summaryrefslogtreecommitdiffstats
path: root/chrome/common/sandbox_policy.cc
diff options
context:
space:
mode:
authorananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-08-11 04:45:33 +0000
committerananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-08-11 04:45:33 +0000
commita872ea1f45118429d03540fdba96e8c52112531a (patch)
treeab42d3e009896591ea56fc47218d65f89dc924de /chrome/common/sandbox_policy.cc
parenta995b3951040512507269b70b527fd7fc408da2b (diff)
downloadchromium_src-a872ea1f45118429d03540fdba96e8c52112531a.zip
chromium_src-a872ea1f45118429d03540fdba96e8c52112531a.tar.gz
chromium_src-a872ea1f45118429d03540fdba96e8c52112531a.tar.bz2
Added event traces at various points during Chrome and ChromeFrame startup to help measure and track performance.
Bug=51638 Review URL: http://codereview.chromium.org/3152001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@55671 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_policy.cc')
-rw-r--r--chrome/common/sandbox_policy.cc7
1 files changed, 7 insertions, 0 deletions
diff --git a/chrome/common/sandbox_policy.cc b/chrome/common/sandbox_policy.cc
index 2f649c5..5fcb98e 100644
--- a/chrome/common/sandbox_policy.cc
+++ b/chrome/common/sandbox_policy.cc
@@ -14,6 +14,7 @@
#include "base/path_service.h"
#include "base/process_util.h"
#include "base/string_util.h"
+#include "base/trace_event.h"
#include "base/win_util.h"
#include "chrome/common/child_process_info.h"
#include "chrome/common/chrome_constants.h"
@@ -445,6 +446,8 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
return 0;
}
+ TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str);
+
bool in_sandbox =
(type != ChildProcessInfo::NACL_BROKER_PROCESS) &&
!browser_command_line.HasSwitch(switches::kNoSandbox) &&
@@ -522,12 +525,16 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
return 0;
}
+ TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
+
result = g_broker_services->SpawnTarget(
cmd_line->program().c_str(),
cmd_line->command_line_string().c_str(),
policy, &target);
policy->Release();
+ TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0);
+
if (sandbox::SBOX_ALL_OK != result)
return 0;