Linux查看程序、进程的依赖库的方法

1. 利用ldd查看可执行程序的依赖库

[root@~]# ldd /usr/local/php/bin/php
    linux-vdso.so.1 =>  (0x00007fff753f5000)
    libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00000031f4600000)
    librt.so.1 => /lib64/librt.so.1 (0x000000311ee00000)
    libmysqlclient.so.18 => /usr/local/mysql/lib/libmysqlclient.so.18 (0x00007f767b422000)
    libmcrypt.so.4 => /usr/lib64/libmcrypt.so.4 (0x00007f767b1ef000)
    libiconv.so.2 => /usr/local/lib/libiconv.so.2 (0x00007f767af0a000)
    libcurl.so.4 => /usr/lib64/libcurl.so.4 (0x0000003519800000)
    libm.so.6 => /lib64/libm.so.6 (0x00000031f2200000)
    libdl.so.2 => /lib64/libdl.so.2 (0x00000031f1600000)
    libnsl.so.1 => /lib64/libnsl.so.1 (0x00000031f3a00000)
    libxml2.so.2 => /usr/lib64/libxml2.so.2 (0x00000031f8a00000)
    libz.so.1 => /usr/local/lib/libz.so.1 (0x00007f767acf2000)
    libssl.so.10 => /usr/lib64/libssl.so.10 (0x000000311c600000)
    libcrypto.so.10 => /usr/lib64/libcrypto.so.10 (0x00000031f7600000)
    libpthread.so.0 => /lib64/libpthread.so.0 (0x000000311ce00000)
    libc.so.6 => /lib64/libc.so.6 (0x00000031f0e00000)
    libresolv.so.2 => /lib64/libresolv.so.2 (0x00000031f3200000)
    libfreebl3.so => /lib64/libfreebl3.so (0x00000031f4e00000)
    /lib64/ld-linux-x86-64.so.2 (0x00000031f0a00000)
    libidn.so.11 => /lib64/libidn.so.11 (0x00000031f7e00000)
    libldap-2.4.so.2 => /lib64/libldap-2.4.so.2 (0x000000351c000000)
    libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x000000311f200000)
    libkrb5.so.3 => /lib64/libkrb5.so.3 (0x000000311e200000)
    libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x00000031f7200000)
    libcom_err.so.2 => /lib64/libcom_err.so.2 (0x000000311e600000)
    libssl3.so => /usr/lib64/libssl3.so (0x000000351b800000)
    libsmime3.so => /usr/lib64/libsmime3.so (0x000000351bc00000)
    libnss3.so => /usr/lib64/libnss3.so (0x000000351a800000)
    libnssutil3.so => /usr/lib64/libnssutil3.so (0x000000351a400000)
    libplds4.so => /lib64/libplds4.so (0x000000351ac00000)
    libplc4.so => /lib64/libplc4.so (0x000000351b400000)
    libnspr4.so => /lib64/libnspr4.so (0x000000351b000000)
    libssh2.so.1 => /usr/lib64/libssh2.so.1 (0x0000003519c00000)
    liblber-2.4.so.2 => /lib64/liblber-2.4.so.2 (0x000000351a000000)
    libsasl2.so.2 => /usr/lib64/libsasl2.so.2 (0x00000031f8200000)
    libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x00000031f7a00000)
    libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x00000031f6e00000)
    libselinux.so.1 => /lib64/libselinux.so.1 (0x00000031f2600000)

注:ldd通过调用动态链接器来获取可执行程序的依赖库,但是并不推荐在未知的可执行程序上执行业ldd来获取其依赖库,因为部分版本的ldd会直接通过调用该可执行程序来获取其依赖库,这存在安全风险。

2. 利用pmap工具查询未知的可执行程序的依赖库

[root@~]# objdump -p /usr/local/php/bin/php |grep NEEDED
  NEEDED               libcrypt.so.1
  NEEDED               librt.so.1
  NEEDED               libmysqlclient.so.18
  NEEDED               libmcrypt.so.4
  NEEDED               libiconv.so.2
  NEEDED               libcurl.so.4
  NEEDED               libm.so.6
  NEEDED               libdl.so.2
  NEEDED               libnsl.so.1
  NEEDED               libxml2.so.2
  NEEDED               libz.so.1
  NEEDED               libssl.so.10
  NEEDED               libcrypto.so.10
  NEEDED               libpthread.so.0
  NEEDED               libc.so.6
  NEEDED               libresolv.so.2

3. 利用pmap查看正在运行时的进程的依赖库

利用pldd工具既可以获取进程的内存映射信息,也可以获取进程的依赖共享库信息:

[root@~/software/pldd]# ps -ef|grep php-fpm
root     26534     1  0  2014 ?        00:01:34 php-fpm: master process (/usr/local/php-5.3.29/etc/php-fpm.conf)
nobody   26535 26534  0  2014 ?        00:00:04 php-fpm: pool www          
nobody   26536 26534  0  2014 ?        00:00:05 php-fpm: pool www          
root     30510 30324  0 00:39 pts/0    00:00:00 grep php-fpm
[root@~/software/pldd]# pmap 26534 |head 
26534:   php-fpm: master process (/usr/local/php-5.3.29/etc/php-fpm.conf)
0000000000400000  10452K r-x--  /usr/local/php-5.3.29/sbin/php-fpm
0000000001035000     76K rw---  /usr/local/php-5.3.29/sbin/php-fpm
0000000001048000    104K rw---    [ anon ]
0000000002a65000   3448K rw---    [ anon ]
000000311c600000    388K r-x--  /usr/lib64/libssl.so.1.0.1e
000000311c661000   2048K -----  /usr/lib64/libssl.so.1.0.1e
000000311c861000     16K r----  /usr/lib64/libssl.so.1.0.1e
000000311c865000     28K rw---  /usr/lib64/libssl.so.1.0.1e
000000311ce00000     92K r-x--  /lib64/libpthread-2.12.so
Linux下,你可以使用多种方法查看可执行文件的依赖。其中一种方法是使用ldd命令。ldd命令可以列出一个可执行文件所依赖的动态。你可以在终端中输入"ldd 可执行文件路径"来查看。另外,你还可以使用xxx-linux-objdump命令或xxx-linux-readelf命令来查看可执行文件的依赖情况。这两个命令可以提供更详细的信息,包括共享对象的名称等。你可以在终端中输入"xxx-linux-objdump -x 可执行文件路径 | grep 'NEEDED'"或"xxx-linux-readelf -a 可执行文件路径 | grep 'Shared'"来查看。除此之外,还有一些其他的方法,如利用pldd、pmap和ln命令等。希望这些方法可以帮助你在Linux查看可执行文件的依赖。<span class="em">1</span><span class="em">2</span><span class="em">3</span> #### 引用[.reference_title] - *1* [Linux查看可执行文件依赖](https://blog.csdn.net/JoshYueby/article/details/105528682)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v92^chatsearchT0_1"}}] [.reference_item style="max-width: 33.333333333333336%"] - *2* [Linux下,查看 可执行文件 依赖的 动态的几个方法](https://blog.csdn.net/wkd_007/article/details/126121134)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v92^chatsearchT0_1"}}] [.reference_item style="max-width: 33.333333333333336%"] - *3* [Linux 查看程序(动态)、进程依赖方法](https://blog.csdn.net/wsp_1138886114/article/details/128110849)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v92^chatsearchT0_1"}}] [.reference_item style="max-width: 33.333333333333336%"] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值