Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
index f98db20f50be7775c9a1199bdd5a327098226f48..54daf90eb984cb20cb1cf70e4087a0aae2996915 100644 |
--- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
@@ -80,9 +80,9 @@ inline bool IsArchitectureArm() { |
class BlacklistDebugAndNumaPolicy : public SandboxBPFBasePolicy { |
public: |
BlacklistDebugAndNumaPolicy() {} |
- virtual ~BlacklistDebugAndNumaPolicy() {} |
+ ~BlacklistDebugAndNumaPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int system_call_number) const override; |
+ ResultExpr EvaluateSyscall(int system_call_number) const override; |
private: |
DISALLOW_COPY_AND_ASSIGN(BlacklistDebugAndNumaPolicy); |
@@ -98,9 +98,9 @@ ResultExpr BlacklistDebugAndNumaPolicy::EvaluateSyscall(int sysno) const { |
class AllowAllPolicy : public SandboxBPFBasePolicy { |
public: |
AllowAllPolicy() {} |
- virtual ~AllowAllPolicy() {} |
+ ~AllowAllPolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int system_call_number) const override; |
+ ResultExpr EvaluateSyscall(int system_call_number) const override; |
private: |
DISALLOW_COPY_AND_ASSIGN(AllowAllPolicy); |