Index: chrome/common/sandbox_policy.cc |
diff --git a/chrome/common/sandbox_policy.cc b/chrome/common/sandbox_policy.cc |
index 16049e8c4aac17fb8b3f66251bbf4673029cb305..27f60a4780810237ed056c48f20b748980b546a3 100644 |
--- a/chrome/common/sandbox_policy.cc |
+++ b/chrome/common/sandbox_policy.cc |
@@ -531,7 +531,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, |
return 0; |
} |
- TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str); |
+ TRACE_EVENT_BEGIN_LEGACY("StartProcessWithAccess", 0, type_str.c_str()); |
// To decide if the process is going to be sandboxed we have two cases. |
// First case: all process types except the nacl broker, gpu process and |
@@ -628,7 +628,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, |
return 0; |
} |
- TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
+ TRACE_EVENT_BEGIN_LEGACY("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
result = g_broker_services->SpawnTarget( |
cmd_line->GetProgram().value().c_str(), |
@@ -636,7 +636,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, |
policy, &target); |
policy->Release(); |
- TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
+ TRACE_EVENT_END_LEGACY("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
if (sandbox::SBOX_ALL_OK != result) |
return 0; |