diff options
author | ananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-11 04:45:33 +0000 |
---|---|---|
committer | ananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-11 04:45:33 +0000 |
commit | a872ea1f45118429d03540fdba96e8c52112531a (patch) | |
tree | ab42d3e009896591ea56fc47218d65f89dc924de /chrome/common/sandbox_policy.cc | |
parent | a995b3951040512507269b70b527fd7fc408da2b (diff) | |
download | chromium_src-a872ea1f45118429d03540fdba96e8c52112531a.zip chromium_src-a872ea1f45118429d03540fdba96e8c52112531a.tar.gz chromium_src-a872ea1f45118429d03540fdba96e8c52112531a.tar.bz2 |
Added event traces at various points during Chrome and ChromeFrame startup to help measure and track performance.
Bug=51638
Review URL: http://codereview.chromium.org/3152001
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@55671 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_policy.cc')
-rw-r--r-- | chrome/common/sandbox_policy.cc | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/chrome/common/sandbox_policy.cc b/chrome/common/sandbox_policy.cc index 2f649c5..5fcb98e 100644 --- a/chrome/common/sandbox_policy.cc +++ b/chrome/common/sandbox_policy.cc @@ -14,6 +14,7 @@ #include "base/path_service.h" #include "base/process_util.h" #include "base/string_util.h" +#include "base/trace_event.h" #include "base/win_util.h" #include "chrome/common/child_process_info.h" #include "chrome/common/chrome_constants.h" @@ -445,6 +446,8 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, return 0; } + TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str); + bool in_sandbox = (type != ChildProcessInfo::NACL_BROKER_PROCESS) && !browser_command_line.HasSwitch(switches::kNoSandbox) && @@ -522,12 +525,16 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, return 0; } + TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); + result = g_broker_services->SpawnTarget( cmd_line->program().c_str(), cmd_line->command_line_string().c_str(), policy, &target); policy->Release(); + TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); + if (sandbox::SBOX_ALL_OK != result) return 0; |