| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/public/common/content_switches.h" | 5 #include "content/public/common/content_switches.h" |
| 6 | 6 |
| 7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
| 8 | 8 |
| 9 namespace switches { | 9 namespace switches { |
| 10 | 10 |
| (...skipping 240 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 251 | 251 |
| 252 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only). | 252 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only). |
| 253 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox"; | 253 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox"; |
| 254 | 254 |
| 255 // Disable session storage. | 255 // Disable session storage. |
| 256 const char kDisableSessionStorage[] = "disable-session-storage"; | 256 const char kDisableSessionStorage[] = "disable-session-storage"; |
| 257 | 257 |
| 258 // Disable the setuid sandbox (Linux only). | 258 // Disable the setuid sandbox (Linux only). |
| 259 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox"; | 259 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox"; |
| 260 | 260 |
| 261 // Enable shared workers. Functionality not yet complete. | 261 // Disable shared workers. |
| 262 const char kDisableSharedWorkers[] = "disable-shared-workers"; | 262 const char kDisableSharedWorkers[] = "disable-shared-workers"; |
| 263 | 263 |
| 264 // Disables site-specific tailoring to compatibility issues in WebKit. | 264 // Disables site-specific tailoring to compatibility issues in WebKit. |
| 265 const char kDisableSiteSpecificQuirks[] = "disable-site-specific-quirks"; | 265 const char kDisableSiteSpecificQuirks[] = "disable-site-specific-quirks"; |
| 266 | 266 |
| 267 // Disable smooth scrolling for testing. | 267 // Disable smooth scrolling for testing. |
| 268 const char kDisableSmoothScrolling[] = "disable-smooth-scrolling"; | 268 const char kDisableSmoothScrolling[] = "disable-smooth-scrolling"; |
| 269 | 269 |
| 270 // Disables the use of a 3D software rasterizer. | 270 // Disables the use of a 3D software rasterizer. |
| 271 const char kDisableSoftwareRasterizer[] = "disable-software-rasterizer"; | 271 const char kDisableSoftwareRasterizer[] = "disable-software-rasterizer"; |
| (...skipping 691 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 963 // Enable the Win32K process mitigation policy for renderer processes which | 963 // Enable the Win32K process mitigation policy for renderer processes which |
| 964 // prevents them from invoking user32 and gdi32 system calls which enter | 964 // prevents them from invoking user32 and gdi32 system calls which enter |
| 965 // the kernel. This is only supported on Windows 8 and beyond. | 965 // the kernel. This is only supported on Windows 8 and beyond. |
| 966 const char kEnableWin32kRendererLockDown[] | 966 const char kEnableWin32kRendererLockDown[] |
| 967 = "enable_win32k_renderer_lockdown"; | 967 = "enable_win32k_renderer_lockdown"; |
| 968 #endif | 968 #endif |
| 969 | 969 |
| 970 // Don't dump stuff here, follow the same order as the header. | 970 // Don't dump stuff here, follow the same order as the header. |
| 971 | 971 |
| 972 } // namespace switches | 972 } // namespace switches |
| OLD | NEW |