300 audit(1661112070.579:2064): arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=40017a7530 a2=28 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111444.362939] audit: type=1327 audit(1661112070.579:2064): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111444.363424] hassio: port 10(veth64737f3) entered blocking state [111444.363440] hassio: port 10(veth64737f3) entered forwarding state [111444.831103] hassio: port 10(veth64737f3) entered disabled state [111444.969107] audit: type=1325 audit(1661112071.187:2065): table=nat family=2 entries=0 op=xt_register pid=338992 subj==unconfined comm="iptables" [111444.969204] audit: type=1300 audit(1661112071.187:2065): arch=c00000b7 syscall=209 success=yes exit=0 a0=4 a1=0 a2=40 a3=7fdcf22170 items=0 ppid=338984 pid=338992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-legacy-multi" subj==unconfined key=(null) [111445.079745] eth0: renamed from veth202159c [111445.121942] IPv6: ADDRCONF(NETDEV_CHANGE): veth64737f3: link becomes ready [111445.122127] hassio: port 10(veth64737f3) entered blocking state [111445.122143] hassio: port 10(veth64737f3) entered forwarding state [111460.642281] veth202159c: renamed from eth0 [111460.663829] hassio: port 10(veth64737f3) entered disabled state [111460.723254] hassio: port 10(veth64737f3) entered disabled state [111460.724800] device veth64737f3 left promiscuous mode [111460.724872] kauditd_printk_skb: 28 callbacks suppressed [111460.724877] audit: type=1700 audit(1661112086.935:2075): dev=veth64737f3 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 [111460.724894] hassio: port 10(veth64737f3) entered disabled state [111460.775725] audit: type=1300 audit(1661112086.935:2075): arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=4000a63280 a2=20 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111460.775846] audit: type=1327 audit(1661112086.935:2075): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111460.864174] audit: type=1325 audit(1661112087.083:2076): table=nat family=2 entries=15 op=xt_unregister pid=334902 subj==unconfined comm="kworker/u8:1" [111460.864235] audit: type=1325 audit(1661112087.083:2077): table=filter family=2 entries=4 op=xt_unregister pid=334902 subj==unconfined comm="kworker/u8:1" [111461.150416] hassio: port 10(veth4e20474) entered blocking state [111461.150449] hassio: port 10(veth4e20474) entered disabled state [111461.151019] device veth4e20474 entered promiscuous mode [111461.151188] audit: type=1700 audit(1661112087.367:2078): dev=veth4e20474 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 [111461.151579] audit: type=1300 audit(1661112087.367:2078): arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=4001ae6ea0 a2=28 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111461.151952] audit: type=1327 audit(1661112087.367:2078): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111461.152381] hassio: port 10(veth4e20474) entered blocking state [111461.152402] hassio: port 10(veth4e20474) entered forwarding state [111461.695335] hassio: port 10(veth4e20474) entered disabled state [111461.717987] audit: type=1325 audit(1661112087.935:2079): table=nat family=2 entries=0 op=xt_register pid=339467 subj==unconfined comm="iptables" [111461.718025] audit: type=1300 audit(1661112087.935:2079): arch=c00000b7 syscall=209 success=yes exit=0 a0=4 a1=0 a2=40 a3=7ff0af88b0 items=0 ppid=339459 pid=339467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-legacy-multi" subj==unconfined key=(null) [111461.817489] eth0: renamed from veth915ba04 [111461.845279] IPv6: ADDRCONF(NETDEV_CHANGE): veth4e20474: link becomes ready [111461.845529] hassio: port 10(veth4e20474) entered blocking state [111461.845550] hassio: port 10(veth4e20474) entered forwarding state [111476.967886] hassio: port 10(veth4e20474) entered disabled state [111476.968623] veth915ba04: renamed from eth0 [111477.024201] hassio: port 10(veth4e20474) entered disabled state [111477.025968] device veth4e20474 left promiscuous mode [111477.026057] kauditd_printk_skb: 28 callbacks suppressed [111477.026062] audit: type=1700 audit(1661112103.239:2089): dev=veth4e20474 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 [111477.026725] hassio: port 10(veth4e20474) entered disabled state [111477.079602] audit: type=1300 audit(1661112103.239:2089): arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=4000faa040 a2=20 a3=0 items=0 ppid=1 pid=474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj==unconfined key=(null) [111477.079642] audit: type=1327 audit(1661112103.239:2089): proctitle=2F7573722F62696E2F646F636B657264002D480066643A2F2F002D2D6370752D72742D72756E74696D653D393530303030002D2D73746F726167652D6472697665723D6F7665726C617932002D2D6C6F672D6472697665723D6A6F75726E616C64002D2D6C6F672D6F7074007461673D7B7B2E496D6167654E616D657D7D2F7B [111477.152859] audit: type=1325 audit(1661112103.371:2090): table=nat family=2 entries=15 op=xt_unregister pid=336971 subj==unconfined comm="kworker/u8:0" [111477.152891] audit: type=1325 audit(1661112103.371:2091): table=filter family=2 entries=4 op=xt_unregister pid=336971 subj==unconfined comm="kworker/u8:0" [111477.448939] hassio: port 10(vethd195c92) entered blocking state [111477.448963] hassio: port 10(vethd195c92) entered disabled state [111477.449186] device vethd195c92 entered promiscuous mode [111477.449581] hassio: port 10(vethd195c92) entered blocking state [111477.449597] hassio: port 10(vethd195c92) entered forwarding state [111477.451433] audit: type=1700 audit(1661112103.667:2092): dev=vethd195c92 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 [111477.451473] audit: type=1300 audit(1661112103.667:2092): arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=40008dd560 a2=

CPUID:

{}

py-cpuinfo $