Index: content/common/sandbox_linux/sandbox_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc |
index 88afef9295e75b6a45476e7ad9fce09ae96cbc1b..e15aa188b230ac2622859f8b2922d70c08459b07 100644 |
--- a/content/common/sandbox_linux/sandbox_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_linux.cc |
@@ -52,7 +52,8 @@ struct FDCloser { |
}; |
void LogSandboxStarted(const std::string& sandbox_name) { |
- const CommandLine& command_line = *CommandLine::ForCurrentProcess(); |
+ const base::CommandLine& command_line = |
+ *base::CommandLine::ForCurrentProcess(); |
const std::string process_type = |
command_line.GetSwitchValueASCII(switches::kProcessType); |
const std::string activated_sandbox = |
@@ -260,7 +261,7 @@ bool LinuxSandbox::StartSeccompBPF(const std::string& process_type) { |
} |
bool LinuxSandbox::InitializeSandboxImpl() { |
- CommandLine* command_line = CommandLine::ForCurrentProcess(); |
+ base::CommandLine* command_line = base::CommandLine::ForCurrentProcess(); |
const std::string process_type = |
command_line->GetSwitchValueASCII(switches::kProcessType); |
@@ -335,7 +336,7 @@ bool LinuxSandbox::seccomp_bpf_supported() const { |
bool LinuxSandbox::LimitAddressSpace(const std::string& process_type) { |
(void) process_type; |
#if !defined(ADDRESS_SANITIZER) && !defined(MEMORY_SANITIZER) |
- CommandLine* command_line = CommandLine::ForCurrentProcess(); |
+ base::CommandLine* command_line = base::CommandLine::ForCurrentProcess(); |
if (command_line->HasSwitch(switches::kNoSandbox)) { |
return false; |
} |