Index: sandbox/linux/seccomp-bpf/syscall_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/syscall_unittest.cc b/sandbox/linux/seccomp-bpf/syscall_unittest.cc |
index 0b685c3b4f07da88c85f4bfab53d37943de690fe..6bd32885ef541a6d034e0754d6ec64981f5170a4 100644 |
--- a/sandbox/linux/seccomp-bpf/syscall_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf/syscall_unittest.cc |
@@ -108,9 +108,9 @@ intptr_t CopySyscallArgsToAux(const struct arch_seccomp_data& args, void* aux) { |
class CopyAllArgsOnUnamePolicy : public bpf_dsl::Policy { |
public: |
explicit CopyAllArgsOnUnamePolicy(std::vector<uint64_t>* aux) : aux_(aux) {} |
- virtual ~CopyAllArgsOnUnamePolicy() {} |
+ ~CopyAllArgsOnUnamePolicy() override {} |
- virtual ResultExpr EvaluateSyscall(int sysno) const override { |
+ ResultExpr EvaluateSyscall(int sysno) const override { |
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
if (sysno == __NR_uname) { |
return Trap(CopySyscallArgsToAux, aux_); |