| Index: sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/syscall_unittest.cc b/sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| index 0b685c3b4f07da88c85f4bfab53d37943de690fe..6bd32885ef541a6d034e0754d6ec64981f5170a4 100644
|
| --- a/sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| +++ b/sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| @@ -108,9 +108,9 @@ intptr_t CopySyscallArgsToAux(const struct arch_seccomp_data& args, void* aux) {
|
| class CopyAllArgsOnUnamePolicy : public bpf_dsl::Policy {
|
| public:
|
| explicit CopyAllArgsOnUnamePolicy(std::vector<uint64_t>* aux) : aux_(aux) {}
|
| - virtual ~CopyAllArgsOnUnamePolicy() {}
|
| + ~CopyAllArgsOnUnamePolicy() override {}
|
|
|
| - virtual ResultExpr EvaluateSyscall(int sysno) const override {
|
| + ResultExpr EvaluateSyscall(int sysno) const override {
|
| DCHECK(SandboxBPF::IsValidSyscallNumber(sysno));
|
| if (sysno == __NR_uname) {
|
| return Trap(CopySyscallArgsToAux, aux_);
|
|
|