mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-10 03:45:46 +00:00
Bug 1641605 - Install SIGXCPU handler even if sandbox is disabled. r=padenot
Differential Revision: https://phabricator.services.mozilla.com/D78019
This commit is contained in:
parent
6c79722f7c
commit
0b099d0b0e
@ -1620,18 +1620,17 @@ mozilla::ipc::IPCResult ContentChild::RecvSetProcessSandbox(
|
||||
bool sandboxEnabled = true;
|
||||
# if defined(XP_LINUX)
|
||||
// On Linux, we have to support systems that can't use any sandboxing.
|
||||
if (!SandboxInfo::Get().CanSandboxContent()) {
|
||||
sandboxEnabled = false;
|
||||
} else {
|
||||
// Pre-start audio before sandboxing; see bug 1443612.
|
||||
if (StaticPrefs::media_cubeb_sandbox()) {
|
||||
if (atp_set_real_time_limit(0, 48000)) {
|
||||
NS_WARNING("could not set real-time limit at process startup");
|
||||
}
|
||||
InstallSoftRealTimeLimitHandler();
|
||||
} else {
|
||||
Unused << CubebUtils::GetCubebContext();
|
||||
sandboxEnabled = SandboxInfo::Get().CanSandboxContent();
|
||||
|
||||
if (StaticPrefs::media_cubeb_sandbox()) {
|
||||
// This needs to happen regardless of whether sandboxing is enabled.
|
||||
if (atp_set_real_time_limit(0, 48000)) {
|
||||
NS_WARNING("could not set real-time limit at process startup");
|
||||
}
|
||||
InstallSoftRealTimeLimitHandler();
|
||||
} else if (sandboxEnabled) {
|
||||
// Pre-start audio before sandboxing; see bug 1443612.
|
||||
Unused << CubebUtils::GetCubebContext();
|
||||
}
|
||||
|
||||
if (sandboxEnabled) {
|
||||
|
Loading…
Reference in New Issue
Block a user