| Index: sandbox/linux/seccomp-bpf/sandbox_bpf.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
|
| index 8a250394648ab5d3dead4f734d16be569c68dd15..4870cfa70d92d5207a6934f88a9634698b02960c 100644
|
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
|
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
|
| @@ -102,7 +102,7 @@ class ProbePolicy : public SandboxBPFDSLPolicy {
|
| ProbePolicy() {}
|
| virtual ~ProbePolicy() {}
|
|
|
| - virtual ResultExpr EvaluateSyscall(int sysnum) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysnum) const override {
|
| switch (sysnum) {
|
| case __NR_getpid:
|
| // Return EPERM so that we can check that the filter actually ran.
|
| @@ -131,7 +131,7 @@ class AllowAllPolicy : public SandboxBPFDSLPolicy {
|
| AllowAllPolicy() {}
|
| virtual ~AllowAllPolicy() {}
|
|
|
| - virtual ResultExpr EvaluateSyscall(int sysnum) const OVERRIDE {
|
| + virtual ResultExpr EvaluateSyscall(int sysnum) const override {
|
| DCHECK(SandboxBPF::IsValidSyscallNumber(sysnum));
|
| return Allow();
|
| }
|
| @@ -237,7 +237,7 @@ class RedirectToUserSpacePolicyWrapper : public SandboxBPFPolicy {
|
| }
|
|
|
| virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| - int system_call_number) const OVERRIDE {
|
| + int system_call_number) const override {
|
| ErrorCode err =
|
| wrapped_policy_->EvaluateSyscall(sandbox_compiler, system_call_number);
|
| ChangeErrnoToTraps(&err, sandbox_compiler);
|
| @@ -245,7 +245,7 @@ class RedirectToUserSpacePolicyWrapper : public SandboxBPFPolicy {
|
| }
|
|
|
| virtual ErrorCode InvalidSyscall(
|
| - SandboxBPF* sandbox_compiler) const OVERRIDE {
|
| + SandboxBPF* sandbox_compiler) const override {
|
| return ReturnErrnoViaTrap(sandbox_compiler, ENOSYS);
|
| }
|
|
|
|
|