Assorted logging pedantry

This cl fixes various minor issues found during a quick scan of the current log
usage.

Bug: webrtc:8529
Change-Id: I1e1eb02ef220177dbb327203509736ad7f70cc1c
Reviewed-on: https://webrtc-review.googlesource.com/52262
Commit-Queue: Jonas Olsson <jonasolsson@webrtc.org>
Reviewed-by: Fredrik Solenberg <solenberg@webrtc.org>
Reviewed-by: Karl Wiberg <kwiberg@webrtc.org>
Reviewed-by: Henrik Grunell <henrikg@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#21996}
diff --git a/media/base/rtpdataengine.cc b/media/base/rtpdataengine.cc
index 7cb5fa8..191645b 100644
--- a/media/base/rtpdataengine.cc
+++ b/media/base/rtpdataengine.cc
@@ -202,18 +202,11 @@
     rtc::CopyOnWriteBuffer* packet, const rtc::PacketTime& packet_time) {
   RtpHeader header;
   if (!GetRtpHeader(packet->cdata(), packet->size(), &header)) {
-    // Don't want to log for every corrupt packet.
-    // RTC_LOG(LS_WARNING) << "Could not read rtp header from packet of length "
-    //                 << packet->length() << ".";
     return;
   }
 
   size_t header_length;
   if (!GetRtpHeaderLen(packet->cdata(), packet->size(), &header_length)) {
-    // Don't want to log for every corrupt packet.
-    // RTC_LOG(LS_WARNING) << "Could not read rtp header"
-    //                 << length from packet of length "
-    //                 << packet->length() << ".";
     return;
   }
   const char* data =
@@ -227,12 +220,6 @@
   }
 
   if (!FindCodecById(recv_codecs_, header.payload_type)) {
-    // For bundling, this will be logged for every message.
-    // So disable this logging.
-    // RTC_LOG(LS_WARNING) << "Not receiving packet "
-    //                << header.ssrc << ":" << header.seq_num
-    //                << " (" << data_len << ")"
-    //                << " because unknown payload id: " << header.payload_type;
     return;
   }
 
diff --git a/p2p/base/fakeicetransport.h b/p2p/base/fakeicetransport.h
index f3a8313..556a1cd 100644
--- a/p2p/base/fakeicetransport.h
+++ b/p2p/base/fakeicetransport.h
@@ -221,7 +221,7 @@
     if (writable_ == writable) {
       return;
     }
-    RTC_LOG(INFO) << "set_writable from:" << writable_ << " to " << writable;
+    RTC_LOG(INFO) << "Change writable_ to " << writable;
     writable_ = writable;
     if (writable_) {
       SignalReadyToSend(this);
diff --git a/p2p/base/p2ptransportchannel.cc b/p2p/base/p2ptransportchannel.cc
index 0e6deee..71af657 100644
--- a/p2p/base/p2ptransportchannel.cc
+++ b/p2p/base/p2ptransportchannel.cc
@@ -2237,8 +2237,7 @@
   if (writable_ == writable) {
     return;
   }
-  LOG_J(LS_VERBOSE, this) << "set_writable from:" << writable_ << " to "
-                          << writable;
+  LOG_J(LS_VERBOSE, this) << "Changed writable_ to " << writable;
   writable_ = writable;
   if (writable_) {
     SignalReadyToSend(this);
diff --git a/p2p/base/port.cc b/p2p/base/port.cc
index 2f77aa7..5f5153f 100644
--- a/p2p/base/port.cc
+++ b/p2p/base/port.cc
@@ -1107,8 +1107,7 @@
   bool old_value = connected_;
   connected_ = value;
   if (value != old_value) {
-    LOG_J(LS_VERBOSE, this) << "set_connected from: " << old_value << " to "
-                            << value;
+    LOG_J(LS_VERBOSE, this) << "Change connected_ to " << value;
     SignalStateChange(this);
   }
 }
diff --git a/p2p/base/relayport.cc b/p2p/base/relayport.cc
index 045f0c3..a789a1b 100644
--- a/p2p/base/relayport.cc
+++ b/p2p/base/relayport.cc
@@ -678,7 +678,7 @@
 
 void RelayEntry::OnSocketClose(rtc::AsyncPacketSocket* socket,
                                int error) {
-  RTC_PLOG(LERROR, error) << "Relay connection failed: socket closed";
+  RTC_LOG_ERR_EX(LERROR, error) << "Relay connection failed: socket closed";
   HandleConnectFailure(socket);
 }
 
diff --git a/p2p/base/stunport.cc b/p2p/base/stunport.cc
index d450d8e..69196cf 100644
--- a/p2p/base/stunport.cc
+++ b/p2p/base/stunport.cc
@@ -517,7 +517,7 @@
   StunBindingRequest* sreq = static_cast<StunBindingRequest*>(req);
   rtc::PacketOptions options(DefaultDscpValue());
   if (socket_->SendTo(data, size, sreq->server_addr(), options) < 0)
-    RTC_PLOG(LERROR, socket_->GetError()) << "sendto";
+    RTC_LOG_ERR_EX(LERROR, socket_->GetError()) << "sendto";
 }
 
 bool UDPPort::HasCandidateWithAddress(const rtc::SocketAddress& addr) const {
diff --git a/pc/datachannel.cc b/pc/datachannel.cc
index 950fbea..525b6f9 100644
--- a/pc/datachannel.cc
+++ b/pc/datachannel.cc
@@ -151,7 +151,7 @@
         config.maxRetransmits != -1 ||
         config.maxRetransmitTime != -1) {
       RTC_LOG(LS_ERROR) << "Failed to initialize the RTP data channel due to "
-                        << "invalid DataChannelInit.";
+                           "invalid DataChannelInit.";
       return false;
     }
     handshake_state_ = kHandshakeReady;
@@ -160,7 +160,7 @@
         config.maxRetransmits < -1 ||
         config.maxRetransmitTime < -1) {
       RTC_LOG(LS_ERROR) << "Failed to initialize the SCTP data channel due to "
-                        << "invalid DataChannelInit.";
+                           "invalid DataChannelInit.";
       return false;
     }
     if (config.maxRetransmits != -1 && config.maxRetransmitTime != -1) {
@@ -344,8 +344,9 @@
     RTC_DCHECK(data_channel_type_ == cricket::DCT_SCTP);
     if (handshake_state_ != kHandshakeWaitingForAck) {
       // Ignore it if we are not expecting an ACK message.
-      RTC_LOG(LS_WARNING) << "DataChannel received unexpected CONTROL message, "
-                          << "sid = " << params.sid;
+      RTC_LOG(LS_WARNING)
+          << "DataChannel received unexpected CONTROL message, sid = "
+          << params.sid;
       return;
     }
     if (ParseDataChannelOpenAckMessage(payload)) {
@@ -551,7 +552,7 @@
       send_params.ordered = true;
       RTC_LOG(LS_VERBOSE)
           << "Sending data as ordered for unordered DataChannel "
-          << "because the OPEN_ACK message has not been received.";
+             "because the OPEN_ACK message has not been received.";
     }
 
     send_params.max_rtx_count = config_.maxRetransmits;
@@ -583,7 +584,8 @@
   // Close the channel if the error is not SDR_BLOCK, or if queuing the
   // message failed.
   RTC_LOG(LS_ERROR) << "Closing the DataChannel due to a failure to send data, "
-                    << "send_result = " << send_result;
+                       "send_result = "
+                    << send_result;
   Close();
 
   return false;
@@ -649,7 +651,8 @@
     QueueControlMessage(buffer);
   } else {
     RTC_LOG(LS_ERROR) << "Closing the DataChannel due to a failure to send"
-                      << " the CONTROL message, send_result = " << send_result;
+                         " the CONTROL message, send_result = "
+                      << send_result;
     Close();
   }
   return retval;
diff --git a/pc/dtlssrtptransport.cc b/pc/dtlssrtptransport.cc
index bc5d3aa..03771f4 100644
--- a/pc/dtlssrtptransport.cc
+++ b/pc/dtlssrtptransport.cc
@@ -62,7 +62,7 @@
   // allowed according to the BUNDLE spec.
   RTC_CHECK(!(IsActive()))
       << "Setting RTCP for DTLS/SRTP after the DTLS is active "
-      << "should never happen.";
+         "should never happen.";
 
   RTC_LOG(LS_INFO) << "Setting RTCP Transport on " << transport_name
                    << " transport " << rtcp_dtls_transport;
diff --git a/pc/dtmfsender.cc b/pc/dtmfsender.cc
index 82644aa..7a98bc3 100644
--- a/pc/dtmfsender.cc
+++ b/pc/dtmfsender.cc
@@ -120,9 +120,10 @@
       inter_tone_gap < kDtmfMinGapMs) {
     RTC_LOG(LS_ERROR)
         << "InsertDtmf is called with invalid duration or tones gap. "
-        << "The duration cannot be more than " << kDtmfMaxDurationMs
-        << "ms or less than " << kDtmfMinDurationMs << "ms. "
-        << "The gap between tones must be at least " << kDtmfMinGapMs << "ms.";
+           "The duration cannot be more than "
+        << kDtmfMaxDurationMs << "ms or less than " << kDtmfMinDurationMs
+        << "ms. The gap between tones must be at least "
+        << kDtmfMinGapMs << "ms.";
     return false;
   }
 
diff --git a/pc/mediasession.cc b/pc/mediasession.cc
index a2f47dc..a1bc01f 100644
--- a/pc/mediasession.cc
+++ b/pc/mediasession.cc
@@ -468,8 +468,8 @@
         } else if (!ssrcs.empty()) {
           RTC_LOG(LS_WARNING)
               << "Our FlexFEC implementation only supports protecting "
-              << "a single media streams. This session has multiple "
-              << "media streams however, so no FlexFEC SSRC will be generated.";
+                 "a single media streams. This session has multiple "
+                 "media streams however, so no FlexFEC SSRC will be generated.";
         }
       }
       stream_param.cname = rtcp_cname;
diff --git a/pc/peerconnection.cc b/pc/peerconnection.cc
index e565e57..14c2a88 100644
--- a/pc/peerconnection.cc
+++ b/pc/peerconnection.cc
@@ -802,14 +802,14 @@
   if (!allocator) {
     RTC_LOG(LS_ERROR)
         << "PeerConnection initialized without a PortAllocator? "
-        << "This shouldn't happen if using PeerConnectionFactory.";
+           "This shouldn't happen if using PeerConnectionFactory.";
     return false;
   }
 
   if (!observer) {
     // TODO(deadbeef): Why do we do this?
     RTC_LOG(LS_ERROR) << "PeerConnection initialized without a "
-                      << "PeerConnectionObserver";
+                         "PeerConnectionObserver";
     return false;
   }
   observer_ = observer;
@@ -2593,7 +2593,7 @@
 
   if (!remote_description()) {
     RTC_LOG(LS_ERROR) << "ProcessIceMessage: ICE candidates can't be added "
-                      << "without any remote session description.";
+                         "without any remote session description.";
     return false;
   }
 
@@ -2627,7 +2627,7 @@
   TRACE_EVENT0("webrtc", "PeerConnection::RemoveIceCandidates");
   if (!remote_description()) {
     RTC_LOG(LS_ERROR) << "RemoveRemoteIceCandidates: ICE candidates can't be "
-                      << "removed without any remote session description.";
+                         "removed without any remote session description.";
     return false;
   }
 
@@ -2641,7 +2641,8 @@
   if (number_removed != candidates.size()) {
     RTC_LOG(LS_ERROR)
         << "RemoveRemoteIceCandidates: Failed to remove candidates. "
-        << "Requested " << candidates.size() << " but only " << number_removed
+           "Requested "
+        << candidates.size() << " but only " << number_removed
         << " are removed.";
   }
 
@@ -3833,7 +3834,7 @@
 
   if (sender->media_type() != media_type) {
     RTC_LOG(LS_WARNING) << "An RtpSender has been configured in the local"
-                        << " description with an unexpected media type.";
+                           " description with an unexpected media type.";
     return;
   }
 
@@ -3855,7 +3856,7 @@
   // match with the calls to CreateSender, AddStream and RemoveStream.
   if (sender->media_type() != media_type) {
     RTC_LOG(LS_WARNING) << "An RtpSender has been configured in the local"
-                        << " description with an unexpected media type.";
+                           " description with an unexpected media type.";
     return;
   }
 
@@ -3944,7 +3945,7 @@
       InternalCreateDataChannel(label, nullptr));
   if (!channel.get()) {
     RTC_LOG(LS_WARNING) << "Remote peer requested a DataChannel but"
-                        << "CreateDataChannel failed.";
+                           "CreateDataChannel failed.";
     return;
   }
   channel->SetReceiveSsrc(remote_ssrc);
@@ -3977,7 +3978,7 @@
       }
     } else if (!sid_allocator_.ReserveSid(new_config.id)) {
       RTC_LOG(LS_ERROR) << "Failed to create a SCTP data channel "
-                        << "because the id is already in use or out of range.";
+                           "because the id is already in use or out of range.";
       return nullptr;
     }
   }
@@ -4313,12 +4314,12 @@
   if (!local_description() || !remote_description()) {
     RTC_LOG(LS_INFO)
         << "Local and Remote descriptions must be applied to get the "
-        << "SSL Role of the SCTP transport.";
+           "SSL Role of the SCTP transport.";
     return false;
   }
   if (!sctp_transport_) {
     RTC_LOG(LS_INFO) << "Non-rejected SCTP m= section is needed to get the "
-                     << "SSL Role of the SCTP transport.";
+                        "SSL Role of the SCTP transport.";
     return false;
   }
 
@@ -4330,7 +4331,7 @@
   if (!local_description() || !remote_description()) {
     RTC_LOG(LS_INFO)
         << "Local and Remote descriptions must be applied to get the "
-        << "SSL Role of the session.";
+           "SSL Role of the session.";
     return false;
   }
 
@@ -4681,7 +4682,7 @@
                               cricket::SendDataResult* result) {
   if (!rtp_data_channel_ && !sctp_transport_) {
     RTC_LOG(LS_ERROR) << "SendData called when rtp_data_channel_ "
-                      << "and sctp_transport_ are NULL.";
+                         "and sctp_transport_ are NULL.";
     return false;
   }
   return rtp_data_channel_
@@ -4746,7 +4747,7 @@
 void PeerConnection::RemoveSctpDataStream(int sid) {
   if (!sctp_transport_) {
     RTC_LOG(LS_ERROR) << "RemoveSctpDataStream called when sctp_transport_ is "
-                      << "NULL.";
+                         "NULL.";
     return;
   }
   network_thread()->Invoke<void>(
@@ -4861,12 +4862,12 @@
       break;
     case cricket::kIceConnectionConnected:
       RTC_LOG(LS_INFO) << "Changing to ICE connected state because "
-                       << "all transports are writable.";
+                          "all transports are writable.";
       SetIceConnectionState(PeerConnectionInterface::kIceConnectionConnected);
       break;
     case cricket::kIceConnectionCompleted:
       RTC_LOG(LS_INFO) << "Changing to ICE completed state because "
-                       << "all transports are complete.";
+                          "all transports are complete.";
       if (ice_connection_state_ !=
           PeerConnectionInterface::kIceConnectionConnected) {
         // If jumping directly from "checking" to "connected",
@@ -4914,7 +4915,7 @@
   for (const cricket::Candidate& candidate : candidates) {
     if (candidate.transport_name().empty()) {
       RTC_LOG(LS_ERROR) << "OnTransportControllerCandidatesRemoved: "
-                        << "empty content name in candidate "
+                           "empty content name in candidate "
                         << candidate.ToString();
       return;
     }
@@ -4984,7 +4985,7 @@
         if (valid) {
           RTC_LOG(LS_INFO)
               << "UseCandidatesInSessionDescription: Not ready to use "
-              << "candidate.";
+                 "candidate.";
         }
         continue;
       }
diff --git a/pc/rtpsender.cc b/pc/rtpsender.cc
index 6095418..fb940e3 100644
--- a/pc/rtpsender.cc
+++ b/pc/rtpsender.cc
@@ -111,11 +111,11 @@
 
 bool AudioRtpSender::InsertDtmf(int code, int duration) {
   if (!media_channel_) {
-    RTC_LOG(LS_ERROR) << "CanInsertDtmf: No audio channel exists.";
+    RTC_LOG(LS_ERROR) << "InsertDtmf: No audio channel exists.";
     return false;
   }
   if (!ssrc_) {
-    RTC_LOG(LS_ERROR) << "CanInsertDtmf: Sender does not have SSRC.";
+    RTC_LOG(LS_ERROR) << "InsertDtmf: Sender does not have SSRC.";
     return false;
   }
   bool success = worker_thread_->Invoke<bool>(RTC_FROM_HERE, [&] {
diff --git a/pc/srtpfilter.cc b/pc/srtpfilter.cc
index 157fdeb..4fe9dae 100644
--- a/pc/srtpfilter.cc
+++ b/pc/srtpfilter.cc
@@ -184,7 +184,8 @@
   send_cipher_suite_ = rtc::SrtpCryptoSuiteFromName(send_params.cipher_suite);
   if (send_cipher_suite_ == rtc::SRTP_INVALID_CRYPTO_SUITE) {
     RTC_LOG(LS_WARNING) << "Unknown crypto suite(s) received:"
-                        << " send cipher_suite " << send_params.cipher_suite;
+                           " send cipher_suite "
+                        << send_params.cipher_suite;
     return false;
   }
 
@@ -192,7 +193,8 @@
   if (!rtc::GetSrtpKeyAndSaltLengths(*send_cipher_suite_, &send_key_len,
                                      &send_salt_len)) {
     RTC_LOG(LS_WARNING) << "Could not get lengths for crypto suite(s):"
-                        << " send cipher_suite " << send_params.cipher_suite;
+                           " send cipher_suite "
+                        << send_params.cipher_suite;
     return false;
   }
 
@@ -213,7 +215,8 @@
   recv_cipher_suite_ = rtc::SrtpCryptoSuiteFromName(recv_params.cipher_suite);
   if (recv_cipher_suite_ == rtc::SRTP_INVALID_CRYPTO_SUITE) {
     RTC_LOG(LS_WARNING) << "Unknown crypto suite(s) received:"
-                        << " recv cipher_suite " << recv_params.cipher_suite;
+                           " recv cipher_suite "
+                        << recv_params.cipher_suite;
     return false;
   }
 
@@ -221,7 +224,8 @@
   if (!rtc::GetSrtpKeyAndSaltLengths(*recv_cipher_suite_, &recv_key_len,
                                      &recv_salt_len)) {
     RTC_LOG(LS_WARNING) << "Could not get lengths for crypto suite(s):"
-                        << " recv cipher_suite " << recv_params.cipher_suite;
+                           " recv cipher_suite "
+                        << recv_params.cipher_suite;
     return false;
   }
 
diff --git a/pc/srtpsession.cc b/pc/srtpsession.cc
index a07848d..347b099 100644
--- a/pc/srtpsession.cc
+++ b/pc/srtpsession.cc
@@ -248,6 +248,7 @@
   if (!rtc::GetSrtpKeyAndSaltLengths(cs, &expected_key_len,
                                      &expected_salt_len)) {
     // This should never happen.
+    RTC_NOTREACHED();
     RTC_LOG(LS_WARNING)
         << "Failed to " << (session_ ? "update" : "create")
         << " SRTP session: unsupported cipher_suite without length information"
@@ -314,7 +315,7 @@
   RTC_DCHECK(thread_checker_.CalledOnValidThread());
   if (session_) {
     RTC_LOG(LS_ERROR) << "Failed to create SRTP session: "
-                      << "SRTP session already created";
+                         "SRTP session already created";
     return false;
   }
 
diff --git a/pc/srtptransport.cc b/pc/srtptransport.cc
index 149651c..625034d 100644
--- a/pc/srtptransport.cc
+++ b/pc/srtptransport.cc
@@ -228,9 +228,8 @@
   }
 
   RTC_LOG(LS_INFO) << "SRTP " << (new_sessions ? "activated" : "updated")
-                   << " with negotiated parameters:"
-                   << " send cipher_suite " << send_cs << " recv cipher_suite "
-                   << recv_cs;
+                   << " with negotiated parameters: send cipher_suite "
+                   << send_cs << " recv cipher_suite " << recv_cs;
   return true;
 }
 
@@ -262,8 +261,8 @@
   }
 
   RTC_LOG(LS_INFO) << "SRTCP activated with negotiated parameters:"
-                   << " send cipher_suite " << send_cs << " recv cipher_suite "
-                   << recv_cs;
+                      " send cipher_suite "
+                   << send_cs << " recv cipher_suite " << recv_cs;
 
   return true;
 }
diff --git a/pc/webrtcsdp.cc b/pc/webrtcsdp.cc
index 535ed23..e796f4c 100644
--- a/pc/webrtcsdp.cc
+++ b/pc/webrtcsdp.cc
@@ -1483,7 +1483,7 @@
     } else if (streams.size() > 1u) {
       RTC_LOG(LS_WARNING)
           << "Trying to serialize Unified Plan SDP with more than "
-          << "one track in a media section. Omitting 'a=msid'.";
+             "one track in a media section. Omitting 'a=msid'.";
     }
   }
 
@@ -2459,8 +2459,8 @@
         bundle_only = false;
         RTC_LOG(LS_WARNING)
             << "a=bundle-only attribute observed with a nonzero "
-            << "port; this usage is unspecified so the attribute is being "
-            << "ignored.";
+               "port; this usage is unspecified so the attribute is being "
+               "ignored.";
       }
     } else {
       // If not using bundle-only, interpret port 0 in the normal way; the m=
@@ -3176,7 +3176,8 @@
   if (std::find(payload_types.begin(), payload_types.end(), payload_type) ==
       payload_types.end()) {
     RTC_LOG(LS_WARNING) << "Ignore rtpmap line that did not appear in the "
-                        << "<fmt> of the m-line: " << line;
+                           "<fmt> of the m-line: "
+                        << line;
     return true;
   }
   const std::string& encoder = fields[1];
diff --git a/pc/webrtcsessiondescriptionfactory.cc b/pc/webrtcsessiondescriptionfactory.cc
index 36927bb..f6e5b96 100644
--- a/pc/webrtcsessiondescriptionfactory.cc
+++ b/pc/webrtcsessiondescriptionfactory.cc
@@ -170,8 +170,8 @@
 
     rtc::KeyParams key_params = rtc::KeyParams();
     RTC_LOG(LS_VERBOSE)
-        << "DTLS-SRTP enabled; sending DTLS identity request (key "
-        << "type: " << key_params.type() << ").";
+        << "DTLS-SRTP enabled; sending DTLS identity request (key type: "
+        << key_params.type() << ").";
 
     // Request certificate. This happens asynchronously, so that the caller gets
     // a chance to connect to |SignalCertificateReady|.
diff --git a/rtc_base/asyncudpsocket.cc b/rtc_base/asyncudpsocket.cc
index 0896e50..5a50ae3 100644
--- a/rtc_base/asyncudpsocket.cc
+++ b/rtc_base/asyncudpsocket.cc
@@ -112,8 +112,8 @@
     // TODO: Do something better like forwarding the error to the user.
     SocketAddress local_addr = socket_->GetLocalAddress();
     RTC_LOG(LS_INFO) << "AsyncUDPSocket[" << local_addr.ToSensitiveString()
-                     << "] "
-                     << "receive failed with error " << socket_->GetError();
+                     << "] receive failed with error "
+                     << socket_->GetError();
     return;
   }
 
diff --git a/rtc_base/httpcommon.cc b/rtc_base/httpcommon.cc
index 5f2112a..345b4aa 100644
--- a/rtc_base/httpcommon.cc
+++ b/rtc_base/httpcommon.cc
@@ -863,8 +863,6 @@
         in_buf_desc.pBuffers  = &in_sec;
 
         ret = InitializeSecurityContextA(&neg->cred, &neg->ctx, spn, flags, 0, SECURITY_NATIVE_DREP, &in_buf_desc, 0, &neg->ctx, &out_buf_desc, &ret_flags, &lifetime);
-        // RTC_LOG(INFO) << "$$$ InitializeSecurityContext @ " <<
-        // TimeSince(now);
         if (FAILED(ret)) {
           RTC_LOG(LS_ERROR) << "InitializeSecurityContext returned: "
                             << ErrorName(ret, SECURITY_ERRORS);
@@ -931,7 +929,6 @@
       ret = AcquireCredentialsHandleA(
           0, const_cast<char*>(want_negotiate ? NEGOSSP_NAME_A : NTLMSP_NAME_A),
           SECPKG_CRED_OUTBOUND, 0, pauth_id, 0, 0, &cred, &lifetime);
-      // RTC_LOG(INFO) << "$$$ AcquireCredentialsHandle @ " << TimeSince(now);
       if (ret != SEC_E_OK) {
         RTC_LOG(LS_ERROR) << "AcquireCredentialsHandle error: "
                           << ErrorName(ret, SECURITY_ERRORS);
@@ -942,7 +939,6 @@
 
       CtxtHandle ctx;
       ret = InitializeSecurityContextA(&cred, 0, spn, flags, 0, SECURITY_NATIVE_DREP, 0, 0, &ctx, &out_buf_desc, &ret_flags, &lifetime);
-      // RTC_LOG(INFO) << "$$$ InitializeSecurityContext @ " << TimeSince(now);
       if (FAILED(ret)) {
         RTC_LOG(LS_ERROR) << "InitializeSecurityContext returned: "
                           << ErrorName(ret, SECURITY_ERRORS);
@@ -958,7 +954,6 @@
 
     if ((ret == SEC_I_COMPLETE_NEEDED) || (ret == SEC_I_COMPLETE_AND_CONTINUE)) {
       ret = CompleteAuthToken(&neg->ctx, &out_buf_desc);
-      // RTC_LOG(INFO) << "$$$ CompleteAuthToken @ " << TimeSince(now);
       RTC_LOG(LS_VERBOSE) << "CompleteAuthToken returned: "
                           << ErrorName(ret, SECURITY_ERRORS);
       if (FAILED(ret)) {
@@ -966,8 +961,6 @@
       }
     }
 
-    // RTC_LOG(INFO) << "$$$ NEGOTIATE took " << TimeSince(now) << "ms";
-
     std::string decoded(out_buf, out_buf + out_sec.cbBuffer);
     response = auth_method;
     response.append(" ");
diff --git a/rtc_base/logging.h b/rtc_base/logging.h
index 91b71a6..6445fe1 100644
--- a/rtc_base/logging.h
+++ b/rtc_base/logging.h
@@ -41,7 +41,6 @@
 // RTC_LOG_CHECK_LEVEL(sev) (and RTC_LOG_CHECK_LEVEL_V(sev)) can be used as a
 //     test before performing expensive or sensitive operations whose sole
 //     purpose is to output logging data at the desired level.
-// Lastly, RTC_PLOG(sev, err) is an alias for RTC_LOG_ERR_EX.
 
 #ifndef RTC_BASE_LOGGING_H_
 #define RTC_BASE_LOGGING_H_
@@ -343,9 +342,6 @@
   RTC_LOG_SEVERITY_PRECONDITION(sev) \
   rtc::LogMessage(nullptr, 0, sev, tag).stream()
 
-#define RTC_PLOG(sev, err) \
-  RTC_LOG_ERR_EX(sev, err)
-
 // The RTC_DLOG macros are equivalent to their RTC_LOG counterparts except that
 // they only generate code in debug builds.
 #if RTC_DLOG_IS_ON
diff --git a/rtc_base/socketadapters.cc b/rtc_base/socketadapters.cc
index 4cde690..48e7898 100644
--- a/rtc_base/socketadapters.cc
+++ b/rtc_base/socketadapters.cc
@@ -104,7 +104,7 @@
   }
 
   if (data_len_ >= buffer_size_) {
-    RTC_LOG(INFO) << "Input buffer overflow";
+    RTC_LOG(LS_ERROR) << "Input buffer overflow";
     RTC_NOTREACHED();
     data_len_ = 0;
   }