| Index: chrome/common/sandbox_policy.cc
|
| diff --git a/chrome/common/sandbox_policy.cc b/chrome/common/sandbox_policy.cc
|
| index 2e11e0be1c9aa96ebde479a3c3ce480abf1a89bc..7399a519ee509111cb8473656bd9b9f0b01b1fd4 100644
|
| --- a/chrome/common/sandbox_policy.cc
|
| +++ b/chrome/common/sandbox_policy.cc
|
| @@ -601,7 +601,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| return 0;
|
| }
|
|
|
| - TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str);
|
| + TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess", 0, type_str);
|
|
|
| // To decide if the process is going to be sandboxed we have two cases.
|
| // First case: all process types except the nacl broker, and the plugin
|
| @@ -708,7 +708,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| return 0;
|
| }
|
|
|
| - TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
| + TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
|
|
| result = g_broker_services->SpawnTarget(
|
| cmd_line->GetProgram().value().c_str(),
|
| @@ -716,7 +716,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| policy, &target);
|
| policy->Release();
|
|
|
| - TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
| + TRACE_EVENT_END_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
|
|
| if (sandbox::SBOX_ALL_OK != result)
|
| return 0;
|
|
|