[root@demo /]
Linux demo 5.10.0-153.29.0.106.oe2203sp2.x86_64
[root@demo /]
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
sda 8:0 0 200G 0 disk
├─sda1 8:1 0 1G 0 part /boot
└─sda2 8:2 0 199G 0 part
├─openeuler-root 253:0 0 191.1G 0 lvm /
└─openeuler-swap 253:1 0 7.9G 0 lvm [SWAP]
sr0 11:0 1 3.5G 0 rom
[root@demo /]
total used free shared buff/cache available
Mem: 30Gi 3.6Gi 6.1Gi 40Mi 21Gi 27Gi
Swap: 7.9Gi 0B 7.9Gi
[root@demo /]
架构: x86_64
CPU 运行模式: 32-bit, 64-bit
Address sizes: 43 bits physical, 48 bits virtual
字节序: Little Endian
CPU: 16
在线 CPU 列表: 0-15
厂商 ID: GenuineIntel
BIOS Vendor ID: GenuineIntel
型号名称: Intel(R) Xeon(R) Gold 6248 CPU @ 2.50GHz
BIOS Model name: Intel(R) Xeon(R) Gold 6248 CPU @ 2.50GHz
CPU 系列: 6
型号: 85
每个核的线程数: 1
每个座的核数: 1
座: 16
步进: 7
BogoMIPS: 4988.28
标记: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon nopl x
topology tsc_reliable nonstop_tsc cpuid pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hyperviso
r lahf_lm abm 3dnowprefetch cpuid_fault invpcid_single ssbd ibrs ibpb stibp ibrs_enhanced fsgsbase tsc_adjust bmi1 avx2 smep bmi2 invpcid avx512f avx512dq rdseed
adx smap clflushopt clwb avx512cd avx512bw avx512vl xsaveopt xsavec xsaves arat pku ospke md_clear flush_l1d arch_capabilities
Virtualization features:
超管理器厂商: VMware
虚拟化类型: 完全
Caches (sum of all):
L1d: 512 KiB (16 instances)
L1i: 512 KiB (16 instances)
L2: 16 MiB (16 instances)
L3: 440 MiB (16 instances)
NUMA:
NUMA 节点: 1
NUMA 节点0 CPU: 0-15
Vulnerabilities:
Gather data sampling: Unknown: Dependent on hypervisor status
Itlb multihit: KVM: Mitigation: VMX unsupported
L1tf: Not affected
Mds: Not affected
Meltdown: Not affected
Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
Retbleed: Mitigation; Enhanced IBRS
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Vulnerable: eIBRS with unprivileged eBPF
Srbds: Not affected
Tsx async abort: Not affected
[root@demo /]
文件系统 容量 已用 可用 已用% 挂载点
devtmpfs 4.0M 0 4.0M 0% /dev
tmpfs 16G 0 16G 0% /dev/shm
tmpfs 6.2G 41M 6.2G 1% /run
tmpfs 4.0M 0 4.0M 0% /sys/fs/cgroup
/dev/mapper/openeuler-root 188G 22G 156G 13% /
tmpfs 16G 32K 16G 1% /tmp
/dev/sda1 974M 251M 656M 28% /boot
[root@demo /]
146M bin
4.0K games
40M include
575M lib
357M lib64
158M libexec
20G local
65M sbin
554M share
107M src
0 tmp