Index: third_party/tcmalloc/chromium/src/tcmalloc.cc |
diff --git a/third_party/tcmalloc/chromium/src/tcmalloc.cc b/third_party/tcmalloc/chromium/src/tcmalloc.cc |
index 118e40a09fdb44f2036949d4402e387817bf8cc4..4df8e3c3b51323f4210e54e81b144a55215a8027 100644 |
--- a/third_party/tcmalloc/chromium/src/tcmalloc.cc |
+++ b/third_party/tcmalloc/chromium/src/tcmalloc.cc |
@@ -116,6 +116,7 @@ |
#include "base/basictypes.h" // for int64 |
#include "base/commandlineflags.h" // for RegisterFlagValidator, etc |
#include "base/dynamic_annotations.h" // for RunningOnValgrind |
+#include "base/process/memory.h" // for UncheckedMalloc |
#include "base/spinlock.h" // for SpinLockHolder |
#include "central_freelist.h" // for CentralFreeListPadded |
#include "common.h" // for StackTrace, kPageShift, etc |
@@ -1719,6 +1720,16 @@ extern "C" PERFTOOLS_DLL_DECL size_t tc_malloc_size(void* ptr) __THROW { |
return MallocExtension::instance()->GetAllocatedSize(ptr); |
} |
+namespace base { |
willchan no longer on Chromium
2013/11/02 21:11:44
Ditto here on the layering violation.
|
+ |
+void* UncheckedMalloc(size_t size) { |
+ void* result = do_malloc(size); |
+ MallocHook::InvokeNewHook(result, size); |
+ return result; |
+} |
+ |
+} |
+ |
#endif // TCMALLOC_USING_DEBUGALLOCATION |
// --- Validation implementation with an extra mark ---------------------------- |