| Index: src/x87/assembler-x87.cc
|
| diff --git a/src/x87/assembler-x87.cc b/src/x87/assembler-x87.cc
|
| index 734825d2fae4a567ecff58b73b64091c75d25e94..8c3d8b8065e353713abc863c1aa5fc6881b2b881 100644
|
| --- a/src/x87/assembler-x87.cc
|
| +++ b/src/x87/assembler-x87.cc
|
| @@ -102,37 +102,6 @@ bool RelocInfo::IsInConstantPool() {
|
| }
|
|
|
|
|
| -// Patch the code at the current PC with a call to the target address.
|
| -// Additional guard int3 instructions can be added if required.
|
| -void RelocInfo::PatchCodeWithCall(Address target, int guard_bytes) {
|
| - // Call instruction takes up 5 bytes and int3 takes up one byte.
|
| - static const int kCallCodeSize = 5;
|
| - int code_size = kCallCodeSize + guard_bytes;
|
| -
|
| - // Create a code patcher.
|
| - CodePatcher patcher(pc_, code_size);
|
| -
|
| -// Add a label for checking the size of the code used for returning.
|
| -#ifdef DEBUG
|
| - Label check_codesize;
|
| - patcher.masm()->bind(&check_codesize);
|
| -#endif
|
| -
|
| - // Patch the code.
|
| - patcher.masm()->call(target, RelocInfo::NONE32);
|
| -
|
| - // Check that the size of the code generated is as expected.
|
| - DCHECK_EQ(kCallCodeSize,
|
| - patcher.masm()->SizeOfCodeGeneratedSince(&check_codesize));
|
| -
|
| - // Add the requested number of int3 instructions after the call.
|
| - DCHECK_GE(guard_bytes, 0);
|
| - for (int i = 0; i < guard_bytes; i++) {
|
| - patcher.masm()->int3();
|
| - }
|
| -}
|
| -
|
| -
|
| // -----------------------------------------------------------------------------
|
| // Implementation of Operand
|
|
|
|
|