| Index: base/process_linux.cc
|
| diff --git a/base/process_linux.cc b/base/process_linux.cc
|
| index 09fb9eb7b0956da73e7808d670e78530202cafa7..83d9649405d25fb12a528912073fe6891657c66a 100644
|
| --- a/base/process_linux.cc
|
| +++ b/base/process_linux.cc
|
| @@ -38,12 +38,12 @@ struct CGroups {
|
| // all background renderers. This allows us to limit the impact of background
|
| // renderers on foreground ones to a greater level than simple renicing.
|
| bool enabled;
|
| - FilePath foreground_file;
|
| - FilePath background_file;
|
| + base::FilePath foreground_file;
|
| + base::FilePath background_file;
|
|
|
| CGroups() {
|
| - foreground_file = FilePath(StringPrintf(kControlPath, kForeground));
|
| - background_file = FilePath(StringPrintf(kControlPath, kBackground));
|
| + foreground_file = base::FilePath(StringPrintf(kControlPath, kForeground));
|
| + background_file = base::FilePath(StringPrintf(kControlPath, kBackground));
|
| file_util::FileSystemType foreground_type;
|
| file_util::FileSystemType background_type;
|
| enabled =
|
| @@ -69,7 +69,7 @@ bool Process::IsProcessBackgrounded() const {
|
| if (cgroups.Get().enabled) {
|
| std::string proc;
|
| if (file_util::ReadFileToString(
|
| - FilePath(StringPrintf(kProcPath, process_)),
|
| + base::FilePath(StringPrintf(kProcPath, process_)),
|
| &proc)) {
|
| std::vector<std::string> proc_parts;
|
| base::SplitString(proc, ':', &proc_parts);
|
| @@ -90,7 +90,7 @@ bool Process::SetProcessBackgrounded(bool background) {
|
| #if defined(OS_CHROMEOS)
|
| if (cgroups.Get().enabled) {
|
| std::string pid = StringPrintf("%d", process_);
|
| - const FilePath file =
|
| + const base::FilePath file =
|
| background ?
|
| cgroups.Get().background_file : cgroups.Get().foreground_file;
|
| return file_util::WriteFile(file, pid.c_str(), pid.size()) > 0;
|
|
|