| Index: sandbox/win/src/process_mitigations.cc
|
| diff --git a/sandbox/win/src/process_mitigations.cc b/sandbox/win/src/process_mitigations.cc
|
| index 5e242f3abfa1df66c9fd69574208f87ce5bdf09c..80e428483052b606211c977572ea57bb13d9255b 100644
|
| --- a/sandbox/win/src/process_mitigations.cc
|
| +++ b/sandbox/win/src/process_mitigations.cc
|
| @@ -79,10 +79,10 @@ bool ApplyProcessMitigationsToCurrentProcess(MitigationFlags flags) {
|
| } else {
|
| // We're on XP sp2, so use the less standard approach.
|
| // For reference: http://www.uninformed.org/?v=2&a=4
|
| - const int MEM_EXECUTE_OPTION_ENABLE = 1;
|
| - const int MEM_EXECUTE_OPTION_DISABLE = 2;
|
| - const int MEM_EXECUTE_OPTION_ATL7_THUNK_EMULATION = 4;
|
| - const int MEM_EXECUTE_OPTION_PERMANENT = 8;
|
| + static const int MEM_EXECUTE_OPTION_ENABLE = 1;
|
| + static const int MEM_EXECUTE_OPTION_DISABLE = 2;
|
| + static const int MEM_EXECUTE_OPTION_ATL7_THUNK_EMULATION = 4;
|
| + static const int MEM_EXECUTE_OPTION_PERMANENT = 8;
|
|
|
| NtSetInformationProcessFunction set_information_process = NULL;
|
| ResolveNTFunctionPtr("NtSetInformationProcess",
|
|
|