| Index: sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc b/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc
|
| index bcb3cc827330884275838b1f71df240edba06cfd..a6dab1253f68256ccfaaa9031e8018a1c9931409 100644
|
| --- a/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc
|
| +++ b/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc
|
| @@ -47,7 +47,7 @@ class EmptyClassTakingPolicy : public SandboxBPFDSLPolicy {
|
| }
|
| virtual ~EmptyClassTakingPolicy() {}
|
|
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| DCHECK(SandboxBPF::IsValidSyscallNumber(sysno));
|
| return Allow();
|
| }
|
| @@ -91,7 +91,7 @@ class EnosysPtracePolicy : public SandboxBPFDSLPolicy {
|
| BPF_ASSERT_EQ(my_pid_, syscall(__NR_getpid));
|
| }
|
|
|
| - virtual ResultExpr EvaluateSyscall(int system_call_number) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int system_call_number) const override {
|
| CHECK(SandboxBPF::IsValidSyscallNumber(system_call_number));
|
| if (system_call_number == __NR_ptrace) {
|
| // The EvaluateSyscall function should run in the process that created
|
| @@ -113,10 +113,10 @@ class BasicBPFTesterDelegate : public BPFTesterDelegate {
|
| BasicBPFTesterDelegate() {}
|
| virtual ~BasicBPFTesterDelegate() {}
|
|
|
| - virtual scoped_ptr<SandboxBPFPolicy> GetSandboxBPFPolicy() OVERRIDE {
|
| + virtual scoped_ptr<SandboxBPFPolicy> GetSandboxBPFPolicy() override {
|
| return scoped_ptr<SandboxBPFPolicy>(new EnosysPtracePolicy());
|
| }
|
| - virtual void RunTestFunction() OVERRIDE {
|
| + virtual void RunTestFunction() override {
|
| errno = 0;
|
| int ret = ptrace(PTRACE_TRACEME, -1, NULL, NULL);
|
| BPF_ASSERT(-1 == ret);
|
|
|