Index: sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc b/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
index 192e68ddfc9d5a2cb52e92d4bd7f1908ed0ceb41..9727d28f04288e9332f757d0558926218f48d52c 100644 |
--- a/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf/bpf_tests_unittest.cc |
@@ -46,9 +46,9 @@ class EmptyClassTakingPolicy : public bpf_dsl::Policy { |
BPF_ASSERT(fourty_two); |
BPF_ASSERT(FourtyTwo::kMagicValue == fourty_two->value()); |
} |
- virtual ~EmptyClassTakingPolicy() {} |
+ ~EmptyClassTakingPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
return Allow(); |
} |
@@ -84,13 +84,13 @@ TEST(BPFTest, BPFTesterCompatibilityDelegateLeakTest) { |
class EnosysPtracePolicy : public bpf_dsl::Policy { |
public: |
EnosysPtracePolicy() { my_pid_ = sys_getpid(); } |
- virtual ~EnosysPtracePolicy() { |
+ ~EnosysPtracePolicy() override { |
// Policies should be able to bind with the process on which they are |
// created. They should never be created in a parent process. |
BPF_ASSERT_EQ(my_pid_, sys_getpid()); |
} |
- virtual ResultExpr EvaluateSyscall(int system_call_number) const override { |
+ ResultExpr EvaluateSyscall(int system_call_number) const override { |
CHECK(SandboxBPF::IsValidSyscallNumber(system_call_number)); |
if (system_call_number == __NR_ptrace) { |
// The EvaluateSyscall function should run in the process that created |
@@ -110,12 +110,12 @@ class EnosysPtracePolicy : public bpf_dsl::Policy { |
class BasicBPFTesterDelegate : public BPFTesterDelegate { |
public: |
BasicBPFTesterDelegate() {} |
- virtual ~BasicBPFTesterDelegate() {} |
+ ~BasicBPFTesterDelegate() override {} |
- virtual scoped_ptr<bpf_dsl::Policy> GetSandboxBPFPolicy() override { |
+ scoped_ptr<bpf_dsl::Policy> GetSandboxBPFPolicy() override { |
return scoped_ptr<bpf_dsl::Policy>(new EnosysPtracePolicy()); |
} |
- virtual void RunTestFunction() override { |
+ void RunTestFunction() override { |
errno = 0; |
int ret = ptrace(PTRACE_TRACEME, -1, NULL, NULL); |
BPF_ASSERT(-1 == ret); |