| Index: sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| index eb63e8c1ace234a40940c07dafeb40ad69cb448f..6c2875f94a4a15a80a6a16729952960efcc1264e 100644
|
| --- a/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc
|
| @@ -64,8 +64,8 @@ class Stubs {
|
| class BasicPolicy : public Policy {
|
| public:
|
| BasicPolicy() {}
|
| - virtual ~BasicPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~BasicPolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_getpgid) {
|
| const Arg<pid_t> pid(0);
|
| return If(pid == 0, Error(EPERM)).Else(Error(EINVAL));
|
| @@ -94,8 +94,8 @@ BPF_TEST_C(BPFDSL, Basic, BasicPolicy) {
|
| class BooleanLogicPolicy : public Policy {
|
| public:
|
| BooleanLogicPolicy() {}
|
| - virtual ~BooleanLogicPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~BooleanLogicPolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_socketpair) {
|
| const Arg<int> domain(0), type(1), protocol(2);
|
| return If(domain == AF_UNIX &&
|
| @@ -132,8 +132,8 @@ BPF_TEST_C(BPFDSL, BooleanLogic, BooleanLogicPolicy) {
|
| class MoreBooleanLogicPolicy : public Policy {
|
| public:
|
| MoreBooleanLogicPolicy() {}
|
| - virtual ~MoreBooleanLogicPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~MoreBooleanLogicPolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_setresuid) {
|
| const Arg<uid_t> ruid(0), euid(1), suid(2);
|
| return If(ruid == 0 || euid == 0 || suid == 0, Error(EPERM))
|
| @@ -169,8 +169,8 @@ static const uintptr_t kDeadBeefAddr =
|
| class ArgSizePolicy : public Policy {
|
| public:
|
| ArgSizePolicy() {}
|
| - virtual ~ArgSizePolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~ArgSizePolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_uname) {
|
| const Arg<uintptr_t> addr(0);
|
| return If(addr == kDeadBeefAddr, Error(EPERM)).Else(Allow());
|
| @@ -192,8 +192,8 @@ BPF_TEST_C(BPFDSL, ArgSizeTest, ArgSizePolicy) {
|
| class TrappingPolicy : public Policy {
|
| public:
|
| TrappingPolicy() {}
|
| - virtual ~TrappingPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~TrappingPolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_uname) {
|
| return Trap(UnameTrap, &count_);
|
| }
|
| @@ -222,8 +222,8 @@ BPF_TEST_C(BPFDSL, TrapTest, TrappingPolicy) {
|
| class MaskingPolicy : public Policy {
|
| public:
|
| MaskingPolicy() {}
|
| - virtual ~MaskingPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~MaskingPolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_setuid) {
|
| const Arg<uid_t> uid(0);
|
| return If((uid & 0xf) == 0, Error(EINVAL)).Else(Error(EACCES));
|
| @@ -263,8 +263,8 @@ BPF_TEST_C(BPFDSL, MaskTest, MaskingPolicy) {
|
| class ElseIfPolicy : public Policy {
|
| public:
|
| ElseIfPolicy() {}
|
| - virtual ~ElseIfPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~ElseIfPolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_setuid) {
|
| const Arg<uid_t> uid(0);
|
| return If((uid & 0xfff) == 0, Error(0))
|
| @@ -295,8 +295,8 @@ BPF_TEST_C(BPFDSL, ElseIfTest, ElseIfPolicy) {
|
| class SwitchPolicy : public Policy {
|
| public:
|
| SwitchPolicy() {}
|
| - virtual ~SwitchPolicy() {}
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ~SwitchPolicy() override {}
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| if (sysno == __NR_fcntl) {
|
| const Arg<int> cmd(1);
|
| const Arg<unsigned long> long_arg(2);
|
|
|