| Index: src/x64/assembler-x64.cc | 
| diff --git a/src/x64/assembler-x64.cc b/src/x64/assembler-x64.cc | 
| index 8969d89a6a75db3b8a021ea666db81cffb4c9033..f5939c3b7e1f1604d18528fe2cdd5d9481061132 100644 | 
| --- a/src/x64/assembler-x64.cc | 
| +++ b/src/x64/assembler-x64.cc | 
| @@ -164,7 +164,10 @@ void CpuFeatures::Probe() { | 
| // Patch the code at the current PC with a call to the target address. | 
| // Additional guard int3 instructions can be added if required. | 
| void RelocInfo::PatchCodeWithCall(Address target, int guard_bytes) { | 
| -  int code_size = Assembler::kCallSequenceLength + guard_bytes; | 
| +  // Load register with immediate 64 and call through a register instructions | 
| +  // takes up 13 bytes and int3 takes up one byte. | 
| +  static const int kCallCodeSize = 13; | 
| +  int code_size = kCallCodeSize + guard_bytes; | 
|  | 
| // Create a code patcher. | 
| CodePatcher patcher(pc_, code_size); | 
| @@ -180,7 +183,7 @@ void RelocInfo::PatchCodeWithCall(Address target, int guard_bytes) { | 
| patcher.masm()->call(r10); | 
|  | 
| // Check that the size of the code generated is as expected. | 
| -  ASSERT_EQ(Assembler::kCallSequenceLength, | 
| +  ASSERT_EQ(kCallCodeSize, | 
| patcher.masm()->SizeOfCodeGeneratedSince(&check_codesize)); | 
|  | 
| // Add the requested number of int3 instructions after the call. | 
|  |