Index: sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
index 0adfd6a112593306687cf763fde3ad29f1adf622..b9bb36bf6eab2267c95ab7aecb1b8076283d90c2 100644 |
--- a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
+++ b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
@@ -113,9 +113,9 @@ class VerboseAPITestingPolicy : public Policy { |
public: |
explicit VerboseAPITestingPolicy(int* counter_ptr) |
: counter_ptr_(counter_ptr) {} |
- virtual ~VerboseAPITestingPolicy() {} |
+ ~VerboseAPITestingPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
if (sysno == __NR_uname) { |
return Trap(IncreaseCounter, counter_ptr_); |
@@ -151,9 +151,9 @@ SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) { |
class BlacklistNanosleepPolicy : public Policy { |
public: |
BlacklistNanosleepPolicy() {} |
- virtual ~BlacklistNanosleepPolicy() {} |
+ ~BlacklistNanosleepPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
switch (sysno) { |
case __NR_nanosleep: |
@@ -183,9 +183,9 @@ BPF_TEST_C(SandboxBPF, ApplyBasicBlacklistPolicy, BlacklistNanosleepPolicy) { |
class WhitelistGetpidPolicy : public Policy { |
public: |
WhitelistGetpidPolicy() {} |
- virtual ~WhitelistGetpidPolicy() {} |
+ ~WhitelistGetpidPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
switch (sysno) { |
case __NR_getpid: |
@@ -222,9 +222,9 @@ intptr_t EnomemHandler(const struct arch_seccomp_data& args, void* aux) { |
class BlacklistNanosleepTrapPolicy : public Policy { |
public: |
explicit BlacklistNanosleepTrapPolicy(int* aux) : aux_(aux) {} |
- virtual ~BlacklistNanosleepTrapPolicy() {} |
+ ~BlacklistNanosleepTrapPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
switch (sysno) { |
case __NR_nanosleep: |
@@ -264,9 +264,9 @@ BPF_TEST(SandboxBPF, |
class ErrnoTestPolicy : public Policy { |
public: |
ErrnoTestPolicy() {} |
- virtual ~ErrnoTestPolicy() {} |
+ ~ErrnoTestPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
DISALLOW_COPY_AND_ASSIGN(ErrnoTestPolicy); |
@@ -346,9 +346,9 @@ BPF_TEST_C(SandboxBPF, ErrnoTest, ErrnoTestPolicy) { |
class StackingPolicyPartOne : public Policy { |
public: |
StackingPolicyPartOne() {} |
- virtual ~StackingPolicyPartOne() {} |
+ ~StackingPolicyPartOne() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
switch (sysno) { |
case __NR_getppid: { |
@@ -367,9 +367,9 @@ class StackingPolicyPartOne : public Policy { |
class StackingPolicyPartTwo : public Policy { |
public: |
StackingPolicyPartTwo() {} |
- virtual ~StackingPolicyPartTwo() {} |
+ ~StackingPolicyPartTwo() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
switch (sysno) { |
case __NR_getppid: { |
@@ -425,9 +425,9 @@ int SysnoToRandomErrno(int sysno) { |
class SyntheticPolicy : public Policy { |
public: |
SyntheticPolicy() {} |
- virtual ~SyntheticPolicy() {} |
+ ~SyntheticPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
if (sysno == __NR_exit_group || sysno == __NR_write) { |
// exit_group() is special, we really need it to work. |
@@ -525,9 +525,9 @@ class GreyListedPolicy : public Policy { |
// Set the global environment for unsafe traps once. |
EnableUnsafeTraps(); |
} |
- virtual ~GreyListedPolicy() {} |
+ ~GreyListedPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
// Some system calls must always be allowed, if our policy wants to make |
// use of UnsafeTrap() |
@@ -591,9 +591,9 @@ intptr_t PrctlHandler(const struct arch_seccomp_data& args, void*) { |
class PrctlPolicy : public Policy { |
public: |
PrctlPolicy() {} |
- virtual ~PrctlPolicy() {} |
+ ~PrctlPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
setenv(kSandboxDebuggingEnv, "t", 0); |
Die::SuppressInfoMessages(true); |
@@ -645,9 +645,9 @@ intptr_t AllowRedirectedSyscall(const struct arch_seccomp_data& args, void*) { |
class RedirectAllSyscallsPolicy : public Policy { |
public: |
RedirectAllSyscallsPolicy() {} |
- virtual ~RedirectAllSyscallsPolicy() {} |
+ ~RedirectAllSyscallsPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
DISALLOW_COPY_AND_ASSIGN(RedirectAllSyscallsPolicy); |
@@ -809,9 +809,9 @@ intptr_t BrokerOpenTrapHandler(const struct arch_seccomp_data& args, |
class DenyOpenPolicy : public Policy { |
public: |
explicit DenyOpenPolicy(InitializedOpenBroker* iob) : iob_(iob) {} |
- virtual ~DenyOpenPolicy() {} |
+ ~DenyOpenPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
switch (sysno) { |
@@ -889,9 +889,9 @@ BPF_TEST(SandboxBPF, |
class SimpleCondTestPolicy : public Policy { |
public: |
SimpleCondTestPolicy() {} |
- virtual ~SimpleCondTestPolicy() {} |
+ ~SimpleCondTestPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
DISALLOW_COPY_AND_ASSIGN(SimpleCondTestPolicy); |
@@ -1246,9 +1246,9 @@ class EqualityStressTest { |
class EqualityStressTestPolicy : public Policy { |
public: |
explicit EqualityStressTestPolicy(EqualityStressTest* aux) : aux_(aux) {} |
- virtual ~EqualityStressTestPolicy() {} |
+ ~EqualityStressTestPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
return aux_->Policy(sysno); |
} |
@@ -1268,9 +1268,9 @@ BPF_TEST(SandboxBPF, |
class EqualityArgumentWidthPolicy : public Policy { |
public: |
EqualityArgumentWidthPolicy() {} |
- virtual ~EqualityArgumentWidthPolicy() {} |
+ ~EqualityArgumentWidthPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
DISALLOW_COPY_AND_ASSIGN(EqualityArgumentWidthPolicy); |
@@ -1321,9 +1321,9 @@ BPF_DEATH_TEST_C(SandboxBPF, |
class EqualityWithNegativeArgumentsPolicy : public Policy { |
public: |
EqualityWithNegativeArgumentsPolicy() {} |
- virtual ~EqualityWithNegativeArgumentsPolicy() {} |
+ ~EqualityWithNegativeArgumentsPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
if (sysno == __NR_uname) { |
// TODO(mdempsky): This currently can't be Arg<int> because then |
@@ -1362,9 +1362,9 @@ BPF_DEATH_TEST_C(SandboxBPF, |
class AllBitTestPolicy : public Policy { |
public: |
AllBitTestPolicy() {} |
- virtual ~AllBitTestPolicy() {} |
+ ~AllBitTestPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
static ResultExpr HasAllBits32(uint32_t bits); |
@@ -1548,9 +1548,9 @@ BPF_TEST_C(SandboxBPF, AllBitTests, AllBitTestPolicy) { |
class AnyBitTestPolicy : public Policy { |
public: |
AnyBitTestPolicy() {} |
- virtual ~AnyBitTestPolicy() {} |
+ ~AnyBitTestPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
static ResultExpr HasAnyBits32(uint32_t); |
@@ -1712,9 +1712,9 @@ BPF_TEST_C(SandboxBPF, AnyBitTests, AnyBitTestPolicy) { |
class MaskedEqualTestPolicy : public Policy { |
public: |
MaskedEqualTestPolicy() {} |
- virtual ~MaskedEqualTestPolicy() {} |
+ ~MaskedEqualTestPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
static ResultExpr MaskedEqual32(uint32_t mask, uint32_t value); |
@@ -1839,9 +1839,9 @@ intptr_t PthreadTrapHandler(const struct arch_seccomp_data& args, void* aux) { |
class PthreadPolicyEquality : public Policy { |
public: |
PthreadPolicyEquality() {} |
- virtual ~PthreadPolicyEquality() {} |
+ ~PthreadPolicyEquality() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
DISALLOW_COPY_AND_ASSIGN(PthreadPolicyEquality); |
@@ -1883,9 +1883,9 @@ ResultExpr PthreadPolicyEquality::EvaluateSyscall(int sysno) const { |
class PthreadPolicyBitMask : public Policy { |
public: |
PthreadPolicyBitMask() {} |
- virtual ~PthreadPolicyBitMask() {} |
+ ~PthreadPolicyBitMask() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override; |
+ ResultExpr EvaluateSyscall(int sysno) const override; |
private: |
static BoolExpr HasAnyBits(const Arg<unsigned long>& arg, unsigned long bits); |
@@ -2054,9 +2054,9 @@ const uint16_t kTraceData = 0xcc; |
class TraceAllPolicy : public Policy { |
public: |
TraceAllPolicy() {} |
- virtual ~TraceAllPolicy() {} |
+ ~TraceAllPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int system_call_number) const override { |
+ ResultExpr EvaluateSyscall(int system_call_number) const override { |
return Trace(kTraceData); |
} |
@@ -2200,9 +2200,9 @@ bool pread_64_was_forwarded = false; |
class TrapPread64Policy : public Policy { |
public: |
TrapPread64Policy() {} |
- virtual ~TrapPread64Policy() {} |
+ ~TrapPread64Policy() override {} |
- virtual ResultExpr EvaluateSyscall(int system_call_number) const override { |
+ ResultExpr EvaluateSyscall(int system_call_number) const override { |
// Set the global environment for unsafe traps once. |
if (system_call_number == MIN_SYSCALL) { |
EnableUnsafeTraps(); |
@@ -2297,11 +2297,9 @@ SANDBOX_TEST(SandboxBPF, Tsync) { |
class AllowAllPolicy : public Policy { |
public: |
AllowAllPolicy() {} |
- virtual ~AllowAllPolicy() {} |
+ ~AllowAllPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
- return Allow(); |
- } |
+ ResultExpr EvaluateSyscall(int sysno) const override { return Allow(); } |
private: |
DISALLOW_COPY_AND_ASSIGN(AllowAllPolicy); |
@@ -2341,9 +2339,9 @@ intptr_t NoOpHandler(const struct arch_seccomp_data& args, void*) { |
class UnsafeTrapWithCondPolicy : public Policy { |
public: |
UnsafeTrapWithCondPolicy() {} |
- virtual ~UnsafeTrapWithCondPolicy() {} |
+ ~UnsafeTrapWithCondPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
setenv(kSandboxDebuggingEnv, "t", 0); |
Die::SuppressInfoMessages(true); |