[test][x64] Test disassembly of indirect call again.

R=clemensb@chromium.org
TEST=cctest/test-disasm-x64/DisasmX64

Change-Id: I011d0d5e25c472c5a62ad73edd42165e55b34e2b
Reviewed-on: https://chromium-review.googlesource.com/c/v8/v8/+/1900460
Reviewed-by: Clemens Backes <clemensb@chromium.org>
Commit-Queue: Michael Starzinger <mstarzinger@chromium.org>
Cr-Commit-Position: refs/heads/master@{#64809}
This commit is contained in:
Michael Starzinger 2019-11-06 14:39:55 +01:00 committed by Commit Bot
parent 94a8519a9a
commit 330445cee4

View File

@ -282,13 +282,11 @@ TEST(DisasmX64) {
__ call(&L2);
__ nop();
__ bind(&L2);
// TODO(mstarzinger): The following is protected.
// __ call(Operand(rbx, rcx, times_4, 10000));
__ call(rcx);
__ nop();
Handle<Code> ic = BUILTIN_CODE(isolate, ArrayFrom);
__ call(ic, RelocInfo::CODE_TARGET);
__ nop();
__ nop();
__ jmp(&L1);
__ jmp(Operand(rbx, rcx, times_4, 10000));