OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/public/common/content_switches.h" | 5 #include "content/public/common/content_switches.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 | 8 |
9 namespace switches { | 9 namespace switches { |
10 | 10 |
11 // The number of MSAA samples for canvas2D. Requires MSAA support by GPU to | 11 // The number of MSAA samples for canvas2D. Requires MSAA support by GPU to |
12 // have an effect. 0 disables MSAA. | 12 // have an effect. 0 disables MSAA. |
13 const char kAcceleratedCanvas2dMSAASampleCount[] = "canvas-msaa-sample-count"; | 13 const char kAcceleratedCanvas2dMSAASampleCount[] = "canvas-msaa-sample-count"; |
14 | 14 |
15 // By default, file:// URIs cannot read other file:// URIs. This is an | 15 // By default, file:// URIs cannot read other file:// URIs. This is an |
16 // override for developers who need the old behavior for testing. | 16 // override for developers who need the old behavior for testing. |
17 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; | 17 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; |
18 | 18 |
19 // Enables the sandboxed processes to run without a job object assigned to them. | 19 // Enables the sandboxed processes to run without a job object assigned to them. |
20 // This flag is required to allow Chrome to run in RemoteApps or Citrix. This | 20 // This flag is required to allow Chrome to run in RemoteApps or Citrix. This |
21 // flag can reduce the security of the sandboxed processes and allow them to do | 21 // flag can reduce the security of the sandboxed processes and allow them to do |
22 // certain API calls like shut down Windows or access the clipboard. Also we | 22 // certain API calls like shut down Windows or access the clipboard. Also we |
23 // lose the chance to kill some processes until the outer job that owns them | 23 // lose the chance to kill some processes until the outer job that owns them |
24 // finishes. | 24 // finishes. |
25 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job"; | 25 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job"; |
26 | 26 |
27 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). | 27 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). |
28 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; | 28 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; |
29 | 29 |
30 // Allow compositing on chrome:// pages. | |
31 const char kAllowWebUICompositing[] = "allow-webui-compositing"; | |
32 | |
33 // The same as kAuditHandles except all handles are enumerated. | 30 // The same as kAuditHandles except all handles are enumerated. |
34 const char kAuditAllHandles[] = "enable-handle-auditing-all"; | 31 const char kAuditAllHandles[] = "enable-handle-auditing-all"; |
35 | 32 |
36 // Enumerates and prints a child process' most dangerous handles when it | 33 // Enumerates and prints a child process' most dangerous handles when it |
37 // is terminated. | 34 // is terminated. |
38 const char kAuditHandles[] = "enable-handle-auditing"; | 35 const char kAuditHandles[] = "enable-handle-auditing"; |
39 | 36 |
40 // Blacklist the GPU for accelerated compositing. | 37 // Blacklist the GPU for accelerated compositing. |
41 const char kBlacklistAcceleratedCompositing[] = | 38 const char kBlacklistAcceleratedCompositing[] = |
42 "blacklist-accelerated-compositing"; | 39 "blacklist-accelerated-compositing"; |
(...skipping 1021 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1064 #endif | 1061 #endif |
1065 | 1062 |
1066 #if defined(OS_POSIX) | 1063 #if defined(OS_POSIX) |
1067 // Causes the child processes to cleanly exit via calling exit(). | 1064 // Causes the child processes to cleanly exit via calling exit(). |
1068 const char kChildCleanExit[] = "child-clean-exit"; | 1065 const char kChildCleanExit[] = "child-clean-exit"; |
1069 #endif | 1066 #endif |
1070 | 1067 |
1071 // Don't dump stuff here, follow the same order as the header. | 1068 // Don't dump stuff here, follow the same order as the header. |
1072 | 1069 |
1073 } // namespace switches | 1070 } // namespace switches |
OLD | NEW |