Index: sandbox/linux/services/credentials_unittest.cc |
diff --git a/sandbox/linux/services/credentials_unittest.cc b/sandbox/linux/services/credentials_unittest.cc |
index 4fc902323683b7dcdcfa9ede67a49b376c2aff2a..8b41917f7287939ffd94c193a3dce69e03413c28 100644 |
--- a/sandbox/linux/services/credentials_unittest.cc |
+++ b/sandbox/linux/services/credentials_unittest.cc |
@@ -137,6 +137,7 @@ SANDBOX_TEST(Credentials, DISABLE_ON_LSAN(DropFileSystemAccessIsSafe)) { |
CHECK(Credentials::DropFileSystemAccess()); |
CHECK(!base::DirectoryExists(base::FilePath("/proc"))); |
CHECK(WorkingDirectoryIsRoot()); |
+ CHECK(base::IsDirectoryEmpty(base::FilePath("/"))); |
// We want the chroot to never have a subdirectory. A subdirectory |
// could allow a chroot escape. |
CHECK_NE(0, mkdir("/test", 0700)); |