| Index: content/common/sandbox_linux/sandbox_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc
|
| index 12e11d8e1312d1480cbf7e7bb8bc27e9760ef156..433dc08b6742ed4f6f91da63e89f9baaf27558ee 100644
|
| --- a/content/common/sandbox_linux/sandbox_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_linux.cc
|
| @@ -59,7 +59,7 @@ void LogSandboxStarted(const std::string& sandbox_name) {
|
| const std::string activated_sandbox =
|
| "Activated " + sandbox_name + " sandbox for process type: " +
|
| process_type + ".";
|
| - VLOG(1) << activated_sandbox;
|
| + DVLOG(1) << activated_sandbox;
|
| }
|
|
|
| bool AddResourceLimit(int resource, rlim_t limit) {
|
| @@ -153,7 +153,7 @@ void LinuxSandbox::PreinitializeSandbox() {
|
| // We "pre-warm" the code that detects supports for seccomp BPF.
|
| if (SandboxSeccompBPF::IsSeccompBPFDesired()) {
|
| if (!SandboxSeccompBPF::SupportsSandbox()) {
|
| - VLOG(1) << "Lacking support for seccomp-bpf sandbox.";
|
| + DVLOG(1) << "Lacking support for seccomp-bpf sandbox.";
|
| } else {
|
| seccomp_bpf_supported_ = true;
|
| }
|
|
|