| Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| index be90eb574592b67d3f43cf04ab91f4eaaa592626..72ef31694d0e1432c04b8a79161e3d856f5b065e 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| @@ -44,7 +44,7 @@ class RestrictClockIdPolicy : public SandboxBPFDSLPolicy {
|
| RestrictClockIdPolicy() {}
|
| virtual ~RestrictClockIdPolicy() {}
|
|
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| switch (sysno) {
|
| case __NR_clock_gettime:
|
| case __NR_clock_getres:
|
| @@ -91,11 +91,11 @@ class ClockSystemTesterDelegate : public sandbox::BPFTesterDelegate {
|
| : is_running_on_chromeos_(base::SysInfo::IsRunningOnChromeOS()) {}
|
| virtual ~ClockSystemTesterDelegate() {}
|
|
|
| - virtual scoped_ptr<sandbox::SandboxBPFPolicy> GetSandboxBPFPolicy() OVERRIDE {
|
| + virtual scoped_ptr<sandbox::SandboxBPFPolicy> GetSandboxBPFPolicy() override {
|
| return scoped_ptr<sandbox::SandboxBPFPolicy>(
|
| new RestrictClockIdPolicy());
|
| }
|
| - virtual void RunTestFunction() OVERRIDE {
|
| + virtual void RunTestFunction() override {
|
| if (is_running_on_chromeos_) {
|
| CheckClock(base::TimeTicks::kClockSystemTrace);
|
| } else {
|
| @@ -148,7 +148,7 @@ class RestrictSchedPolicy : public SandboxBPFDSLPolicy {
|
| RestrictSchedPolicy() {}
|
| virtual ~RestrictSchedPolicy() {}
|
|
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| switch (sysno) {
|
| case __NR_sched_getparam:
|
| return RestrictSchedTarget(getpid(), sysno);
|
|
|