{ "timestamp_utc": "20251121-142249", "system": { "hostname": "ubuntu-8gb-fsn1-1", "os": "Ubuntu 24.04.3 LTS", "cpu": "Architecture: x86_64\nCPU op-mode(s): 32-bit, 64-bit\nAddress sizes: 40 bits physical, 48 bits virtual\nByte Order: Little Endian\nCPU(s): 4\nOn-line CPU(s) list: 0-3\nVendor ID: GenuineIntel\nBIOS Vendor ID: QEMU\nModel name: Intel Xeon Processor (Skylake, IBRS, no TSX)\nBIOS Model name: NotSpecified CPU @ 2.0GHz\nBIOS CPU family: 1\nCPU family: 6\nModel: 85\nThread(s) per core: 1\nCore(s) per socket: 4\nSocket(s): 1\nStepping: 4\nBogoMIPS: 4199.98\nFlags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch cpuid_fault pti ssbd ibrs ibpb fsgsbase bmi1 avx2 smep bmi2 erms invpcid avx512f avx512dq rdseed adx smap clwb avx512cd avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves arat pku ospke md_clear\nHypervisor vendor: KVM\nVirtualization type: full\nL1d cache: 128 KiB (4 instances)\nL1i cache: 128 KiB (4 instances)\nL2 cache: 16 MiB (4 instances)\nL3 cache: 16 MiB (1 instance)\nNUMA node(s): 1\nNUMA node0 CPU(s): 0-3\nVulnerability Gather data sampling: Unknown: Dependent on hypervisor status\nVulnerability Itlb multihit: KVM: Mitigation: VMX unsupported\nVulnerability L1tf: Mitigation; PTE Inversion\nVulnerability Mds: Mitigation; Clear CPU buffers; SMT Host state unknown\nVulnerability Meltdown: Mitigation; PTI\nVulnerability Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown\nVulnerability Reg file data sampling: Not affected\nVulnerability Retbleed: Mitigation; IBRS\nVulnerability Spec rstack overflow: Not affected\nVulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl\nVulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization\nVulnerability Spectre v2: Mitigation; IBRS; IBPB conditional; STIBP disabled; RSB filling; PBRSB-eIBRS Not affected; BHI SW loop, KVM SW loop\nVulnerability Srbds: Not affected\nVulnerability Tsx async abort: Not affected\nVulnerability Vmscape: Not affected", "memory": "total used free shared buff/cache available\nMem: 7.6Gi 426Mi 7.2Gi 4.7Mi 214Mi 7.2Gi\nSwap: 0B 0B 0B", "disk_root": "/dev/sda1 75G 1.6G 71G 3% /", "disk_opt": "Filesystem Size Used Avail Use% Mounted on\n/dev/sda1 75G 1.6G 71G 3% /", "disk_data": "" }, "workspace": { "path": "/data/HXKI_WORKSPACE", "exists": false }, "docker": { "ps": "/bin/sh: 1: docker: not found\ndocker not available", "images": "/bin/sh: 1: docker: not found" }, "env": {}, "telemetry": { "log": { "exists": false } }, "venv": { "exists": false }, "chroma": { "status": "no_host_configured" } }