reduce bpfloader boot log spam

Bug: 261472074
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I57b97ac7978c85913c52443d7efe40813146a2ba
diff --git a/libbpf_android/Loader.cpp b/libbpf_android/Loader.cpp
index fddb1a7..99c160a 100644
--- a/libbpf_android/Loader.cpp
+++ b/libbpf_android/Loader.cpp
@@ -955,9 +955,12 @@
     insnIndex = offset / sizeof(struct bpf_insn);
     insn = &insns[insnIndex];
 
-    ALOGD("applying relo to instruction at byte offset: %llu, "
-          "insn offset %d, insn %llx",
-          (unsigned long long)offset, insnIndex, *(unsigned long long*)insn);
+    // Occasionally might be useful for relocation debugging, but pretty spammy
+    if (0) {
+        ALOGD("applying relo to instruction at byte offset: %llu, "
+              "insn offset %d, insn %llx",
+              (unsigned long long)offset, insnIndex, *(unsigned long long*)insn);
+    }
 
     if (insn->code != (BPF_LD | BPF_IMM | BPF_DW)) {
         ALOGE("Dumping all instructions till ins %d", insnIndex);