| Index: chrome/common/sandbox_policy.cc
|
| diff --git a/chrome/common/sandbox_policy.cc b/chrome/common/sandbox_policy.cc
|
| index 16049e8c4aac17fb8b3f66251bbf4673029cb305..27f60a4780810237ed056c48f20b748980b546a3 100644
|
| --- a/chrome/common/sandbox_policy.cc
|
| +++ b/chrome/common/sandbox_policy.cc
|
| @@ -531,7 +531,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| return 0;
|
| }
|
|
|
| - TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str);
|
| + TRACE_EVENT_BEGIN_LEGACY("StartProcessWithAccess", 0, type_str.c_str());
|
|
|
| // To decide if the process is going to be sandboxed we have two cases.
|
| // First case: all process types except the nacl broker, gpu process and
|
| @@ -628,7 +628,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| return 0;
|
| }
|
|
|
| - TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
| + TRACE_EVENT_BEGIN_LEGACY("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
|
|
| result = g_broker_services->SpawnTarget(
|
| cmd_line->GetProgram().value().c_str(),
|
| @@ -636,7 +636,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| policy, &target);
|
| policy->Release();
|
|
|
| - TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
| + TRACE_EVENT_END_LEGACY("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
|
|
| if (sandbox::SBOX_ALL_OK != result)
|
| return 0;
|
|
|