Index: sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc b/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
index bcb3cc827330884275838b1f71df240edba06cfd..a6dab1253f68256ccfaaa9031e8018a1c9931409 100644 |
--- a/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
@@ -47,7 +47,7 @@ class EmptyClassTakingPolicy : public SandboxBPFDSLPolicy { |
} |
virtual ~EmptyClassTakingPolicy() {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE { |
+ virtual ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
return Allow(); |
} |
@@ -91,7 +91,7 @@ class EnosysPtracePolicy : public SandboxBPFDSLPolicy { |
BPF_ASSERT_EQ(my_pid_, syscall(__NR_getpid)); |
} |
- virtual ResultExpr EvaluateSyscall(int system_call_number) const OVERRIDE { |
+ virtual ResultExpr EvaluateSyscall(int system_call_number) const override { |
CHECK(SandboxBPF::IsValidSyscallNumber(system_call_number)); |
if (system_call_number == __NR_ptrace) { |
// The EvaluateSyscall function should run in the process that created |
@@ -113,10 +113,10 @@ class BasicBPFTesterDelegate : public BPFTesterDelegate { |
BasicBPFTesterDelegate() {} |
virtual ~BasicBPFTesterDelegate() {} |
- virtual scoped_ptr<SandboxBPFPolicy> GetSandboxBPFPolicy() OVERRIDE { |
+ virtual scoped_ptr<SandboxBPFPolicy> GetSandboxBPFPolicy() override { |
return scoped_ptr<SandboxBPFPolicy>(new EnosysPtracePolicy()); |
} |
- virtual void RunTestFunction() OVERRIDE { |
+ virtual void RunTestFunction() override { |
errno = 0; |
int ret = ptrace(PTRACE_TRACEME, -1, NULL, NULL); |
BPF_ASSERT(-1 == ret); |