Warning: file_get_contents(/data/phpspider/zhask/data//catemap/2/linux/22.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
execve如何调用动态链接器/加载器(ld linux.so.2)_Linux_Linker_System Calls_Execve - Fatal编程技术网

execve如何调用动态链接器/加载器(ld linux.so.2)

execve如何调用动态链接器/加载器(ld linux.so.2),linux,linker,system-calls,execve,Linux,Linker,System Calls,Execve,我使用gcc编译和链接最基本的C程序test.C: int main() { } 正如预期的那样,输出是一个动态链接的可执行文件: $ file test test: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.26, BuildID[sha1]=0x0f806c099f74132a158d98aebde4639

我使用gcc编译和链接最基本的C程序test.C:

int
main() {
}
正如预期的那样,输出是一个动态链接的可执行文件:

$ file test
test: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses     shared libs), for GNU/Linux 2.6.26, BuildID[sha1]=0x0f806c099f74132a158d98aebde4639ae0998971, not stripped
运行strace可提供以下输出:

$ strace -f ./test
execve("./test", ["./test"], [/* 31 vars */]) = 0
brk(0)                                  = 0x248d000
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f77eeb27000
access("/etc/ld.so.preload", R_OK)      = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY)      = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=109292, ...}) = 0
mmap(NULL, 109292, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f77eeb0c000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300\357\1\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1595408, ...}) = 0
mmap(NULL, 3709016, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f77ee580000
mprotect(0x7f77ee700000, 2097152, PROT_NONE) = 0
mmap(0x7f77ee900000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x180000) = 0x7f77ee900000
mmap(0x7f77ee905000, 18520, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f77ee905000
close(3)                                = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f77eeb0b000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f77eeb0a000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f77eeb09000
arch_prctl(ARCH_SET_FS, 0x7f77eeb0a700) = 0
mprotect(0x7f77ee900000, 16384, PROT_READ) = 0
mprotect(0x7f77eeb29000, 4096, PROT_READ) = 0
munmap(0x7f77eeb0c000, 109292)          = 0
exit_group(-292524312)                  = ?
我本来希望在strace输出中看到“/lib64/ld linux.so.2”,因为根据Exeve手册:

如果可执行文件是动态链接的ELF可执行文件,则使用在>PT_INTERP段中命名的解释器加载所需的共享库。对于与glibc2链接的二进制文件,此解释器>通常为/lib/ld linux.so.2

我猜linker/loader(/lib64/ld linux.so.2)调用是execve的一部分。有人能证实吗

我猜linker/loader(/lib64/ld linux.so.2)调用是execve的一部分

这有点正确

内核首先查看主要的可执行段,然后
mmap
s将它们放入新的“进程外壳”

当它发现可执行文件有
PT_INTERP
段时,它也
mmap
s该文件的段,并将控制权传递给它

因此,当从
execve()
返回到用户模式时,解释器(通常是
/lib64/ld-linux-x86-64.so.2
在linux/x86_64上)已经映射并运行。然后,解释器的工作就是重新定位自身,将所需的其余共享库重新定位到
mmap
,初始化它们,最后将控制权转移到主可执行文件


如果需要更多详细信息,请开始。

您指向的链接已断开。你能提供一个工作链接吗?我知道答案很古老,但我对学习更多东西很感兴趣。Thanks@Daniel我已经更新了链接。非常感谢!