Ubuntu11.20 32位linux下编译cppunit报 libcppunit.so: undefined reference to `dlsym'错误问题

现在用cppunit,运行./configure,make报错,提示如下

g++ -g -O2 -o .libs/DllPlugInTester DllPlugInTester.o CommandLineParser.o -ldl ../../src/cppunit/.libs/libcppunit.so -lm
../../src/cppunit/.libs/libcppunit.so: undefined reference to `dlsym'
../../src/cppunit/.libs/libcppunit.so: undefined reference to `dlopen'
../../src/cppunit/.libs/libcppunit.so: undefined reference to `dlclose'
文章解决此问题,运行
./configure LDFLAGS='-ldl'
make

Frame 6: 63 bytes on wire (504 bits), 63 bytes captured (504 bits) on interface \Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13}, id 0 Section number: 1 Interface id: 0 (\Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13}) Encapsulation type: Ethernet (1) Arrival Time: Aug 21, 2025 10:07:13.159693000 中国标准时间 UTC Arrival Time: Aug 21, 2025 02:07:13.159693000 UTC Epoch Arrival Time: 1755742033.159693000 [Time shift for this packet: 0.000000000 seconds] [Time delta from previous captured frame: 0.295483000 seconds] [Time delta from previous displayed frame: 0.295483000 seconds] [Time since reference or first frame: 12.017632000 seconds] Frame Number: 6 Frame Length: 63 bytes (504 bits) Capture Length: 63 bytes (504 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:data] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55), Dst: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28) Destination: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28) … …0. … … … … = LG bit: Globally unique address (factory default) … …0 … … … … = IG bit: Individual address (unicast) Source: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55) … …0. … … … … = LG bit: Globally unique address (factory default) … …0 … … … … = IG bit: Individual address (unicast) Type: IPv4 (0x0800) [Stream index: 0] Internet Protocol Version 4, Src: 192.168.1.100, Dst: 192.168.3.101 0100 … = Version: 4 … 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) Total Length: 49 Identification: 0x5be7 (23527) 010. … = Flags: 0x2, Don’t fragment …0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.100 Destination Address: 192.168.3.101 [Stream index: 0] Transmission Control Protocol, Src Port: 64166, Dst Port: 60000, Seq: 1, Ack: 1, Len: 9 Source Port: 64166 Destination Port: 60000 [Stream index: 0] [Conversation completeness: Complete, WITH_DATA (31)] [TCP Segment Len: 9] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 387336689 [Next Sequence Number: 10 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 1889122141 0101 … = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) 000. … … = Reserved: Not set …0 … … = Accurate ECN: Not set … 0… … = Congestion Window Reduced: Not set … .0… … = ECN-Echo: Not set … …0. … = Urgent: Not set … …1 … = Acknowledgment: Set … … 1… = Push: Set … … .0… = Reset: Not set … … …0. = Syn: Not set … … …0 = Fin: Not set [TCP Flags: ·······AP···] Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x863d [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [Timestamps] [Time since first frame in this TCP stream: 12.017632000 seconds] [Time since previous frame in this TCP stream: 12.013701000 seconds] [SEQ/ACK analysis] [iRTT: 0.003931000 seconds] [Bytes in flight: 9] [Bytes sent since last PSH flag: 9] TCP payload (9 bytes) Data (9 bytes) Data: 313233343536373839 [Length: 9] Frame 7: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface \Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13}, id 0 Section number: 1 Interface id: 0 (\Device\NPF_{E6E18012-6BC3-40E2-87FD-B987B450CA13}) Encapsulation type: Ethernet (1) Arrival Time: Aug 21, 2025 10:07:13.201939000 中国标准时间 UTC Arrival Time: Aug 21, 2025 02:07:13.201939000 UTC Epoch Arrival Time: 1755742033.201939000 [Time shift for this packet: 0.000000000 seconds] [Time delta from previous captured frame: 0.042246000 seconds] [Time delta from previous displayed frame: 0.042246000 seconds] [Time since reference or first frame: 12.059878000 seconds] Frame Number: 7 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28), Dst: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55) Destination: e0:d3:62:10:1a:55 (e0:d3:62:10:1a:55) … …0. … … … … = LG bit: Globally unique address (factory default) … …0 … … … … = IG bit: Individual address (unicast) Source: 8c:86:dd:33:2f:28 (8c:86:dd:33:2f:28) … …0. … … … … = LG bit: Globally unique address (factory default) … …0 … … … … = IG bit: Individual address (unicast) Type: IPv4 (0x0800) [Stream index: 0] Trailer: 0000 Internet Protocol Version 4, Src: 192.168.3.101, Dst: 192.168.1.100 0100 … = Version: 4 … 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) Total Length: 40 Identification: 0x331f (13087) 010. … = Flags: 0x2, Don’t fragment …0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 127 Protocol: TCP (6) Header Checksum: 0x4297 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.3.101 Destination Address: 192.168.1.100 [Stream index: 0] Transmission Control Protocol, Src Port: 60000, Dst Port: 64166, Seq: 1, Ack: 10, Len: 0 Source Port: 60000 Destination Port: 64166 [Stream index: 0] [Conversation completeness: Complete, WITH_DATA (31)] [TCP Segment Len: 0] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1889122141 [Next Sequence Number: 1 (relative sequence number)] Acknowledgment Number: 10 (relative ack number) Acknowledgment number (raw): 387336698 0101 … = Header Length: 20 bytes (5) Flags: 0x010 (ACK) 000. … … = Reserved: Not set …0 … … = Accurate ECN: Not set … 0… … = Congestion Window Reduced: Not set … .0… … = ECN-Echo: Not set … …0. … = Urgent: Not set … …1 … = Acknowledgment: Set … … 0… = Push: Not set … … .0… = Reset: Not set … … …0. = Syn: Not set … … …0 = Fin: Not set [TCP Flags: ·······A····] Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0xbaac [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [Timestamps] [Time since first frame in this TCP stream: 12.059878000 seconds] [Time since previous frame in this TCP stream: 0.042246000 seconds] [SEQ/ACK analysis] [This is an ACK to the segment in frame: 6] [The RTT to ACK the segment was: 0.042246000 seconds] [iRTT: 0.003931000 seconds] listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 00:54:08.812647 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2066893244:2066893356, ack 3794839666, win 1002, length 112 00:54:08.814409 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 112:320, ack 1, win 1002, length 208 00:54:08.815139 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 320, win 251, length 0 00:54:09.821509 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 320:512, ack 1, win 1002, length 192 00:54:09.821680 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 512:784, ack 1, win 1002, length 272 00:54:09.822547 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 784, win 255, length 0 00:54:10.844496 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 784:1152, ack 1, win 1002, length 368 00:54:10.897588 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 1152, win 254, length 0 00:54:11.290370 IP 192.168.1.100.57933 > 192.168.1.1.53: 50024+ A? optimizationguide-pa.googleapis.com. (53) 00:54:11.290729 IP 192.168.1.1.53 > 192.168.1.100.57933: 50024 ServFail 0/0/0 (53) 00:54:11.291268 IP 192.168.1.100 > 192.168.1.1: ICMP 192.168.1.100 udp port 57933 unreachable, length 89 00:54:11.868777 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1152:1424, ack 1, win 1002, length 272 00:54:11.869673 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1424:1584, ack 1, win 1002, length 160 00:54:11.869787 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1584:1824, ack 1, win 1002, length 240 00:54:11.870553 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 1584, win 252, length 0 00:54:11.924818 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 1824, win 251, length 0 00:54:12.892435 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 1824:2000, ack 1, win 1002, length 176 00:54:12.892673 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2000:2480, ack 1, win 1002, length 480 00:54:12.893585 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 2480, win 255, length 0 00:54:13.916503 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2480:2864, ack 1, win 1002, length 384 00:54:13.962323 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 2864, win 254, length 0 00:54:14.940463 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 2864:3136, ack 1, win 1002, length 272 00:54:14.989752 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 3136, win 253, length 0 00:54:15.299954 IP 192.168.0.100.58105 > 192.168.3.101.60000: Flags [P.], seq 747139898:747139899, ack 2277206824, win 255, length 1 00:54:15.300131 ARP, Request who-has 192.168.3.101 tell 192.168.3.1, length 28 00:54:15.300988 ARP, Reply 192.168.3.101 is-at e0:d3:62:10:0f:3f (oui Unknown), length 46 00:54:15.301011 IP 192.168.3.1.58105 > 192.168.3.101.60000: Flags [P.], seq 747139898:747139899, ack 2277206824, win 255, length 1 00:54:15.351015 IP 192.168.3.101.60000 > 192.168.3.1.58105: Flags [.], ack 1, win 255, length 0 00:54:15.351118 IP 192.168.3.101.60000 > 192.168.0.100.58105: Flags [.], ack 1, win 255, length 0 00:54:15.964443 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3136:3312, ack 1, win 1002, length 176 00:54:15.964643 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3312:3472, ack 1, win 1002, length 160 00:54:15.965096 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3472:3664, ack 1, win 1002, length 192 00:54:15.965463 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 3472, win 252, length 0 00:54:15.965798 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3664:3808, ack 1, win 1002, length 144 00:54:15.966026 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 3808:4288, ack 1, win 1002, length 480 00:54:15.966458 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 3808, win 250, length 0 00:54:16.014638 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 4288, win 255, length 0 00:54:16.211652 IP 192.168.0.100.58105 > 192.168.3.101.60000: Flags [P.], seq 1:2, ack 1, win 255, length 1 00:54:16.211815 IP 192.168.3.1.58105 > 192.168.3.101.60000: Flags [P.], seq 1:2, ack 1, win 255, length 1 00:54:16.267878 IP 192.168.3.101.60000 > 192.168.3.1.58105: Flags [.], ack 2, win 255, length 0 00:54:16.267982 IP 192.168.3.101.60000 > 192.168.0.100.58105: Flags [.], ack 2, win 255, length 0 00:54:16.988822 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 4288:5616, ack 1, win 1002, length 1328 00:54:17.040537 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 5616, win 250, length 0 00:54:17.916230 IP 192.168.0.1.54004 > 255.255.255.255.29810: UDP, length 521 00:54:18.012792 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 5616:5888, ack 1, win 1002, length 272 00:54:18.013131 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 5888:6032, ack 1, win 1002, length 144 00:54:18.013899 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 6032, win 255, length 0 00:54:19.036493 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 6032:6416, ack 1, win 1002, length 384 00:54:19.088657 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 6416, win 254, length 0 00:54:20.060458 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 6416:6688, ack 1, win 1002, length 272 00:54:20.112309 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 6688, win 253, length 0 00:54:20.161769 ARP, Request who-has 192.168.3.1 (8c:86:dd:33:2f:2c (oui Unknown)) tell 192.168.3.101, length 46 00:54:20.161838 ARP, Reply 192.168.3.1 is-at 8c:86:dd:33:2f:2c (oui Unknown), length 28 00:54:21.084556 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 6688:7152, ack 1, win 1002, length 464 00:54:21.137446 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7152, win 251, length 0 00:54:22.108460 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7152:7424, ack 1, win 1002, length 272 00:54:22.161746 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7424, win 250, length 0 00:54:23.132461 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7424:7696, ack 1, win 1002, length 272 00:54:23.187595 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7696, win 255, length 0 00:54:24.156459 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7696:7968, ack 1, win 1002, length 272 00:54:24.211727 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 7968, win 254, length 0 00:54:25.180454 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 7968:8240, ack 1, win 1002, length 272 00:54:25.233308 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 8240, win 253, length 0 00:54:26.204492 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 8240:8512, ack 1, win 1002, length 272 00:54:26.258181 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 8512, win 252, length 0 00:54:27.228475 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 8512:8784, ack 1, win 1002, length 272 00:54:27.283643 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 8784, win 251, length 0 00:54:27.988247 IP 192.168.0.1.54004 > 255.255.255.255.29810: UDP, length 521 00:54:28.252496 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 8784:9136, ack 1, win 1002, length 352 00:54:28.296458 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 9136, win 250, length 0 00:54:29.276447 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 9136:9312, ack 1, win 1002, length 176 00:54:29.276614 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 9312:9472, ack 1, win 1002, length 160 00:54:29.277521 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 9472, win 255, length 0 00:54:29.299489 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [P.], seq 1:161, ack 9472, win 255, length 160 00:54:29.299700 IP 192.168.0.1.22 > 192.168.0.100.60319: Flags [P.], seq 9472:9520, ack 161, win 1002, length 48 00:54:29.352007 IP 192.168.0.100.60319 > 192.168.0.1.22: Flags [.], ack 9520, win 255, length 0 root@ER7206:/# ip route 127.0.0.0/8 dev lo scope link 169.254.11.20/30 dev br-lan scope link 192.168.0.0/24 dev inf.1 proto kernel scope link src 192.168.0.1 192.168.1.0/24 dev inf.2 proto kernel scope link src 192.168.1.1 192.168.2.0/24 dev inf.3 proto kernel scope link src 192.168.2.1 192.168.3.0/24 dev inf.4091 scope link root@ER7206:/# ip rule 0: from all lookup local 25: from all fwmark 0x20000/0x20000 lookup 25 27: from all lookup link 29: from all lookup lan 221: from all fwmark 0x20000/0x20000 lookup 221 20044: from 192.168.3.1 lookup wan4_eth 32766: from all lookup main 32767: from all lookup default以上是相关信息,请分析说明
最新发布
08-22
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值