Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this file, |
michael@0 | 3 | * You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | #ifndef RWLOCK_AUTO_ENTER_H |
michael@0 | 6 | #define RWLOCK_AUTO_ENTER_H |
michael@0 | 7 | |
michael@0 | 8 | #include "prrwlock.h" |
michael@0 | 9 | #include "mozilla/Assertions.h" |
michael@0 | 10 | |
michael@0 | 11 | class RwLockAutoEnterRead |
michael@0 | 12 | { |
michael@0 | 13 | public: |
michael@0 | 14 | RwLockAutoEnterRead(PRRWLock* aRwLock) |
michael@0 | 15 | : mRwLock(aRwLock) |
michael@0 | 16 | { |
michael@0 | 17 | MOZ_ASSERT(mRwLock); |
michael@0 | 18 | PR_RWLock_Rlock(mRwLock); |
michael@0 | 19 | } |
michael@0 | 20 | |
michael@0 | 21 | ~RwLockAutoEnterRead() |
michael@0 | 22 | { |
michael@0 | 23 | PR_RWLock_Unlock(mRwLock); |
michael@0 | 24 | } |
michael@0 | 25 | |
michael@0 | 26 | protected: |
michael@0 | 27 | PRRWLock* mRwLock; |
michael@0 | 28 | }; |
michael@0 | 29 | |
michael@0 | 30 | class RwLockAutoEnterWrite |
michael@0 | 31 | { |
michael@0 | 32 | public: |
michael@0 | 33 | RwLockAutoEnterWrite(PRRWLock* aRwLock) |
michael@0 | 34 | : mRwLock(aRwLock) |
michael@0 | 35 | { |
michael@0 | 36 | MOZ_ASSERT(mRwLock); |
michael@0 | 37 | PR_RWLock_Wlock(mRwLock); |
michael@0 | 38 | } |
michael@0 | 39 | |
michael@0 | 40 | ~RwLockAutoEnterWrite() |
michael@0 | 41 | { |
michael@0 | 42 | PR_RWLock_Unlock(mRwLock); |
michael@0 | 43 | } |
michael@0 | 44 | |
michael@0 | 45 | protected: |
michael@0 | 46 | PRRWLock* mRwLock; |
michael@0 | 47 | }; |
michael@0 | 48 | |
michael@0 | 49 | #endif // RWLOCK_AUTO_ENTER_H |