Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this file, |
michael@0 | 3 | * You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | #include "Hal.h" |
michael@0 | 6 | |
michael@0 | 7 | using namespace mozilla::hal; |
michael@0 | 8 | |
michael@0 | 9 | namespace mozilla { |
michael@0 | 10 | namespace hal_impl { |
michael@0 | 11 | |
michael@0 | 12 | void |
michael@0 | 13 | SetProcessPriority(int aPid, |
michael@0 | 14 | ProcessPriority aPriority, |
michael@0 | 15 | ProcessCPUPriority aCPUPriority, |
michael@0 | 16 | uint32_t aBackgroundLRU) |
michael@0 | 17 | { |
michael@0 | 18 | HAL_LOG(("FallbackProcessPriority - SetProcessPriority(%d, %s, %u)\n", |
michael@0 | 19 | aPid, ProcessPriorityToString(aPriority, aCPUPriority), |
michael@0 | 20 | aBackgroundLRU)); |
michael@0 | 21 | } |
michael@0 | 22 | |
michael@0 | 23 | } // hal_impl |
michael@0 | 24 | } // namespace mozilla |