以ARM32開發板為例,在/lib下有一個名為ld-linux-armhf.so.3的可執行程序(在ARM64開發板上是/lib/ld-linux-aarch64.so.1),這個程序負責加載可執行程序以及依賴的動態庫:
# /lib/ld-linux-armhf.so.3 Usage: ld.so [OPTION]... EXECUTABLE-FILE [ARGS-FOR-PROGRAM...] You have invoked `ld.so', the helper program for shared library executables.
This program usually lives in the file `/lib/ld.so', and special directives
in executable files using ELF shared libraries tell the system's program
loader to load the helper program from this file. This helper program loads the shared libraries needed by the program executable, prepares the program to run, and runs it. You may invoke this helper program directly from the command line to load and run an ELF executable file; this is like executing that file itself, but always uses this helper program from the file you specified, instead of the helper program file specified in the executable file you run. This is mostly of use for maintainers to test new versions of this helper program; chances are you did not intend to run this program. --list list all dependencies and how they are resolved --verify verify that given object really is a dynamically linked object we can handle --inhibit-cache Do not use /etc/ld.so.cache --library-path PATH use given PATH instead of content of the environment variable LD_LIBRARY_PATH --inhibit-rpath LIST ignore RUNPATH and RPATH information in object names in LIST --audit LIST use objects named in LIST as auditors
然后使用--list參數就可以查看依賴的庫:
# /lib/ld-linux-armhf.so.3 --list /usr/bin/stressapptest linux-vdso.so.1 (0xbeeef000) librt.so.1 => /lib/librt.so.1 (0xb6ece000) libpthread.so.0 => /lib/libpthread.so.0 (0xb6eaa000) libstdc++.so.6 => /lib/libstdc++.so.6 (0xb6d9f000) libm.so.6 => /lib/libm.so.6 (0xb6d23000) libgcc_s.so.1 => /lib/libgcc_s.so.1 (0xb6cfa000) libc.so.6 => /lib/libc.so.6 (0xb6c0d000) /lib/ld-linux-armhf.so.3 (0xb6ee4000)
此外,也可以使用readelf來查看庫的依賴關系:
readelf -a <可執行程序> | grep NEEDED
完。