summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--chrome/browser/autofill/autofill_download.cc10
-rw-r--r--chrome/browser/cocoa/install_from_dmg.mm8
-rw-r--r--chrome/browser/cocoa/preferences_window_controller.mm5
-rw-r--r--chrome/browser/debugger/extension_ports_remote_service.cc33
-rw-r--r--chrome/browser/dom_ui/filebrowse_ui.cc6
-rw-r--r--chrome/browser/download/download_util.cc4
-rw-r--r--chrome/browser/first_run/first_run.cc6
-rw-r--r--chrome/browser/history/history_backend.cc2
-rw-r--r--chrome/browser/history/top_sites.cc4
-rw-r--r--chrome/browser/importer/firefox_importer_utils.cc8
-rw-r--r--chrome/browser/importer/ie_importer.cc4
-rw-r--r--chrome/browser/metrics/metrics_service.cc34
-rw-r--r--chrome/browser/notifications/notification_ui_manager.cc6
-rw-r--r--chrome/browser/password_manager/password_store_x.cc2
-rw-r--r--chrome/browser/policy/config_dir_policy_provider.cc2
-rw-r--r--chrome/browser/service/service_process_control.cc2
-rw-r--r--chrome/browser/ssl/ssl_error_handler.cc4
-rw-r--r--chrome/browser/ssl/ssl_manager.cc4
-rw-r--r--chrome/browser/themes/browser_theme_provider.cc2
19 files changed, 72 insertions, 74 deletions
diff --git a/chrome/browser/autofill/autofill_download.cc b/chrome/browser/autofill/autofill_download.cc
index ba8c63d..10617a3 100644
--- a/chrome/browser/autofill/autofill_download.cc
+++ b/chrome/browser/autofill/autofill_download.cc
@@ -97,7 +97,7 @@ bool AutoFillDownloadManager::StartUploadRequest(
double upload_rate = form_was_matched ? GetPositiveUploadRate() :
GetNegativeUploadRate();
if (base::RandDouble() > upload_rate) {
- LOG(INFO) << "AutoFillDownloadManager: Upload request is ignored";
+ VLOG(1) << "AutoFillDownloadManager: Upload request is ignored";
// If we ever need notification that upload was skipped, add it here.
return false;
}
@@ -238,16 +238,16 @@ void AutoFillDownloadManager::OnURLFetchComplete(const URLFetcher* source,
}
}
- LOG(INFO) << "AutoFillDownloadManager: " << type_of_request <<
- " request has failed with response" << response_code;
+ VLOG(1) << "AutoFillDownloadManager: " << type_of_request
+ << " request has failed with response" << response_code;
if (observer_) {
observer_->OnHeuristicsRequestError(it->second.form_signatures[0],
it->second.request_type,
response_code);
}
} else {
- LOG(INFO) << "AutoFillDownloadManager: " << type_of_request <<
- " request has succeeded";
+ VLOG(1) << "AutoFillDownloadManager: " << type_of_request
+ << " request has succeeded";
if (it->second.request_type == AutoFillDownloadManager::REQUEST_QUERY) {
if (observer_)
observer_->OnLoadedAutoFillHeuristics(data);
diff --git a/chrome/browser/cocoa/install_from_dmg.mm b/chrome/browser/cocoa/install_from_dmg.mm
index e702e64..df24d5c 100644
--- a/chrome/browser/cocoa/install_from_dmg.mm
+++ b/chrome/browser/cocoa/install_from_dmg.mm
@@ -393,8 +393,8 @@ bool MaybeInstallFromDiskImage() {
if (![file_manager fileExistsAtPath:application_directory
isDirectory:&is_directory] ||
!is_directory) {
- LOG(INFO) << "No application directory at "
- << [application_directory UTF8String];
+ VLOG(1) << "No application directory at "
+ << [application_directory UTF8String];
return false;
}
@@ -404,14 +404,14 @@ bool MaybeInstallFromDiskImage() {
[application_directory stringByAppendingPathComponent:application_name];
if ([file_manager fileExistsAtPath:target_path]) {
- LOG(INFO) << "Something already exists at " << [target_path UTF8String];
+ VLOG(1) << "Something already exists at " << [target_path UTF8String];
return false;
}
NSString* installer_path =
[mac_util::MainAppBundle() pathForResource:@"install" ofType:@"sh"];
if (!installer_path) {
- LOG(INFO) << "Could not locate install.sh";
+ VLOG(1) << "Could not locate install.sh";
return false;
}
diff --git a/chrome/browser/cocoa/preferences_window_controller.mm b/chrome/browser/cocoa/preferences_window_controller.mm
index cc15ac8..a323233 100644
--- a/chrome/browser/cocoa/preferences_window_controller.mm
+++ b/chrome/browser/cocoa/preferences_window_controller.mm
@@ -1637,9 +1637,8 @@ const int kDisabledIndex = 1;
GoogleUpdateSettings::SetCollectStatsConsent(enabled);
bool update_pref = GoogleUpdateSettings::GetCollectStatsConsent();
if (enabled != update_pref) {
- DLOG(INFO) <<
- "GENERAL SECTION: Unable to set crash report status to " <<
- enabled;
+ DVLOG(1) << "GENERAL SECTION: Unable to set crash report status to "
+ << enabled;
}
// Only change the pref if GoogleUpdateSettings::GetCollectStatsConsent
// succeeds.
diff --git a/chrome/browser/debugger/extension_ports_remote_service.cc b/chrome/browser/debugger/extension_ports_remote_service.cc
index 29cc11f..4fc4c68 100644
--- a/chrome/browser/debugger/extension_ports_remote_service.cc
+++ b/chrome/browser/debugger/extension_ports_remote_service.cc
@@ -203,7 +203,7 @@ void ExtensionPortsRemoteService::HandleMessage(
}
void ExtensionPortsRemoteService::OnConnectionLost() {
- LOG(INFO) << "OnConnectionLost";
+ VLOG(1) << "OnConnectionLost";
DCHECK_EQ(MessageLoop::current()->type(), MessageLoop::TYPE_UI);
DCHECK(service_);
for (PortIdSet::iterator it = openPortIds_.begin();
@@ -264,8 +264,7 @@ void ExtensionPortsRemoteService::OnExtensionMessageInvoke(
void ExtensionPortsRemoteService::OnExtensionMessage(
const std::string& message, int port_id) {
- LOG(INFO) << "Message event: from port " << port_id
- << ", < " << message << ">";
+ VLOG(1) << "Message event: from port " << port_id << ", < " << message << ">";
// Transpose the information into a JSON message for the external client.
DictionaryValue content;
content.SetString(kCommandKey, kOnMessage);
@@ -281,7 +280,7 @@ void ExtensionPortsRemoteService::OnExtensionMessage(
}
void ExtensionPortsRemoteService::OnExtensionPortDisconnected(int port_id) {
- LOG(INFO) << "Disconnect event for port " << port_id;
+ VLOG(1) << "Disconnect event for port " << port_id;
openPortIds_.erase(port_id);
DictionaryValue content;
content.SetString(kCommandKey, kOnDisconnect);
@@ -316,32 +315,32 @@ void ExtensionPortsRemoteService::ConnectCommand(
if (it != navcon_map.end())
tab_contents = it->second->tab_contents();
if (!tab_contents) {
- LOG(INFO) << "tab not found: " << tab_id;
+ VLOG(1) << "tab not found: " << tab_id;
response->SetInteger(kResultKey, RESULT_TAB_NOT_FOUND);
return;
}
// Ask the ExtensionMessageService to open the channel.
- LOG(INFO) << "Connect: extension_id <" << extension_id
- << ">, channel_name <" << channel_name << ">"
- << ", tab " << tab_id;
+ VLOG(1) << "Connect: extension_id <" << extension_id
+ << ">, channel_name <" << channel_name
+ << ">, tab " << tab_id;
DCHECK(service_);
port_id = service_->OpenSpecialChannelToTab(
extension_id, channel_name, tab_contents, this);
} else { // no tab: channel to an extension' background page / toolstrip.
// Ask the ExtensionMessageService to open the channel.
- LOG(INFO) << "Connect: extension_id <" << extension_id
- << ">, channel_name <" << channel_name << ">";
+ VLOG(1) << "Connect: extension_id <" << extension_id
+ << ">, channel_name <" << channel_name << ">";
DCHECK(service_);
port_id = service_->OpenSpecialChannelToExtension(
extension_id, channel_name, "null", this);
}
if (port_id == -1) {
// Failure: probably the extension ID doesn't exist.
- LOG(INFO) << "Connect failed";
+ VLOG(1) << "Connect failed";
response->SetInteger(kResultKey, RESULT_CONNECT_FAILED);
return;
}
- LOG(INFO) << "Connected: port " << port_id;
+ VLOG(1) << "Connected: port " << port_id;
openPortIds_.insert(port_id);
// Reply to external client with the port ID assigned to the new channel.
DictionaryValue* reply_data = new DictionaryValue();
@@ -352,10 +351,10 @@ void ExtensionPortsRemoteService::ConnectCommand(
void ExtensionPortsRemoteService::DisconnectCommand(
int port_id, DictionaryValue* response) {
- LOG(INFO) << "Disconnect port " << port_id;
+ VLOG(1) << "Disconnect port " << port_id;
PortIdSet::iterator portEntry = openPortIds_.find(port_id);
if (portEntry == openPortIds_.end()) { // unknown port ID.
- LOG(INFO) << "unknown port: " << port_id;
+ VLOG(1) << "unknown port: " << port_id;
response->SetInteger(kResultKey, RESULT_UNKNOWN_PORT);
return;
}
@@ -375,11 +374,11 @@ void ExtensionPortsRemoteService::PostMessageCommand(
std::string message;
// Stringified the JSON message body.
base::JSONWriter::Write(data, false, &message);
- LOG(INFO) << "postMessage: port " << port_id
- << ", message: <" << message << ">";
+ VLOG(1) << "postMessage: port " << port_id
+ << ", message: <" << message << ">";
PortIdSet::iterator portEntry = openPortIds_.find(port_id);
if (portEntry == openPortIds_.end()) { // Unknown port ID.
- LOG(INFO) << "unknown port: " << port_id;
+ VLOG(1) << "unknown port: " << port_id;
response->SetInteger(kResultKey, RESULT_UNKNOWN_PORT);
return;
}
diff --git a/chrome/browser/dom_ui/filebrowse_ui.cc b/chrome/browser/dom_ui/filebrowse_ui.cc
index 2e616ef..9a63394 100644
--- a/chrome/browser/dom_ui/filebrowse_ui.cc
+++ b/chrome/browser/dom_ui/filebrowse_ui.cc
@@ -1,4 +1,4 @@
-// Copyright (c) 2009 The Chromium Authors. All rights reserved.
+// Copyright (c) 2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
@@ -521,8 +521,8 @@ void FilebrowseHandler::OnURLFetchComplete(const URLFetcher* source,
const ResponseCookies& cookies,
const std::string& data) {
upload_response_code_ = response_code;
- LOG(INFO) << "Response code:" << response_code;
- LOG(INFO) << "request url" << url;
+ VLOG(1) << "Response code: " << response_code;
+ VLOG(1) << "Request url: " << url;
if (StartsWithASCII(url.spec(), kPicasawebUserPrefix, true)) {
BrowserThread::PostTask(
BrowserThread::UI, FROM_HERE,
diff --git a/chrome/browser/download/download_util.cc b/chrome/browser/download/download_util.cc
index a0cd265..affa24a1 100644
--- a/chrome/browser/download/download_util.cc
+++ b/chrome/browser/download/download_util.cc
@@ -605,13 +605,13 @@ void UpdateAppIconDownloadProgress(int download_count,
HRESULT result = taskbar.CreateInstance(CLSID_TaskbarList, NULL,
CLSCTX_INPROC_SERVER);
if (FAILED(result)) {
- LOG(INFO) << "failed creating a TaskbarList object: " << result;
+ VLOG(1) << "Failed creating a TaskbarList object: " << result;
return;
}
result = taskbar->HrInit();
if (FAILED(result)) {
- LOG(ERROR) << "failed initializing an ITaskbarList3 interface.";
+ LOG(ERROR) << "Failed initializing an ITaskbarList3 interface.";
return;
}
diff --git a/chrome/browser/first_run/first_run.cc b/chrome/browser/first_run/first_run.cc
index 663c52d..54f030e 100644
--- a/chrome/browser/first_run/first_run.cc
+++ b/chrome/browser/first_run/first_run.cc
@@ -133,10 +133,10 @@ bool FirstRun::ProcessMasterPreferences(const FilePath& user_data_dir,
::ExitProcess(1);
}
if (retcode == installer_util::EULA_ACCEPTED) {
- LOG(INFO) << "EULA : no collection";
+ VLOG(1) << "EULA : no collection";
GoogleUpdateSettings::SetCollectStatsConsent(false);
} else if (retcode == installer_util::EULA_ACCEPTED_OPT_IN) {
- LOG(INFO) << "EULA : collection consent";
+ VLOG(1) << "EULA : collection consent";
GoogleUpdateSettings::SetCollectStatsConsent(true);
}
}
@@ -159,7 +159,7 @@ bool FirstRun::ProcessMasterPreferences(const FilePath& user_data_dir,
#if defined(OS_WIN)
DictionaryValue* extensions = 0;
if (installer_util::HasExtensionsBlock(prefs.get(), &extensions)) {
- LOG(INFO) << "Extensions block found in master preferences";
+ VLOG(1) << "Extensions block found in master preferences";
DoDelayedInstallExtensions();
}
#endif
diff --git a/chrome/browser/history/history_backend.cc b/chrome/browser/history/history_backend.cc
index 4b37ccd..fb8e3d3 100644
--- a/chrome/browser/history/history_backend.cc
+++ b/chrome/browser/history/history_backend.cc
@@ -602,7 +602,7 @@ void HistoryBackend::InitImpl(const std::string& languages) {
if (history::TopSites::IsEnabled()) {
// TODO(sky): fix when reenabling top sites migration.
// if (db_->needs_version_18_migration()) {
- // LOG(INFO) << "Starting TopSites migration";
+ // VLOG(1) << "Starting TopSites migration";
// delegate_->StartTopSitesMigration();
// }
}
diff --git a/chrome/browser/history/top_sites.cc b/chrome/browser/history/top_sites.cc
index 99e8b65..31ce4ac 100644
--- a/chrome/browser/history/top_sites.cc
+++ b/chrome/browser/history/top_sites.cc
@@ -658,13 +658,13 @@ void TopSites::StartQueryForMostVisited() {
&cancelable_consumer_,
NewCallback(this, &TopSites::OnTopSitesAvailable));
} else {
- LOG(INFO) << "History Service not available.";
+ VLOG(1) << "History Service not available.";
}
}
}
void TopSites::StartMigration() {
- LOG(INFO) << "Starting migration to TopSites.";
+ VLOG(1) << "Starting migration to TopSites.";
migration_in_progress_ = true;
StartQueryForMostVisited();
MigratePinnedURLs();
diff --git a/chrome/browser/importer/firefox_importer_utils.cc b/chrome/browser/importer/firefox_importer_utils.cc
index 3552b7a..e223491 100644
--- a/chrome/browser/importer/firefox_importer_utils.cc
+++ b/chrome/browser/importer/firefox_importer_utils.cc
@@ -410,7 +410,7 @@ bool ParsePrefFile(const FilePath& pref_file, DictionaryValue* prefs) {
if (IsStringUTF8(value))
prefs->SetString(key, value);
else
- LOG(INFO) << "Non UTF8 value for key " << key << ", ignored.";
+ VLOG(1) << "Non UTF8 value for key " << key << ", ignored.";
continue;
}
@@ -421,8 +421,8 @@ bool ParsePrefFile(const FilePath& pref_file, DictionaryValue* prefs) {
continue;
}
- LOG(ERROR) << "Invalid value found in Firefox pref file '" <<
- pref_file.value() << "' value is '" << value << "'.";
+ LOG(ERROR) << "Invalid value found in Firefox pref file '"
+ << pref_file.value() << "' value is '" << value << "'.";
}
return true;
}
@@ -434,7 +434,7 @@ std::string GetPrefsJsValue(const std::string& content,
std::string("\", ");
size_t prop_index = content.find(search_for);
if (prop_index == std::string::npos)
- return "";
+ return std::string();
size_t start = prop_index + search_for.length();
size_t stop = std::string::npos;
diff --git a/chrome/browser/importer/ie_importer.cc b/chrome/browser/importer/ie_importer.cc
index 07b2d34..f2905dd 100644
--- a/chrome/browser/importer/ie_importer.cc
+++ b/chrome/browser/importer/ie_importer.cc
@@ -364,7 +364,7 @@ void IEImporter::ImportSearchEngines() {
RegKey sub_key(HKEY_CURRENT_USER, sub_key_name.c_str(), KEY_READ);
std::wstring wide_url;
if (!sub_key.ReadValue(L"URL", &wide_url) || wide_url.empty()) {
- LOG(INFO) << "No URL for IE search engine at " << key_iterator.Name();
+ VLOG(1) << "No URL for IE search engine at " << key_iterator.Name();
++key_iterator;
continue;
}
@@ -375,7 +375,7 @@ void IEImporter::ImportSearchEngines() {
if (!sub_key.ReadValue(NULL, &name) || name.empty()) {
// Try the displayable name.
if (!sub_key.ReadValue(L"DisplayName", &name) || name.empty()) {
- LOG(INFO) << "No name for IE search engine at " << key_iterator.Name();
+ VLOG(1) << "No name for IE search engine at " << key_iterator.Name();
++key_iterator;
continue;
}
diff --git a/chrome/browser/metrics/metrics_service.cc b/chrome/browser/metrics/metrics_service.cc
index 37b79b7..1ddc987 100644
--- a/chrome/browser/metrics/metrics_service.cc
+++ b/chrome/browser/metrics/metrics_service.cc
@@ -656,7 +656,7 @@ void MetricsService::Observe(NotificationType type,
HandleIdleSinceLastTransmission(false);
if (current_log_)
- DLOG(INFO) << "METRICS: NUMBER OF EVENTS = " << current_log_->num_events();
+ DVLOG(1) << "METRICS: NUMBER OF EVENTS = " << current_log_->num_events();
}
void MetricsService::HandleIdleSinceLastTransmission(bool in_idle) {
@@ -1305,7 +1305,7 @@ void MetricsService::PreparePendingLogText() {
if (Bzip2Compress(pending_log_text, &compressed_log_)) {
// Allow security conscious users to see all metrics logs that we send.
- LOG(INFO) << "COMPRESSED FOLLOWING METRICS LOG: " << pending_log_text;
+ VLOG(1) << "COMPRESSED FOLLOWING METRICS LOG: " << pending_log_text;
} else {
LOG(DFATAL) << "Failed to compress log for transmission.";
// We can't discard the logs as other caller functions expect that
@@ -1365,8 +1365,8 @@ void MetricsService::OnURLFetchComplete(const URLFetcher* source,
current_fetch_.reset(NULL); // We're not allowed to re-use it.
// Confirm send so that we can move on.
- LOG(INFO) << "METRICS RESPONSE CODE: " << response_code << " status=" <<
- StatusToString(status);
+ VLOG(1) << "METRICS RESPONSE CODE: " << response_code
+ << " status=" << StatusToString(status);
// Provide boolean for error recovery (allow us to ignore response_code).
bool discard_log = false;
@@ -1384,11 +1384,11 @@ void MetricsService::OnURLFetchComplete(const URLFetcher* source,
}
if (response_code != 200 && !discard_log) {
- LOG(INFO) << "METRICS: transmission attempt returned a failure code: "
- << response_code << ". Verify network connectivity";
+ VLOG(1) << "METRICS: transmission attempt returned a failure code: "
+ << response_code << ". Verify network connectivity";
HandleBadResponseCode();
} else { // Successful receipt (or we are discarding log).
- LOG(INFO) << "METRICS RESPONSE DATA: " << data;
+ VLOG(1) << "METRICS RESPONSE DATA: " << data;
switch (state_) {
case INITIAL_LOG_READY:
state_ = SEND_OLD_INITIAL_LOGS;
@@ -1438,10 +1438,10 @@ void MetricsService::OnURLFetchComplete(const URLFetcher* source,
}
void MetricsService::HandleBadResponseCode() {
- LOG(INFO) << "Verify your metrics logs are formatted correctly. "
- "Verify server is active at " << server_url_;
+ VLOG(1) << "Verify your metrics logs are formatted correctly. Verify server "
+ "is active at " << server_url_;
if (!pending_log()) {
- LOG(INFO) << "METRICS: Recorder shutdown during log transmission.";
+ VLOG(1) << "METRICS: Recorder shutdown during log transmission.";
} else {
// Send progressively less frequently.
DCHECK(kBackoff > 1.0);
@@ -1454,9 +1454,9 @@ void MetricsService::HandleBadResponseCode() {
TimeDelta::FromSeconds(kMinSecondsPerLog);
}
- LOG(INFO) << "METRICS: transmission retry being scheduled in " <<
- interlog_duration_.InSeconds() << " seconds for " <<
- compressed_log_;
+ VLOG(1) << "METRICS: transmission retry being scheduled in "
+ << interlog_duration_.InSeconds() << " seconds for "
+ << compressed_log_;
}
}
@@ -1464,18 +1464,18 @@ void MetricsService::GetSettingsFromResponseData(const std::string& data) {
// We assume that the file is structured as a block opened by <response>
// and that inside response, there is a block opened by tag <chrome_config>
// other tags are ignored for now except the content of <chrome_config>.
- LOG(INFO) << "METRICS: getting settings from response data: " << data;
+ VLOG(1) << "METRICS: getting settings from response data: " << data;
int data_size = static_cast<int>(data.size());
if (data_size < 0) {
- LOG(INFO) << "METRICS: server response data bad size: " << data_size <<
- "; aborting extraction of settings";
+ VLOG(1) << "METRICS: server response data bad size: " << data_size
+ << "; aborting extraction of settings";
return;
}
xmlDocPtr doc = xmlReadMemory(data.c_str(), data_size, "", NULL, 0);
// If the document is malformed, we just use the settings that were there.
if (!doc) {
- LOG(INFO) << "METRICS: reading xml from server response data failed";
+ VLOG(1) << "METRICS: reading xml from server response data failed";
return;
}
diff --git a/chrome/browser/notifications/notification_ui_manager.cc b/chrome/browser/notifications/notification_ui_manager.cc
index 42b9c5e..adc44cf 100644
--- a/chrome/browser/notifications/notification_ui_manager.cc
+++ b/chrome/browser/notifications/notification_ui_manager.cc
@@ -1,4 +1,4 @@
-// Copyright (c) 2009 The Chromium Authors. All rights reserved.
+// Copyright (c) 2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
@@ -59,8 +59,8 @@ void NotificationUIManager::Add(const Notification& notification,
return;
}
- LOG(INFO) << "Added notification. URL: "
- << notification.content_url().spec().c_str();
+ VLOG(1) << "Added notification. URL: "
+ << notification.content_url().spec();
show_queue_.push_back(
new QueuedNotification(notification, profile));
CheckAndShowNotifications();
diff --git a/chrome/browser/password_manager/password_store_x.cc b/chrome/browser/password_manager/password_store_x.cc
index 6e39215..cc827dd 100644
--- a/chrome/browser/password_manager/password_store_x.cc
+++ b/chrome/browser/password_manager/password_store_x.cc
@@ -170,7 +170,7 @@ void PasswordStoreX::CheckMigration() {
migration_checked_ = true;
ssize_t migrated = MigrateLogins();
if (migrated > 0) {
- LOG(INFO) << "Migrated " << migrated << " passwords to native store.";
+ VLOG(1) << "Migrated " << migrated << " passwords to native store.";
} else if (migrated == 0) {
// As long as we are able to migrate some passwords, we know the native
// store is working. But if there is nothing to migrate, the "migration"
diff --git a/chrome/browser/policy/config_dir_policy_provider.cc b/chrome/browser/policy/config_dir_policy_provider.cc
index 3598f71..6fe7630 100644
--- a/chrome/browser/policy/config_dir_policy_provider.cc
+++ b/chrome/browser/policy/config_dir_policy_provider.cc
@@ -87,7 +87,7 @@ void PolicyDirLoader::Reload() {
// There's a change, report it!
if (changed) {
- LOG(INFO) << "Policy reload from " << config_dir_.value() << " succeeded.";
+ VLOG(1) << "Policy reload from " << config_dir_.value() << " succeeded.";
origin_loop_->PostTask(FROM_HERE,
NewRunnableMethod(this, &PolicyDirLoader::NotifyPolicyChanged));
}
diff --git a/chrome/browser/service/service_process_control.cc b/chrome/browser/service/service_process_control.cc
index fcef987..534cc5a 100644
--- a/chrome/browser/service/service_process_control.cc
+++ b/chrome/browser/service/service_process_control.cc
@@ -102,7 +102,7 @@ void ServiceProcessControl::ConnectInternal() {
}
// Actually going to connect.
- LOG(INFO) << "Connecting to Service Process IPC Server";
+ VLOG(1) << "Connecting to Service Process IPC Server";
// Run the IPC channel on the shared IO thread.
base::Thread* io_thread = g_browser_process->io_thread();
diff --git a/chrome/browser/ssl/ssl_error_handler.cc b/chrome/browser/ssl/ssl_error_handler.cc
index fb26005..d05c17f 100644
--- a/chrome/browser/ssl/ssl_error_handler.cc
+++ b/chrome/browser/ssl/ssl_error_handler.cc
@@ -130,7 +130,7 @@ void SSLErrorHandler::CompleteCancelRequest(int error) {
if (request) {
// The request can be NULL if it was cancelled by the renderer (as the
// result of the user navigating to a new page from the location bar).
- DLOG(INFO) << "CompleteCancelRequest() url: " << request->url().spec();
+ DVLOG(1) << "CompleteCancelRequest() url: " << request->url().spec();
SSLCertErrorHandler* cert_error = AsSSLCertErrorHandler();
if (cert_error)
request->SimulateSSLError(error, cert_error->ssl_info());
@@ -157,7 +157,7 @@ void SSLErrorHandler::CompleteContinueRequest() {
if (request) {
// The request can be NULL if it was cancelled by the renderer (as the
// result of the user navigating to a new page from the location bar).
- DLOG(INFO) << "CompleteContinueRequest() url: " << request->url().spec();
+ DVLOG(1) << "CompleteContinueRequest() url: " << request->url().spec();
request->ContinueDespiteLastError();
}
request_has_been_notified_ = true;
diff --git a/chrome/browser/ssl/ssl_manager.cc b/chrome/browser/ssl/ssl_manager.cc
index 6b4f731..c894a44 100644
--- a/chrome/browser/ssl/ssl_manager.cc
+++ b/chrome/browser/ssl/ssl_manager.cc
@@ -27,8 +27,8 @@ void SSLManager::OnSSLCertificateError(ResourceDispatcherHost* rdh,
URLRequest* request,
int cert_error,
net::X509Certificate* cert) {
- DLOG(INFO) << "OnSSLCertificateError() cert_error: " << cert_error <<
- " url: " << request->url().spec();
+ DVLOG(1) << "OnSSLCertificateError() cert_error: " << cert_error
+ << " url: " << request->url().spec();
ResourceDispatcherHostRequestInfo* info =
ResourceDispatcherHost::InfoForRequest(request);
diff --git a/chrome/browser/themes/browser_theme_provider.cc b/chrome/browser/themes/browser_theme_provider.cc
index fde7ea5..58a6c31 100644
--- a/chrome/browser/themes/browser_theme_provider.cc
+++ b/chrome/browser/themes/browser_theme_provider.cc
@@ -574,7 +574,7 @@ void BrowserThemeProvider::LoadThemePrefs() {
}
void BrowserThemeProvider::NotifyThemeChanged(Extension* extension) {
- LOG(INFO) << "Sending BROWSER_THEME_CHANGED";
+ VLOG(1) << "Sending BROWSER_THEME_CHANGED";
// Redraw!
NotificationService* service = NotificationService::current();
service->Notify(NotificationType::BROWSER_THEME_CHANGED,