| Index: sandbox/linux/services/credentials_unittest.cc
|
| diff --git a/sandbox/linux/services/credentials_unittest.cc b/sandbox/linux/services/credentials_unittest.cc
|
| index eb0ff83f29e0722b4020e44a3a7cd6578a85fe64..1209fdf295f4acd6c8b2e916041b4fa689d82a01 100644
|
| --- a/sandbox/linux/services/credentials_unittest.cc
|
| +++ b/sandbox/linux/services/credentials_unittest.cc
|
| @@ -130,7 +130,8 @@ TEST(Credentials, CanDetectRoot) {
|
| ASSERT_TRUE(WorkingDirectoryIsRoot());
|
| }
|
|
|
| -SANDBOX_TEST(Credentials, DISABLE_ON_LSAN(DropFileSystemAccessIsSafe)) {
|
| +// Disabled on ASAN because of crbug.com/451603.
|
| +SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(DropFileSystemAccessIsSafe)) {
|
| CHECK(Credentials::DropAllCapabilities());
|
| // Probably missing kernel support.
|
| if (!Credentials::MoveToNewUserNS()) return;
|
| @@ -145,7 +146,7 @@ SANDBOX_TEST(Credentials, DISABLE_ON_LSAN(DropFileSystemAccessIsSafe)) {
|
|
|
| // Check that after dropping filesystem access and dropping privileges
|
| // it is not possible to regain capabilities.
|
| -SANDBOX_TEST(Credentials, DISABLE_ON_LSAN(CannotRegainPrivileges)) {
|
| +SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(CannotRegainPrivileges)) {
|
| CHECK(Credentials::DropAllCapabilities());
|
| // Probably missing kernel support.
|
| if (!Credentials::MoveToNewUserNS()) return;
|
|
|