From e5eda151b4ce9b29581e02bb8b23eaa1e17a4edf Mon Sep 17 00:00:00 2001 From: Andreas Kling Date: Sun, 20 Dec 2020 16:06:39 +0100 Subject: [PATCH] Kernel: Silence debug spam when running dynamically linked programs --- Kernel/Syscalls/execve.cpp | 2 ++ 1 file changed, 2 insertions(+) diff --git a/Kernel/Syscalls/execve.cpp b/Kernel/Syscalls/execve.cpp index 6b037b3f1d..2561e1d515 100644 --- a/Kernel/Syscalls/execve.cpp +++ b/Kernel/Syscalls/execve.cpp @@ -451,7 +451,9 @@ KResultOr> Process::find_elf_interpreter_for_exec if (elf_header->e_type != ET_DYN) return KResult(-ENOEXEC); +#ifdef EXEC_DEBUG dbg() << "exec(" << path << "): Using program interpreter " << interpreter_path; +#endif auto interp_result = VFS::the().open(interpreter_path, O_EXEC, 0, current_directory()); if (interp_result.is_error()) { dbg() << "exec(" << path << "): Unable to open program interpreter " << interpreter_path;