https://bugs.kde.org/show_bug.cgi?id=417187
--- Comment #7 from Stefan Maksimovic <stefan.maksimo...@rt-rk.com> --- Thank you for your reply, Julian. We pretty much agree with your analysis of the initial SB sequence as well as the first and second speculative disassembly. A note for the first speculative disassembly: you guessed correctly, the branch at 0x4013C0 does jump back to 0x4013BC. To be a bit more clear, the 16 bit offset of the bne instruction (0xFFFE signed, in this case) is left shifted 2 bits and added to the address following the branch, forming the target address of the jump. -- You are receiving this mail because: You are watching all bug changes.