-
Pierre Langlois authored
We try and match literal load instructions in order to print a relocation info comment. However, we could be doing it while we're decoding a constant pool. This would cause a DCHECK to fire on Arm64 with full pointers. Change-Id: I82a523dc5c033f86f41467db75e43419ab87d5ca Reviewed-on: https://chromium-review.googlesource.com/c/v8/v8/+/2756532Reviewed-by: Santiago Aboy Solanes <solanes@chromium.org> Commit-Queue: Pierre Langlois <pierre.langlois@arm.com> Cr-Commit-Position: refs/heads/master@{#73429}
de516035