Index: src/x87/assembler-x87.cc |
diff --git a/src/x87/assembler-x87.cc b/src/x87/assembler-x87.cc |
index 734825d2fae4a567ecff58b73b64091c75d25e94..8c3d8b8065e353713abc863c1aa5fc6881b2b881 100644 |
--- a/src/x87/assembler-x87.cc |
+++ b/src/x87/assembler-x87.cc |
@@ -102,37 +102,6 @@ bool RelocInfo::IsInConstantPool() { |
} |
-// Patch the code at the current PC with a call to the target address. |
-// Additional guard int3 instructions can be added if required. |
-void RelocInfo::PatchCodeWithCall(Address target, int guard_bytes) { |
- // Call instruction takes up 5 bytes and int3 takes up one byte. |
- static const int kCallCodeSize = 5; |
- int code_size = kCallCodeSize + guard_bytes; |
- |
- // Create a code patcher. |
- CodePatcher patcher(pc_, code_size); |
- |
-// Add a label for checking the size of the code used for returning. |
-#ifdef DEBUG |
- Label check_codesize; |
- patcher.masm()->bind(&check_codesize); |
-#endif |
- |
- // Patch the code. |
- patcher.masm()->call(target, RelocInfo::NONE32); |
- |
- // Check that the size of the code generated is as expected. |
- DCHECK_EQ(kCallCodeSize, |
- patcher.masm()->SizeOfCodeGeneratedSince(&check_codesize)); |
- |
- // Add the requested number of int3 instructions after the call. |
- DCHECK_GE(guard_bytes, 0); |
- for (int i = 0; i < guard_bytes; i++) { |
- patcher.masm()->int3(); |
- } |
-} |
- |
- |
// ----------------------------------------------------------------------------- |
// Implementation of Operand |