Index: src/ia32/assembler-ia32.cc |
diff --git a/src/ia32/assembler-ia32.cc b/src/ia32/assembler-ia32.cc |
index bef99d1fb6bd0d877c7661a0eca6581096bb4104..0d0c4ae42802b8b7ec28ebc748ef5f0cca792895 100644 |
--- a/src/ia32/assembler-ia32.cc |
+++ b/src/ia32/assembler-ia32.cc |
@@ -187,37 +187,6 @@ bool RelocInfo::IsInConstantPool() { |
} |
-// Patch the code at the current PC with a call to the target address. |
-// Additional guard int3 instructions can be added if required. |
-void RelocInfo::PatchCodeWithCall(Address target, int guard_bytes) { |
- // Call instruction takes up 5 bytes and int3 takes up one byte. |
- static const int kCallCodeSize = 5; |
- int code_size = kCallCodeSize + guard_bytes; |
- |
- // Create a code patcher. |
- CodePatcher patcher(pc_, code_size); |
- |
- // Add a label for checking the size of the code used for returning. |
-#ifdef DEBUG |
- Label check_codesize; |
- patcher.masm()->bind(&check_codesize); |
-#endif |
- |
- // Patch the code. |
- patcher.masm()->call(target, RelocInfo::NONE32); |
- |
- // Check that the size of the code generated is as expected. |
- DCHECK_EQ(kCallCodeSize, |
- patcher.masm()->SizeOfCodeGeneratedSince(&check_codesize)); |
- |
- // Add the requested number of int3 instructions after the call. |
- DCHECK_GE(guard_bytes, 0); |
- for (int i = 0; i < guard_bytes; i++) { |
- patcher.masm()->int3(); |
- } |
-} |
- |
- |
// ----------------------------------------------------------------------------- |
// Implementation of Operand |