| Index: chrome/browser/extensions/suspicious_extension_bubble_controller.cc
|
| diff --git a/chrome/browser/extensions/suspicious_extension_bubble_controller.cc b/chrome/browser/extensions/suspicious_extension_bubble_controller.cc
|
| index ea364459e627e75b11358ad1ad4ee1ed2fb7b624..421ef84ce98c22d619124d8f3375b518521dbde3 100644
|
| --- a/chrome/browser/extensions/suspicious_extension_bubble_controller.cc
|
| +++ b/chrome/browser/extensions/suspicious_extension_bubble_controller.cc
|
| @@ -132,8 +132,8 @@ string16 SuspiciousExtensionBubbleController::GetOverflowText(
|
| // this string, whereas we should have used $1. It was discovered too late,
|
| // so we do the substitution by hand in that case.
|
| if (overflow_string.find(ASCIIToUTF16("#")) != string16::npos) {
|
| - ReplaceChars(overflow_string, ASCIIToUTF16("#").c_str(),
|
| - overflow_count, &new_string);
|
| + base::ReplaceChars(overflow_string, ASCIIToUTF16("#").c_str(),
|
| + overflow_count, &new_string);
|
| } else {
|
| new_string = l10n_util::GetStringFUTF16(
|
| IDS_EXTENSIONS_SUSPICIOUS_DISABLED_AND_N_MORE,
|
|
|