| Index: third_party/WebKit/Source/platform/image-decoders/ImageDecoder.cpp
|
| diff --git a/third_party/WebKit/Source/platform/image-decoders/ImageDecoder.cpp b/third_party/WebKit/Source/platform/image-decoders/ImageDecoder.cpp
|
| index 0b76d3326f24edabb38900dfff72e8440d417c42..e9f93aec0ae6f79b9f83bb2d1c95750586dce832 100644
|
| --- a/third_party/WebKit/Source/platform/image-decoders/ImageDecoder.cpp
|
| +++ b/third_party/WebKit/Source/platform/image-decoders/ImageDecoder.cpp
|
| @@ -381,12 +381,12 @@ void ImageDecoder::UpdateAggressivePurging(size_t index) {
|
| // As we decode we will learn the total number of frames, and thus total
|
| // possible image memory used.
|
|
|
| - const uint64_t frame_area = DecodedSize().Area();
|
| - const uint64_t frame_memory_usage = frame_area * 4; // 4 bytes per pixel
|
| - if (frame_memory_usage / 4 != frame_area) { // overflow occurred
|
| - purge_aggressively_ = true;
|
| - return;
|
| - }
|
| + const uint64_t frame_memory_usage =
|
| + DecodedSize().Area() * 4; // 4 bytes per pixel
|
| +
|
| + // This condition never fails in the current code. Our existing image decoders
|
| + // parse for the image size and SetFailed() if that size overflows
|
| + DCHECK_EQ(frame_memory_usage / 4, DecodedSize().Area());
|
|
|
| const uint64_t total_memory_usage = frame_memory_usage * index;
|
| if (total_memory_usage / frame_memory_usage != index) { // overflow occurred
|
|
|