Index: chrome/common/sandbox_policy.cc |
=================================================================== |
--- chrome/common/sandbox_policy.cc (revision 84493) |
+++ chrome/common/sandbox_policy.cc (working copy) |
@@ -601,7 +601,7 @@ |
return 0; |
} |
- TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess", 0, type_str); |
+ TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str); |
// To decide if the process is going to be sandboxed we have two cases. |
// First case: all process types except the nacl broker, and the plugin |
@@ -708,7 +708,7 @@ |
return 0; |
} |
- TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
+ TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
result = g_broker_services->SpawnTarget( |
cmd_line->GetProgram().value().c_str(), |
@@ -716,7 +716,7 @@ |
policy, &target); |
policy->Release(); |
- TRACE_EVENT_END_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
+ TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); |
if (sandbox::SBOX_ALL_OK != result) |
return 0; |