| Index: chrome/common/sandbox_policy.cc
|
| diff --git a/chrome/common/sandbox_policy.cc b/chrome/common/sandbox_policy.cc
|
| index 302652271a090c9943588a3c3ab5f57e11d7b9a2..97142aa741091c40c4868d9e8cbd9818e489b4cf 100644
|
| --- a/chrome/common/sandbox_policy.cc
|
| +++ b/chrome/common/sandbox_policy.cc
|
| @@ -612,7 +612,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| return 0;
|
| }
|
|
|
| - TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str);
|
| + TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess", 0, type_str);
|
|
|
| // To decide if the process is going to be sandboxed we have two cases.
|
| // First case: all process types except the nacl broker, and the plugin
|
| @@ -721,7 +721,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| return 0;
|
| }
|
|
|
| - TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
| + TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
|
|
| result = g_broker_services->SpawnTarget(
|
| cmd_line->GetProgram().value().c_str(),
|
| @@ -729,7 +729,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
|
| policy, &target);
|
| policy->Release();
|
|
|
| - TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
| + TRACE_EVENT_END_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
|
|
|
| if (sandbox::SBOX_ALL_OK != result)
|
| return 0;
|
|
|