32 lines
3.9 KiB
JSON
32 lines
3.9 KiB
JSON
{
|
|
"timestamp_utc": "20251121-142249",
|
|
"system": {
|
|
"hostname": "ubuntu-8gb-fsn1-1",
|
|
"os": "Ubuntu 24.04.3 LTS",
|
|
"cpu": "Architecture: x86_64\nCPU op-mode(s): 32-bit, 64-bit\nAddress sizes: 40 bits physical, 48 bits virtual\nByte Order: Little Endian\nCPU(s): 4\nOn-line CPU(s) list: 0-3\nVendor ID: GenuineIntel\nBIOS Vendor ID: QEMU\nModel name: Intel Xeon Processor (Skylake, IBRS, no TSX)\nBIOS Model name: NotSpecified CPU @ 2.0GHz\nBIOS CPU family: 1\nCPU family: 6\nModel: 85\nThread(s) per core: 1\nCore(s) per socket: 4\nSocket(s): 1\nStepping: 4\nBogoMIPS: 4199.98\nFlags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch cpuid_fault pti ssbd ibrs ibpb fsgsbase bmi1 avx2 smep bmi2 erms invpcid avx512f avx512dq rdseed adx smap clwb avx512cd avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves arat pku ospke md_clear\nHypervisor vendor: KVM\nVirtualization type: full\nL1d cache: 128 KiB (4 instances)\nL1i cache: 128 KiB (4 instances)\nL2 cache: 16 MiB (4 instances)\nL3 cache: 16 MiB (1 instance)\nNUMA node(s): 1\nNUMA node0 CPU(s): 0-3\nVulnerability Gather data sampling: Unknown: Dependent on hypervisor status\nVulnerability Itlb multihit: KVM: Mitigation: VMX unsupported\nVulnerability L1tf: Mitigation; PTE Inversion\nVulnerability Mds: Mitigation; Clear CPU buffers; SMT Host state unknown\nVulnerability Meltdown: Mitigation; PTI\nVulnerability Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown\nVulnerability Reg file data sampling: Not affected\nVulnerability Retbleed: Mitigation; IBRS\nVulnerability Spec rstack overflow: Not affected\nVulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl\nVulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization\nVulnerability Spectre v2: Mitigation; IBRS; IBPB conditional; STIBP disabled; RSB filling; PBRSB-eIBRS Not affected; BHI SW loop, KVM SW loop\nVulnerability Srbds: Not affected\nVulnerability Tsx async abort: Not affected\nVulnerability Vmscape: Not affected",
|
|
"memory": "total used free shared buff/cache available\nMem: 7.6Gi 426Mi 7.2Gi 4.7Mi 214Mi 7.2Gi\nSwap: 0B 0B 0B",
|
|
"disk_root": "/dev/sda1 75G 1.6G 71G 3% /",
|
|
"disk_opt": "Filesystem Size Used Avail Use% Mounted on\n/dev/sda1 75G 1.6G 71G 3% /",
|
|
"disk_data": ""
|
|
},
|
|
"workspace": {
|
|
"path": "/data/HXKI_WORKSPACE",
|
|
"exists": false
|
|
},
|
|
"docker": {
|
|
"ps": "/bin/sh: 1: docker: not found\ndocker not available",
|
|
"images": "/bin/sh: 1: docker: not found"
|
|
},
|
|
"env": {},
|
|
"telemetry": {
|
|
"log": {
|
|
"exists": false
|
|
}
|
|
},
|
|
"venv": {
|
|
"exists": false
|
|
},
|
|
"chroma": {
|
|
"status": "no_host_configured"
|
|
}
|
|
} |