LPVOID hCallBack);
#endif // FEATURE_CONSERVATIVE_GC
+#ifdef _TARGET_X86_
/*
Return the address of the local security object reference
using data that was previously cached before in UnwindStackFrame
static OBJECTREF* GetAddrOfSecurityObjectFromCachedInfo(
PREGDISPLAY pRD,
StackwalkCacheUnwindInfo * stackwalkCacheUnwindInfo);
+#endif // _TARGET_X86_
virtual
OBJECTREF* GetAddrOfSecurityObject(CrawlFrame *pCF) DAC_UNEXPECTED();
#endif // _TARGET_X86_
+#ifdef _TARGET_X86_
/*****************************************************************************
*
* Return the address of the local security object reference
OBJECTREF* EECodeManager::GetAddrOfSecurityObjectFromCachedInfo(PREGDISPLAY pRD, StackwalkCacheUnwindInfo * stackwalkCacheUnwindInfo)
{
LIMITED_METHOD_CONTRACT;
-#ifdef _TARGET_X86_
size_t securityObjectOffset = stackwalkCacheUnwindInfo->securityObjectOffset;
+
_ASSERTE(securityObjectOffset != 0);
// We pretend that filters are ESP-based methods in UnwindEbpDoubleAlignFrame().
// Hence we cannot enforce this assert.
// _ASSERTE(stackwalkCacheUnwindInfo->fUseEbpAsFrameReg);
return (OBJECTREF *) (size_t) (*pRD->GetEbpLocation() - (securityObjectOffset * sizeof(void*)));
-#else
- PORTABILITY_ASSERT("EECodeManager::GetAddrOfSecurityObjectFromContext is not implemented on this platform.");
- return NULL;
-#endif
}
+#endif // _TARGET_X86_
#ifndef DACCESS_COMPILE
OBJECTREF* EECodeManager::GetAddrOfSecurityObject(CrawlFrame *pCF)