0x4000000000000720 <gmon_initializer+48>: [BBB] nop.b 0x0 0x4000000000000721 <gmon_initializer+49>: (p08) br.cond.dpnt.few 0x4000000000000740 <gmon_initializer+80> 0x4000000000000722 <gmon_initializer+50>: br.call.sptk.many b0=0x4000000000000720 <gmon_initializer+48>;;
Most likely this means that you are looking at unlinked (i.e. unrelocated) code. Did you run objdump on a .o file? In this case, the actual call address is in the relocation. Try objdump -r and you will see a relocation for the address 0x4000000000000722 that contains the actual call target. Also try objdump -r -d.
--
Jim Wilson, GNU Tools Support, http://www.SpecifixInc.com