OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/public/common/content_switches.h" | 5 #include "content/public/common/content_switches.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 | 8 |
9 namespace switches { | 9 namespace switches { |
10 | 10 |
(...skipping 240 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
251 | 251 |
252 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only). | 252 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only). |
253 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox"; | 253 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox"; |
254 | 254 |
255 // Disable session storage. | 255 // Disable session storage. |
256 const char kDisableSessionStorage[] = "disable-session-storage"; | 256 const char kDisableSessionStorage[] = "disable-session-storage"; |
257 | 257 |
258 // Disable the setuid sandbox (Linux only). | 258 // Disable the setuid sandbox (Linux only). |
259 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox"; | 259 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox"; |
260 | 260 |
261 // Enable shared workers. Functionality not yet complete. | 261 // Disable shared workers. |
262 const char kDisableSharedWorkers[] = "disable-shared-workers"; | 262 const char kDisableSharedWorkers[] = "disable-shared-workers"; |
263 | 263 |
264 // Disables site-specific tailoring to compatibility issues in WebKit. | 264 // Disables site-specific tailoring to compatibility issues in WebKit. |
265 const char kDisableSiteSpecificQuirks[] = "disable-site-specific-quirks"; | 265 const char kDisableSiteSpecificQuirks[] = "disable-site-specific-quirks"; |
266 | 266 |
267 // Disable smooth scrolling for testing. | 267 // Disable smooth scrolling for testing. |
268 const char kDisableSmoothScrolling[] = "disable-smooth-scrolling"; | 268 const char kDisableSmoothScrolling[] = "disable-smooth-scrolling"; |
269 | 269 |
270 // Disables the use of a 3D software rasterizer. | 270 // Disables the use of a 3D software rasterizer. |
271 const char kDisableSoftwareRasterizer[] = "disable-software-rasterizer"; | 271 const char kDisableSoftwareRasterizer[] = "disable-software-rasterizer"; |
(...skipping 691 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
963 // Enable the Win32K process mitigation policy for renderer processes which | 963 // Enable the Win32K process mitigation policy for renderer processes which |
964 // prevents them from invoking user32 and gdi32 system calls which enter | 964 // prevents them from invoking user32 and gdi32 system calls which enter |
965 // the kernel. This is only supported on Windows 8 and beyond. | 965 // the kernel. This is only supported on Windows 8 and beyond. |
966 const char kEnableWin32kRendererLockDown[] | 966 const char kEnableWin32kRendererLockDown[] |
967 = "enable_win32k_renderer_lockdown"; | 967 = "enable_win32k_renderer_lockdown"; |
968 #endif | 968 #endif |
969 | 969 |
970 // Don't dump stuff here, follow the same order as the header. | 970 // Don't dump stuff here, follow the same order as the header. |
971 | 971 |
972 } // namespace switches | 972 } // namespace switches |
OLD | NEW |