Detailed explanation of whereis example to find a specific program in Linux

Detailed explanation of whereis example to find a specific program in Linux

Linux finds a specific program where is

The whereis command is mainly used to find program files and provide the storage location of the binary executable file, source code file, and user manual of this file.

1. Find command program

For example, look for the touch command

[root@node1 /]# whereis touch
touch: /usr/bin/touch /usr/share/man/man1/touch.1.gz

The execution effect is as follows:

If you only need to find the binary file of the touch command, you can use the -b option:

[root@node1 /]# whereis -b touch
touch: /usr/bin/touch

The effect is as follows:

2. Find the application

For example, find the nginx service

[root@node1 /]# whereis nginx
nginx: /usr/sbin/nginx /usr/lib64/nginx /etc/nginx /usr/share/nginx /usr/share/man/man8/nginx.8.gz

Find java

[root@node1 /]# whereis java
java: /usr/java/jdk1.8.0_191/bin/java /usr/local/jdk1.8.0_191/bin/java

If the queried program does not exist, an empty string is returned.

For example, to find the hello program

[root@node1 /]# whereis hello
hello:

The above are all the relevant knowledge points introduced this time. Thank you for your learning and support for 123WORDPRESS.COM.

You may also be interested in:
  • The difference between Linux command search commands whereis and which
  • A Linux command every day whereis command

<<:  Tutorial on installing mysql under centos7

>>:  MySQL Advanced Learning Notes (Part 3): Introduction to MySQL Logical Architecture, Detailed Explanation of MySQL Storage Engine

Recommend

Research on the value of position attribute in CSS (summary)

The CSS position attribute specifies the element&...

Detailed explanation of how to enable slow query log in MySQL database

The database enables slow query logs Modify the c...

OpenSSL implements two-way authentication tutorial (with server and client code)

1. Background 1.1 Problems A recent product testi...

MySQL replication advantages and principles explained in detail

Replication is to transfer the DDL and DML operat...

Example code for implementing anti-shake in Vue

Anti-shake: Prevent repeated clicks from triggeri...

Detailed analysis of mysql MDL metadata lock

Preface: When you execute a SQL statement in MySQ...

How to modify the default network segment of Docker0 bridge in Docker

1. Background When the Docker service is started,...

Summary of pitfalls in importing ova files into vmware

Source of the problem As we all know, all network...

MariaDB under Linux starts with the root user (recommended)

Recently, due to the need to test security produc...

Common writing examples for MySQL and Oracle batch insert SQL

Table of contents For example: General writing: S...

Nginx implements https website configuration code example

https base port 443. It is used for something cal...

Radio buttons and multiple-choice buttons are styled using images

I've seen people asking before, how to add sty...

View the dependent libraries of so or executable programs under linux

View the dependent libraries of so or executable ...