From 330445cee425eb8be30661512f9aeb5913497b4d Mon Sep 17 00:00:00 2001 From: Michael Starzinger Date: Wed, 6 Nov 2019 14:39:55 +0100 Subject: [PATCH] [test][x64] Test disassembly of indirect call again. R=clemensb@chromium.org TEST=cctest/test-disasm-x64/DisasmX64 Change-Id: I011d0d5e25c472c5a62ad73edd42165e55b34e2b Reviewed-on: https://chromium-review.googlesource.com/c/v8/v8/+/1900460 Reviewed-by: Clemens Backes Commit-Queue: Michael Starzinger Cr-Commit-Position: refs/heads/master@{#64809} --- test/cctest/test-disasm-x64.cc | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/test/cctest/test-disasm-x64.cc b/test/cctest/test-disasm-x64.cc index d1d32ce3f7..be85eb3f5c 100644 --- a/test/cctest/test-disasm-x64.cc +++ b/test/cctest/test-disasm-x64.cc @@ -282,13 +282,11 @@ TEST(DisasmX64) { __ call(&L2); __ nop(); __ bind(&L2); - // TODO(mstarzinger): The following is protected. - // __ call(Operand(rbx, rcx, times_4, 10000)); + __ call(rcx); __ nop(); Handle ic = BUILTIN_CODE(isolate, ArrayFrom); __ call(ic, RelocInfo::CODE_TARGET); __ nop(); - __ nop(); __ jmp(&L1); __ jmp(Operand(rbx, rcx, times_4, 10000));