Index: sandbox/linux/services/credentials_unittest.cc |
diff --git a/sandbox/linux/services/credentials_unittest.cc b/sandbox/linux/services/credentials_unittest.cc |
index b95ba0bab273ebf4a11f165fd0dd8992b42edf72..661e096850f30c8ce6ae16e03055715754e71875 100644 |
--- a/sandbox/linux/services/credentials_unittest.cc |
+++ b/sandbox/linux/services/credentials_unittest.cc |
@@ -145,11 +145,12 @@ SANDBOX_TEST(Credentials, CanDetectRoot) { |
// Disabled on ASAN because of crbug.com/451603. |
SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(DropFileSystemAccessIsSafe)) { |
+ CHECK(Credentials::HasFileSystemAccess()); |
CHECK(Credentials::DropAllCapabilities()); |
// Probably missing kernel support. |
if (!Credentials::MoveToNewUserNS()) return; |
CHECK(Credentials::DropFileSystemAccess(ProcUtil::OpenProc().get())); |
- CHECK(!base::DirectoryExists(base::FilePath("/proc"))); |
+ CHECK(!Credentials::HasFileSystemAccess()); |
CHECK(WorkingDirectoryIsRoot()); |
CHECK(base::IsDirectoryEmpty(base::FilePath("/"))); |
// We want the chroot to never have a subdirectory. A subdirectory |