| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
 | 
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
 | 
| index 3450842fac3544204dfeca9de285b948907f0f3b..3743a013e4cc5b1c7cdc6fbe62b638cbcd155d78 100644
 | 
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
 | 
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
 | 
| @@ -145,8 +145,8 @@ bool ContentSecurityPolicy::isNonceableElement(const Element* element) {
 | 
|    //
 | 
|    // See http://blog.innerht.ml/csp-2015/#danglingmarkupinjection for an example
 | 
|    // of the kind of attack this is aimed at mitigating.
 | 
| -  DEFINE_STATIC_LOCAL(AtomicString, scriptString, ("<script"));
 | 
| -  DEFINE_STATIC_LOCAL(AtomicString, styleString, ("<style"));
 | 
| +  static const char scriptString[] = "<script";
 | 
| +  static const char styleString[] = "<style";
 | 
|    for (const Attribute& attr : element->attributes()) {
 | 
|      AtomicString name = attr.localName().lowerASCII();
 | 
|      AtomicString value = attr.value().lowerASCII();
 | 
| @@ -1306,23 +1306,21 @@ void ContentSecurityPolicy::reportInvalidDirectiveInMeta(
 | 
|  }
 | 
|  
 | 
|  void ContentSecurityPolicy::reportUnsupportedDirective(const String& name) {
 | 
| -  DEFINE_STATIC_LOCAL(String, allow, ("allow"));
 | 
| -  DEFINE_STATIC_LOCAL(String, options, ("options"));
 | 
| -  DEFINE_STATIC_LOCAL(String, policyURI, ("policy-uri"));
 | 
| -  DEFINE_STATIC_LOCAL(
 | 
| -      String, allowMessage,
 | 
| -      ("The 'allow' directive has been replaced with 'default-src'. Please use "
 | 
| -       "that directive instead, as 'allow' has no effect."));
 | 
| -  DEFINE_STATIC_LOCAL(
 | 
| -      String, optionsMessage,
 | 
| -      ("The 'options' directive has been replaced with 'unsafe-inline' and "
 | 
| -       "'unsafe-eval' source expressions for the 'script-src' and 'style-src' "
 | 
| -       "directives. Please use those directives instead, as 'options' has no "
 | 
| -       "effect."));
 | 
| -  DEFINE_STATIC_LOCAL(String, policyURIMessage,
 | 
| -                      ("The 'policy-uri' directive has been removed from the "
 | 
| -                       "specification. Please specify a complete policy via "
 | 
| -                       "the Content-Security-Policy header."));
 | 
| +  static const char allow[] = "allow";
 | 
| +  static const char options[] = "options";
 | 
| +  static const char policyURI[] = "policy-uri";
 | 
| +  static const char allowMessage[] =
 | 
| +      "The 'allow' directive has been replaced with 'default-src'. Please use "
 | 
| +      "that directive instead, as 'allow' has no effect.";
 | 
| +  static const char optionsMessage[] =
 | 
| +      "The 'options' directive has been replaced with 'unsafe-inline' and "
 | 
| +      "'unsafe-eval' source expressions for the 'script-src' and 'style-src' "
 | 
| +      "directives. Please use those directives instead, as 'options' has no "
 | 
| +      "effect.";
 | 
| +  static const char policyURIMessage[] =
 | 
| +      "The 'policy-uri' directive has been removed from the "
 | 
| +      "specification. Please specify a complete policy via "
 | 
| +      "the Content-Security-Policy header.";
 | 
|  
 | 
|    String message =
 | 
|        "Unrecognized Content-Security-Policy directive '" + name + "'.\n";
 | 
| 
 |