| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "build/build_config.h" | 5 #include "build/build_config.h" |
| 6 #include "content/public/common/content_switches.h" | 6 #include "content/public/common/content_switches.h" |
| 7 #include "media/media_features.h" | 7 #include "media/media_features.h" |
| 8 | 8 |
| 9 namespace switches { | 9 namespace switches { |
| 10 | 10 |
| (...skipping 639 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 650 // Mutes audio sent to the audio device so it is not audible during | 650 // Mutes audio sent to the audio device so it is not audible during |
| 651 // automated testing. | 651 // automated testing. |
| 652 const char kMuteAudio[] = "mute-audio"; | 652 const char kMuteAudio[] = "mute-audio"; |
| 653 | 653 |
| 654 // Don't send HTTP-Referer headers. | 654 // Don't send HTTP-Referer headers. |
| 655 const char kNoReferrers[] = "no-referrers"; | 655 const char kNoReferrers[] = "no-referrers"; |
| 656 | 656 |
| 657 // Disables the sandbox for all process types that are normally sandboxed. | 657 // Disables the sandbox for all process types that are normally sandboxed. |
| 658 const char kNoSandbox[] = "no-sandbox"; | 658 const char kNoSandbox[] = "no-sandbox"; |
| 659 | 659 |
| 660 // Do not use the mojo UI Service in the Chrome render process. | |
| 661 const char kNoUseMusInRenderer[] = "no-use-mus-in-renderer"; | |
| 662 | |
| 663 // Disables the use of a zygote process for forking child processes. Instead, | 660 // Disables the use of a zygote process for forking child processes. Instead, |
| 664 // child processes will be forked and exec'd directly. Note that --no-sandbox | 661 // child processes will be forked and exec'd directly. Note that --no-sandbox |
| 665 // should also be used together with this flag because the sandbox needs the | 662 // should also be used together with this flag because the sandbox needs the |
| 666 // zygote to work. | 663 // zygote to work. |
| 667 const char kNoZygote[] = "no-zygote"; | 664 const char kNoZygote[] = "no-zygote"; |
| 668 | 665 |
| 669 // Enable or disable appcontainer/lowbox for renderer on Win8+ platforms. | 666 // Enable or disable appcontainer/lowbox for renderer on Win8+ platforms. |
| 670 const char kEnableAppContainer[] = "enable-appcontainer"; | 667 const char kEnableAppContainer[] = "enable-appcontainer"; |
| 671 const char kDisableAppContainer[] = "disable-appcontainer"; | 668 const char kDisableAppContainer[] = "disable-appcontainer"; |
| 672 | 669 |
| (...skipping 411 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1084 // the given directory. Used primarily to gather samples for IPC fuzzing. | 1081 // the given directory. Used primarily to gather samples for IPC fuzzing. |
| 1085 const char kIpcDumpDirectory[] = "ipc-dump-directory"; | 1082 const char kIpcDumpDirectory[] = "ipc-dump-directory"; |
| 1086 | 1083 |
| 1087 // Specifies the testcase used by the IPC fuzzer. | 1084 // Specifies the testcase used by the IPC fuzzer. |
| 1088 const char kIpcFuzzerTestcase[] = "ipc-fuzzer-testcase"; | 1085 const char kIpcFuzzerTestcase[] = "ipc-fuzzer-testcase"; |
| 1089 #endif | 1086 #endif |
| 1090 | 1087 |
| 1091 // Don't dump stuff here, follow the same order as the header. | 1088 // Don't dump stuff here, follow the same order as the header. |
| 1092 | 1089 |
| 1093 } // namespace switches | 1090 } // namespace switches |
| OLD | NEW |