diff --git a/content/browser/process_internals/process_internals.mojom b/content/browser/process_internals/process_internals.mojom index 3fce62e8bf772..26040b038a265 100644 --- a/content/browser/process_internals/process_internals.mojom +++ b/content/browser/process_internals/process_internals.mojom @@ -24,6 +24,9 @@ struct SiteInstanceInfo { // false otherwise. bool requires_origin_keyed_process; + // Specifies if the SiteInstance is for sandboxed iframe isolation. + bool is_sandboxed; + // Specifies whether this SiteInstance is for a <webview> guest. bool is_guest; diff --git a/content/browser/process_internals/process_internals_handler_impl.cc b/content/browser/process_internals/process_internals_handler_impl.cc index e24e68e02a713..0bb4c3f2e8c73 100644 --- a/content/browser/process_internals/process_internals_handler_impl.cc +++ b/content/browser/process_internals/process_internals_handler_impl.cc @@ -57,6 +57,8 @@ using IsolatedOriginSource = ChildProcessSecurityPolicy::IsolatedOriginSource; ? absl::make_optional(site_instance->GetSiteInfo().site_url()) : absl::nullopt; frame_info->site_instance->is_guest = site_instance->IsGuest(); + frame_info->site_instance->is_sandboxed = + site_instance->GetSiteInfo().is_sandboxed(); // If the SiteInstance has a non-default StoragePartition, include a basic // string representation of it. Skip cases where the StoragePartition is diff --git a/content/browser/resources/process/process_internals.ts b/content/browser/resources/process/process_internals.ts index c97d265940c60..645dd93f0b6f5 100644 --- a/content/browser/resources/process/process_internals.ts +++ b/content/browser/resources/process/process_internals.ts @@ -113,6 +113,9 @@ function frameToTreeItem(frame: FrameInfo): if (frame.siteInstance.requiresOriginKeyedProcess) { itemLabel += ', origin-keyed'; } + if (frame.siteInstance.isSandboxed) { + itemLabel += ', iframe-sandbox'; + } if (frame.siteInstance.isGuest) { itemLabel += ', guest'; }