Index: sandbox/win/src/process_mitigations.cc |
diff --git a/sandbox/win/src/process_mitigations.cc b/sandbox/win/src/process_mitigations.cc |
index 8963fc882fb6d43f1a8bc8fdc0cf62fb1ab175ab..f1bc090c0affe9b09d0c2dc8d186111e75b7ad74 100644 |
--- a/sandbox/win/src/process_mitigations.cc |
+++ b/sandbox/win/src/process_mitigations.cc |
@@ -87,7 +87,6 @@ bool ApplyProcessMitigationsToCurrentProcess(MitigationFlags flags) { |
} else { |
// We're on XP sp2, so use the less standard approach. |
// For reference: http://www.uninformed.org/?v=2&a=4 |
- static const int MEM_EXECUTE_OPTION_ENABLE = 1; |
static const int MEM_EXECUTE_OPTION_DISABLE = 2; |
static const int MEM_EXECUTE_OPTION_ATL7_THUNK_EMULATION = 4; |
static const int MEM_EXECUTE_OPTION_PERMANENT = 8; |