Commit 616ce253 authored by Igor Sheludko's avatar Igor Sheludko Committed by Commit Bot

[ptr-compr][arm64] Adapt disasm tests for disabled double field unboxing

Bug: v8:9799
Change-Id: I402133f6265f4a3129daef45615258d4a9b8f2f1
Reviewed-on: https://chromium-review.googlesource.com/c/v8/v8/+/1840154
Commit-Queue: Igor Sheludko <ishell@chromium.org>
Reviewed-by: 's avatarMichael Stanton <mvstanton@chromium.org>
Cr-Commit-Position: refs/heads/master@{#64106}
parent e1f3e43b
......@@ -189,7 +189,7 @@ TEST(DisasmPoisonMonomorphicLoadFloat64) {
"b.ne", // deopt if differ
"csel " + kPReg + ", xzr, " + kPReg + ", ne", // update the poison
"csdb", // spec. barrier
"ldursw <<F1:x[0-9]+>>, \\[<<Obj>>, #11\\]", // load field
"ldursw <<F1:x[0-9]+>>, \\[<<Obj>>, #11\\]", // load heap number
"add <<F1>>, x26, <<F1>>", // Decompress ref
"and <<F1>>, <<F1>>, " + kPReg, // apply the poison
"add <<Addr:x[0-9]+>>, <<F1>>, #0x[0-9a-f]+", // addr. calculation
......@@ -204,7 +204,13 @@ TEST(DisasmPoisonMonomorphicLoadFloat64) {
"b.ne", // deopt if differ
"csel " + kPReg + ", xzr, " + kPReg + ", ne", // update the poison
"csdb", // spec. barrier
#if V8_DOUBLE_FIELDS_UNBOXING
"add <<Addr:x[0-9]+>>, <<Obj>>, #0x[0-9a-f]+", // addr. calculation
#else
"ldur <<F1:x[0-9]+>>, \\[<<Obj>>, #23\\]", // load heap number
"and <<F1>>, <<F1>>, " + kPReg, // apply the poison
"add <<Addr:x[0-9]+>>, <<F1>>, #0x7", // addr. calculation
#endif
"and <<Addr>>, <<Addr>>, " + kPReg, // apply the poison
"ldr d[0-9]+, \\[<<Addr>>\\]", // load Float64
};
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment