diff options
Diffstat (limited to 'chrome/common/sandbox_policy.cc')
-rw-r--r-- | chrome/common/sandbox_policy.cc | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/chrome/common/sandbox_policy.cc b/chrome/common/sandbox_policy.cc index 2e11e0b..7399a51 100644 --- a/chrome/common/sandbox_policy.cc +++ b/chrome/common/sandbox_policy.cc @@ -601,7 +601,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, return 0; } - TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str); + TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess", 0, type_str); // To decide if the process is going to be sandboxed we have two cases. // First case: all process types except the nacl broker, and the plugin @@ -708,7 +708,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, return 0; } - TRACE_EVENT_BEGIN("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); + TRACE_EVENT_BEGIN_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); result = g_broker_services->SpawnTarget( cmd_line->GetProgram().value().c_str(), @@ -716,7 +716,7 @@ base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, policy, &target); policy->Release(); - TRACE_EVENT_END("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); + TRACE_EVENT_END_ETW("StartProcessWithAccess::LAUNCHPROCESS", 0, 0); if (sandbox::SBOX_ALL_OK != result) return 0; |