Index: chrome/browser/extensions/suspicious_extension_bubble_controller.cc |
diff --git a/chrome/browser/extensions/suspicious_extension_bubble_controller.cc b/chrome/browser/extensions/suspicious_extension_bubble_controller.cc |
index ea364459e627e75b11358ad1ad4ee1ed2fb7b624..421ef84ce98c22d619124d8f3375b518521dbde3 100644 |
--- a/chrome/browser/extensions/suspicious_extension_bubble_controller.cc |
+++ b/chrome/browser/extensions/suspicious_extension_bubble_controller.cc |
@@ -132,8 +132,8 @@ string16 SuspiciousExtensionBubbleController::GetOverflowText( |
// this string, whereas we should have used $1. It was discovered too late, |
// so we do the substitution by hand in that case. |
if (overflow_string.find(ASCIIToUTF16("#")) != string16::npos) { |
- ReplaceChars(overflow_string, ASCIIToUTF16("#").c_str(), |
- overflow_count, &new_string); |
+ base::ReplaceChars(overflow_string, ASCIIToUTF16("#").c_str(), |
+ overflow_count, &new_string); |
} else { |
new_string = l10n_util::GetStringFUTF16( |
IDS_EXTENSIONS_SUSPICIOUS_DISABLED_AND_N_MORE, |