| Index: sandbox/linux/services/credentials_unittest.cc | 
| diff --git a/sandbox/linux/services/credentials_unittest.cc b/sandbox/linux/services/credentials_unittest.cc | 
| index db19f6fee561073c1dc7a0f0ba7dfc29b91abd65..6b93c86c3ecbc2104282b50da80e32f3d9ad06d3 100644 | 
| --- a/sandbox/linux/services/credentials_unittest.cc | 
| +++ b/sandbox/linux/services/credentials_unittest.cc | 
| @@ -177,16 +177,17 @@ SANDBOX_TEST(Credentials, SetCapabilities) { | 
|  | 
| base::ScopedFD proc_fd(ProcUtil::OpenProc()); | 
|  | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysAdmin)); | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysChroot)); | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_ADMIN)); | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_CHROOT)); | 
|  | 
| -  const std::vector<LinuxCapability> caps = {LinuxCapability::kCapSysChroot}; | 
| +  std::vector<Credentials::Capability> caps; | 
| +  caps.push_back(Credentials::Capability::SYS_CHROOT); | 
| CHECK(Credentials::SetCapabilities(proc_fd.get(), caps)); | 
|  | 
| -  CHECK(!Credentials::HasCapability(LinuxCapability::kCapSysAdmin)); | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysChroot)); | 
| +  CHECK(!Credentials::HasCapability(Credentials::Capability::SYS_ADMIN)); | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_CHROOT)); | 
|  | 
| -  const std::vector<LinuxCapability> no_caps; | 
| +  const std::vector<Credentials::Capability> no_caps; | 
| CHECK(Credentials::SetCapabilities(proc_fd.get(), no_caps)); | 
| CHECK(!Credentials::HasAnyCapability()); | 
| } | 
| @@ -198,10 +199,11 @@ SANDBOX_TEST(Credentials, SetCapabilitiesAndChroot) { | 
|  | 
| base::ScopedFD proc_fd(ProcUtil::OpenProc()); | 
|  | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysChroot)); | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_CHROOT)); | 
| PCHECK(chroot("/") == 0); | 
|  | 
| -  const std::vector<LinuxCapability> caps = {LinuxCapability::kCapSysChroot}; | 
| +  std::vector<Credentials::Capability> caps; | 
| +  caps.push_back(Credentials::Capability::SYS_CHROOT); | 
| CHECK(Credentials::SetCapabilities(proc_fd.get(), caps)); | 
| PCHECK(chroot("/") == 0); | 
|  | 
| @@ -216,7 +218,8 @@ SANDBOX_TEST(Credentials, SetCapabilitiesMatchesLibCap2) { | 
|  | 
| base::ScopedFD proc_fd(ProcUtil::OpenProc()); | 
|  | 
| -  const std::vector<LinuxCapability> caps = {LinuxCapability::kCapSysChroot}; | 
| +  std::vector<Credentials::Capability> caps; | 
| +  caps.push_back(Credentials::Capability::SYS_CHROOT); | 
| CHECK(Credentials::SetCapabilities(proc_fd.get(), caps)); | 
|  | 
| ScopedCap actual_cap(cap_get_proc()); | 
|  |