Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-*/
2 /* vim: set ts=2 sw=2 et tw=79: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
5 * You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #ifndef mozilla_dom_NonRefcountedDOMObject_h__
8 #define mozilla_dom_NonRefcountedDOMObject_h__
10 #include "nsISupportsImpl.h"
12 namespace mozilla {
13 namespace dom {
15 // Natives for DOM classes with 'owned' as the value for nativeOwnership in
16 // Bindings.conf need to inherit from this class.
17 // If you're seeing objects of this class leak then natives for one of the DOM
18 // classes with 'owned' as the value for nativeOwnership in Bindings.conf is
19 // leaking. If the native for that class has MOZ_COUNT_CTOR/DTOR in its
20 // constructor/destructor then it should show up in the leak log too.
21 class NonRefcountedDOMObject
22 {
23 protected:
24 NonRefcountedDOMObject()
25 {
26 MOZ_COUNT_CTOR(NonRefcountedDOMObject);
27 }
28 ~NonRefcountedDOMObject()
29 {
30 MOZ_COUNT_DTOR(NonRefcountedDOMObject);
31 }
32 };
34 } // namespace dom
35 } // namespace mozilla
37 #endif /* mozilla_dom_NonRefcountedDOMObject_h__ */