ARM开发板上查看动态库或者可执行程序的依赖关系

以ARM32开发板为例,在/lib下有一个名为ld-linux-armhf.so.3的可执行程序(在ARM64开发板上是/lib/ld-linux-aarch64.so.1),这个程序负责加载可执行程序以及依赖的动态库:

# /lib/ld-linux-armhf.so.3 
Usage: ld.so [OPTION]... EXECUTABLE-FILE [ARGS-FOR-PROGRAM...]
You have invoked `ld.so', the helper program for shared library executables.
This program usually lives in the file `/lib/ld.so', and special directives
in executable files using ELF shared libraries tell the system's program
loader to load the helper program from this file.  This helper program loads
the shared libraries needed by the program executable, prepares the program
to run, and runs it.  You may invoke this helper program directly from the
command line to load and run an ELF executable file; this is like executing
that file itself, but always uses this helper program from the file you
specified, instead of the helper program file specified in the executable
file you run.  This is mostly of use for maintainers to test new versions
of this helper program; chances are you did not intend to run this program.

  --list                list all dependencies and how they are resolved
  --verify              verify that given object really is a dynamically linked
                        object we can handle
  --inhibit-cache       Do not use /etc/ld.so.cache
  --library-path PATH   use given PATH instead of content of the environment
                        variable LD_LIBRARY_PATH
  --inhibit-rpath LIST  ignore RUNPATH and RPATH information in object names
                        in LIST
  --audit LIST          use objects named in LIST as auditors

 

然后使用--list参数就可以查看依赖的库:

# /lib/ld-linux-armhf.so.3 --list /usr/bin/stressapptest 
        linux-vdso.so.1 (0xbeeef000)
        librt.so.1 => /lib/librt.so.1 (0xb6ece000)
        libpthread.so.0 => /lib/libpthread.so.0 (0xb6eaa000)
        libstdc++.so.6 => /lib/libstdc++.so.6 (0xb6d9f000)
        libm.so.6 => /lib/libm.so.6 (0xb6d23000)
        libgcc_s.so.1 => /lib/libgcc_s.so.1 (0xb6cfa000)
        libc.so.6 => /lib/libc.so.6 (0xb6c0d000)
        /lib/ld-linux-armhf.so.3 (0xb6ee4000)

 

此外,也可以使用readelf来查看库的依赖关系:

readelf -a <可执行程序> | grep NEEDED

 

完。

 

你可能感兴趣的:(ARM开发板上查看动态库或者可执行程序的依赖关系)