Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 --- a/gfx/cairo/cairo/src/cairo-quartz-font.c Wed Dec 23 14:17:44 2009 -0500
2 +++ b/gfx/cairo/cairo/src/cairo-quartz-font.c Wed Dec 23 20:45:00 2009 +0000
3 @@ -420,6 +420,16 @@ _cairo_quartz_init_glyph_metrics (cairo_
4 !CGFontGetGlyphBBoxesPtr (font_face->cgFont, &glyph, 1, &bbox))
5 goto FAIL;
7 + /* broken fonts like Al Bayan return incorrect bounds for some null characters,
8 + see https://bugzilla.mozilla.org/show_bug.cgi?id=534260 */
9 + if (unlikely (bbox.origin.x == -32767 &&
10 + bbox.origin.y == -32767 &&
11 + bbox.size.width == 65534 &&
12 + bbox.size.height == 65534)) {
13 + bbox.origin.x = bbox.origin.y = 0;
14 + bbox.size.width = bbox.size.height = 0;
15 + }
16 +
17 status = _cairo_matrix_compute_basis_scale_factors (&font->base.scale,
18 &xscale, &yscale, 1);
19 if (status)