https://bugs.kde.org/show_bug.cgi?id=417187

--- Comment #7 from Stefan Maksimovic <stefan.maksimo...@rt-rk.com> ---
Thank you for your reply, Julian.

We pretty much agree with your analysis of the initial SB sequence as well as
the first and second speculative disassembly.

A note for the first speculative disassembly: you guessed correctly,
the branch at 0x4013C0 does jump back to 0x4013BC.

To be a bit more clear, the 16 bit offset of the bne instruction (0xFFFE
signed, in this case) is left shifted 2 bits and added to the address following
the branch, forming the target address of the jump.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to