| Index: content/common/site_isolation_policy.cc
|
| diff --git a/content/common/site_isolation_policy.cc b/content/common/site_isolation_policy.cc
|
| index 694c9db3336be49465f81223f9f2f49e70575a07..18a7f2e4da49a5aca6116af1fbeaa0cdbfb81c37 100644
|
| --- a/content/common/site_isolation_policy.cc
|
| +++ b/content/common/site_isolation_policy.cc
|
| @@ -17,6 +17,8 @@ namespace content {
|
| bool SiteIsolationPolicy::AreCrossProcessFramesPossible() {
|
| return base::CommandLine::ForCurrentProcess()->HasSwitch(
|
| switches::kSitePerProcess) ||
|
| + base:: CommandLine:: ForCurrentProcess()-> HasSwitch(
|
| + switches:: kDogHouseProcess) ||
|
| GetContentClient()->IsSupplementarySiteIsolationModeEnabled() ||
|
| BrowserPluginGuestMode::UseCrossProcessFramesForGuests();
|
| }
|
| @@ -24,7 +26,9 @@ bool SiteIsolationPolicy::AreCrossProcessFramesPossible() {
|
| // static
|
| bool SiteIsolationPolicy::UseDedicatedProcessesForAllSites() {
|
| return base::CommandLine::ForCurrentProcess()->HasSwitch(
|
| - switches::kSitePerProcess);
|
| + switches::kSitePerProcess) ||
|
| + base:: CommandLine:: ForCurrentProcess()->HasSwitch(
|
| + switches:: kDogHouseProcess);
|
| }
|
|
|
| // static
|
|
|