
File: libcrypto.a(e_padlock.o)
ELF Header:
Magic: 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00
Class: ELF64
Data: 2's complement, little endian
Version: 1 (current)
OS/ABI:UNIX - System V
ABI Version: 0
Type: REL (Relocatable file)
Machine: Advanced Micro Devices X86-64
Version: 0x1
Entry point address: 0x0
Start of program headers: 0 (bytes into file)
Start of section headers: 248 (bytes into file)
Flags: 0x0
Size of this header: 64 (bytes)
Size of program headers: 0 (bytes)
Number of program headers: 0
Size of section headers: 64 (bytes)
Number of section headers: 11
Section header string table index: 8
e_padlock.o: file format elf64-x86-64
ARM
File: libcrypto.a(gost_sign.o)
ELF Header:
Magic: 7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00
Class: ELF32
Data: 2's complement, little endian
Version: 1 (current)
OS/ABI:UNIX - System V
ABI Version: 0
Type: REL (Relocatable file)
Machine: ARM
Version: 0x1
Entry point address: 0x0
Start of program headers: 0 (bytes into file)
Start of section headers: 3508 (bytes into file)
Flags: 0x5000000, Version5 EABI
Size of this header: 52 (bytes)
Size of program headers: 0 (bytes)
Number of program headers: 0
Size of section headers: 40 (bytes)
Number of section headers: 12
Section header string table index: 9
gost_sign.o: file format elf32-little
在linux平台下,我们可以通过dmesg |grep kvm命令来查看。如果CPU没有虚拟化的话,显示如下:
如果开启的话,显示如下:
Linux下查看内存与cpu的命令查看内存的命令: free 查看内存详细信息可以用 cat /proc/meminfo查看cpu使用情况可以用:ps -加参数 还可以用 top 查看cpu型号信息可以用 cat /proc/cpuinfo远程桌面可以用 Xmanger 来链接..但首先你需要在linux上做相关配置才行。欢迎分享,转载请注明来源:内存溢出
微信扫一扫
支付宝扫一扫
评论列表(0条)