diff options
author | Martin Stjernholm <mast@google.com> | 2019-02-22 22:48:59 +0000 |
---|---|---|
committer | Martin Stjernholm <mast@google.com> | 2019-03-19 14:03:18 +0000 |
commit | 95252eedf32f38b22784ba6f1097f25d485652f5 (patch) | |
tree | e76a8f7fef10ad78fed7fee7c85e1756f84edcb9 /linker/linker_main.cpp | |
parent | 0ab20442e49316899050d3af72257d5f483761d0 (diff) |
Add more linker debug.
- Show which executable is being linked, which linker config file is
being read, and which section in it is being used with, enabled on
$LD_DEBUG>=1.
- Show more info to follow the dlopen() process, enabled with "dlopen"
in the debug.ld.xxx property.
Test: Flash, boot, and look at logcat after "adb shell setprop debug.ld.all dlopen"
Bug: 120430775
Change-Id: I5441c8ced26ec0e2f04620c3d2a1ae860b792154
Diffstat (limited to 'linker/linker_main.cpp')
-rw-r--r-- | linker/linker_main.cpp | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/linker/linker_main.cpp b/linker/linker_main.cpp index 9de7f51ce..6c762a92c 100644 --- a/linker/linker_main.cpp +++ b/linker/linker_main.cpp @@ -353,6 +353,8 @@ static ElfW(Addr) linker_main(KernelArgumentBlock& args, const char* exe_to_load // a C-style string to last until the program exits. static std::string exe_path = exe_info.path; + INFO("[ Linking executable \"%s\" ]", exe_path.c_str()); + // Initialize the main exe's soinfo. soinfo* si = soinfo_alloc(&g_default_namespace, exe_path.c_str(), &exe_info.file_stat, |