summaryrefslogtreecommitdiff
path: root/linker/linker_main.cpp
diff options
context:
space:
mode:
authorMartin Stjernholm <mast@google.com>2019-02-22 22:48:59 +0000
committerMartin Stjernholm <mast@google.com>2019-03-19 14:03:18 +0000
commit95252eedf32f38b22784ba6f1097f25d485652f5 (patch)
treee76a8f7fef10ad78fed7fee7c85e1756f84edcb9 /linker/linker_main.cpp
parent0ab20442e49316899050d3af72257d5f483761d0 (diff)
Add more linker debug.
- Show which executable is being linked, which linker config file is being read, and which section in it is being used with, enabled on $LD_DEBUG>=1. - Show more info to follow the dlopen() process, enabled with "dlopen" in the debug.ld.xxx property. Test: Flash, boot, and look at logcat after "adb shell setprop debug.ld.all dlopen" Bug: 120430775 Change-Id: I5441c8ced26ec0e2f04620c3d2a1ae860b792154
Diffstat (limited to 'linker/linker_main.cpp')
-rw-r--r--linker/linker_main.cpp2
1 files changed, 2 insertions, 0 deletions
diff --git a/linker/linker_main.cpp b/linker/linker_main.cpp
index 9de7f51ce..6c762a92c 100644
--- a/linker/linker_main.cpp
+++ b/linker/linker_main.cpp
@@ -353,6 +353,8 @@ static ElfW(Addr) linker_main(KernelArgumentBlock& args, const char* exe_to_load
// a C-style string to last until the program exits.
static std::string exe_path = exe_info.path;
+ INFO("[ Linking executable \"%s\" ]", exe_path.c_str());
+
// Initialize the main exe's soinfo.
soinfo* si = soinfo_alloc(&g_default_namespace,
exe_path.c_str(), &exe_info.file_stat,