Index: sandbox/win/src/process_mitigations.cc |
diff --git a/sandbox/win/src/process_mitigations.cc b/sandbox/win/src/process_mitigations.cc |
index 5e242f3abfa1df66c9fd69574208f87ce5bdf09c..80e428483052b606211c977572ea57bb13d9255b 100644 |
--- a/sandbox/win/src/process_mitigations.cc |
+++ b/sandbox/win/src/process_mitigations.cc |
@@ -79,10 +79,10 @@ bool ApplyProcessMitigationsToCurrentProcess(MitigationFlags flags) { |
} else { |
// We're on XP sp2, so use the less standard approach. |
// For reference: http://www.uninformed.org/?v=2&a=4 |
- const int MEM_EXECUTE_OPTION_ENABLE = 1; |
- const int MEM_EXECUTE_OPTION_DISABLE = 2; |
- const int MEM_EXECUTE_OPTION_ATL7_THUNK_EMULATION = 4; |
- const int MEM_EXECUTE_OPTION_PERMANENT = 8; |
+ static const int MEM_EXECUTE_OPTION_ENABLE = 1; |
+ static const int MEM_EXECUTE_OPTION_DISABLE = 2; |
+ static const int MEM_EXECUTE_OPTION_ATL7_THUNK_EMULATION = 4; |
+ static const int MEM_EXECUTE_OPTION_PERMANENT = 8; |
NtSetInformationProcessFunction set_information_process = NULL; |
ResolveNTFunctionPtr("NtSetInformationProcess", |