| Index: sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| index aab347884d9e5cc3ead71c65fe025fff1d6ae66c..778bba822422f6f612fcbe20ff46593f26fd7cfd 100644
|
| --- a/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| @@ -64,7 +64,7 @@ class BasicPolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| BasicPolicy() {}
|
| virtual ~BasicPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_getpgid) {
|
| const Arg<pid_t> pid(0);
|
| return If(pid == 0, Error(EPERM)).Else(Error(EINVAL));
|
| @@ -94,7 +94,7 @@ class BooleanLogicPolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| BooleanLogicPolicy() {}
|
| virtual ~BooleanLogicPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_socketpair) {
|
| const Arg<int> domain(0), type(1), protocol(2);
|
| return If(domain == AF_UNIX &&
|
| @@ -132,7 +132,7 @@ class MoreBooleanLogicPolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| MoreBooleanLogicPolicy() {}
|
| virtual ~MoreBooleanLogicPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_setresuid) {
|
| const Arg<uid_t> ruid(0), euid(1), suid(2);
|
| return If(ruid == 0 || euid == 0 || suid == 0, Error(EPERM))
|
| @@ -169,7 +169,7 @@ class ArgSizePolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| ArgSizePolicy() {}
|
| virtual ~ArgSizePolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_uname) {
|
| const Arg<uintptr_t> addr(0);
|
| return If(addr == kDeadBeefAddr, Error(EPERM)).Else(Allow());
|
| @@ -192,7 +192,7 @@ class TrappingPolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| TrappingPolicy() {}
|
| virtual ~TrappingPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_uname) {
|
| return Trap(UnameTrap, &count_);
|
| }
|
| @@ -222,7 +222,7 @@ class MaskingPolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| MaskingPolicy() {}
|
| virtual ~MaskingPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_setuid) {
|
| const Arg<uid_t> uid(0);
|
| return If((uid & 0xf) == 0, Error(EINVAL)).Else(Error(EACCES));
|
| @@ -263,7 +263,7 @@ class ElseIfPolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| ElseIfPolicy() {}
|
| virtual ~ElseIfPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_setuid) {
|
| const Arg<uid_t> uid(0);
|
| return If((uid & 0xfff) == 0, Error(0))
|
| @@ -295,7 +295,7 @@ class SwitchPolicy : public SandboxBPFDSLPolicy {
|
| public:
|
| SwitchPolicy() {}
|
| virtual ~SwitchPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_fcntl) {
|
| const Arg<int> cmd(1);
|
| const Arg<unsigned long> long_arg(2);
|
|
|