pmispig:
[[email protected] tmp]# ldd /usr/bin/python2.7
linux-vdso.so.1 => (0x00007ffc63f78000)
libpython2.7.so.1.0 => /lib64/libpython2.7.so.1.0 (0x00007fb2b7efc000)
libpthread.so.0 => /lib64/libpthread.so.0 (0x00007fb2b7ce0000)
libdl.so.2 => /lib64/libdl.so.2 (0x00007fb2b7adc000)
libutil.so.1 => /lib64/libutil.so.1 (0x00007fb2b78d9000)
libm.so.6 => /lib64/libm.so.6 (0x00007fb2b75d7000)
libc.so.6 => /lib64/libc.so.6 (0x00007fb2b7209000)
/lib64/ld-linux-x86-64.so.2 (0x00007fb2b82c8000)
[[email protected] tmp]# readelf /usr/lib64/libpython2.7.so.1.0 -a |grep sock
[[email protected] tmp]# readelf /usr/bin/python2.7 -a |grep socket
[[email protected] tmp]# readelf /usr/lib64/libpython2.7.so.1.0 -a |grep open
00000037f7f8 002e00000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
000000380140 007300000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
000000380278 007d00000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
0000003803e8 008400000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
000000380810 00a400000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
000000380900 00ad00000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
000000380a80 00bc00000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
46: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (3)
115: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (3)
125: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (9)
132: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (10)
164: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (3)
173: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (4)
188: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (3)
[[email protected] tmp]# readelf /usr/bin/ssh -a |grep socket
0000002b8548 002b00000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
0000002b8918 00b400000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
43: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (5)
180: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (5)
pmispig:通过 strace 知道了,python 动态加载了 so
```
readelf -a /usr/lib64/python2.7/lib-dynload/_socketmodule.so |grep socket
00000020f1f0 004500000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
00000020f3b8 008200000007 R_X86_64_JUMP_SLO 0000000000000000 [email protected]_2.2.5 + 0
69: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (2)
130: 0000000000000000 0 FUNC GLOBAL DEFAULT UND [email protected]_2.2.5 (2)
137: 0000000000008d10 5379 FUNC GLOBAL DEFAULT 11 init_socket
```
我正在尝试获取LAN连接的服务器的主机名,因此我可以使用主机名在这些服务器上运行查询:import socket IP_RANGE = 10 hostNamesList = [] socket.setdefaulttimeout(0.1) for i in range(IP_RANGE): try: hostNamesList.append(socket.g…
Python线程仅启动一个额外的线程 - pythonimport socket import thread s = socket.socket( socket.AF_INET, socket.SOCK_STREAM) s.connect(("server", 6661)) def recv(): while 1: print(s.recv(1024)) def send(): while …
Python 如何查某关键词在百度网页第几页?cizimo:例如,在百度搜索 XXX 关键词后,想知道包含 YYY 的词在搜索结果的第几页? 这个能做到吗? 或者说有没有教程,砸一个链接给我呗,谢谢大家啦
Python 有没有监听鼠标点击网页相关元素的包呢?18870715400:具体需求 比如说打开了 www.baidu.com ,当你鼠标点击了“百度一下”就可以获得这个对应的 id 或者是对应的 xpath 语法 如果没有对应的包,那么有什么可以具体实现的思路呢?
Python 现在最好用的包管理是啥?maichael:最近为了给测试搭自动化测试,重新开始搞起 Python,但是整体工程结构比较苦恼。 重点是版本管理,requirements.txt 感觉不怎么好用。Pipenv? Tox? 还是其它的啥? 以及像 package.json 里 scripts 的用法,python 有类似的吗?cdyrhh:poetry