Fix and reenable useless-object-inheritance.

Initial change generated using:
git ls-tree -r HEAD | awk '$1 != "120000" {print $NF}' | \
  grep '\.py$' | grep -v -e ^third_party/ -e '_pb2\.py' | \
  xargs sed -i 's/(object)//g'

Required only a handful of manual edits after that, mostly for
unrelated lint fixes.

BUG=None
TEST=run_tests, CQ

Change-Id: I0c57fdcf20124530ecd33ae3118506a2be9fc0ed
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/chromite/+/4637436
Auto-Submit: Alex Klein <saklein@chromium.org>
Commit-Queue: Jack Rosenthal <jrosenth@chromium.org>
Tested-by: Alex Klein <saklein@chromium.org>
Reviewed-by: Jack Rosenthal <jrosenth@chromium.org>
diff --git a/scripts/cros_fuzz.py b/scripts/cros_fuzz.py
index fb86986..6627577 100644
--- a/scripts/cros_fuzz.py
+++ b/scripts/cros_fuzz.py
@@ -86,7 +86,7 @@
 MAX_TOTAL_TIME_DEFAULT_VALUE = 30
 
 
-class BuildType(object):
+class BuildType:
     """Class to hold the different kinds of build types."""
 
     ASAN = "asan"
@@ -99,7 +99,7 @@
     CHOICES = (ASAN, MSAN, UBSAN, COVERAGE)
 
 
-class SysrootPath(object):
+class SysrootPath:
     """Class for representing a path that is in the sysroot.
 
     Useful for dealing with paths that we must interact with when chrooted into
@@ -814,7 +814,7 @@
     osutils.RmDir(GetSysrootPath(SCRIPT_STORAGE_PATH), ignore_missing=True)
 
 
-class ToolManager(object):
+class ToolManager:
     """Class that installs or uninstalls fuzzing tools to/from the sysroot.
 
     Install and Uninstall methods are idempotent. Both are safe to call at any
@@ -857,7 +857,7 @@
         return [LlvmBinary(x) for x in self.LLVM_BINARY_NAMES]
 
 
-class LlvmBinary(object):
+class LlvmBinary:
     """Class for representing installing/uninstalling an LLVM binary in sysroot.
 
     Install and Uninstall methods are idempotent. Both are safe to call at any
@@ -925,7 +925,7 @@
         osutils.SafeSymlink(link_path, self.binary_chroot_dest_path, sudo=True)
 
 
-class DeviceManager(object):
+class DeviceManager:
     """Class that creates or removes devices from /dev in sysroot.
 
     SetUp and CleanUp methods are idempotent. Both are safe to call at any
@@ -978,7 +978,7 @@
         sudo_run(command)
 
 
-class ProcManager(object):
+class ProcManager:
     """Class that mounts or unmounts /proc in sysroot.
 
     Mount and Unmount are idempotent. Both are safe to call at any point.