Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | diff --git a/gfx/cairo/cairo/src/cairo-pdf-operators.c b/gfx/cairo/cairo/src/cairo-pdf-operators.c |
michael@0 | 2 | --- a/gfx/cairo/cairo/src/cairo-pdf-operators.c |
michael@0 | 3 | +++ b/gfx/cairo/cairo/src/cairo-pdf-operators.c |
michael@0 | 4 | @@ -480,6 +480,12 @@ _cairo_pdf_operators_clip (cairo_pdf_ope |
michael@0 | 5 | const char *pdf_operator; |
michael@0 | 6 | cairo_status_t status; |
michael@0 | 7 | |
michael@0 | 8 | + if (pdf_operators->in_text_object) { |
michael@0 | 9 | + status = _cairo_pdf_operators_end_text (pdf_operators); |
michael@0 | 10 | + if (unlikely (status)) |
michael@0 | 11 | + return status; |
michael@0 | 12 | + } |
michael@0 | 13 | + |
michael@0 | 14 | if (! path->has_current_point) { |
michael@0 | 15 | /* construct an empty path */ |
michael@0 | 16 | _cairo_output_stream_printf (pdf_operators->stream, "0 0 m "); |