Rizin
unix-like reverse engineering framework and cli tools
sparc-ctrl-instructions.s.cs
Go to the documentation of this file.
1 # CS_ARCH_SPARC, CS_MODE_BIG_ENDIAN, None
2 0x9f,0xc0,0x40,0x1a = call %g1+%i2
3 0x9f,0xc2,0x60,0x08 = call %o1+8
4 0x9f,0xc0,0x60,0x00 = call %g1
5 0x81,0xc0,0x40,0x1a = jmp %g1+%i2
6 0x81,0xc2,0x60,0x08 = jmp %o1+8
7 0x81,0xc0,0x60,0x00 = jmp %g1
8 0x85,0xc0,0x40,0x1a = jmpl %g1+%i2, %g2
9 0x85,0xc2,0x60,0x08 = jmpl %o1+8, %g2
10 0x85,0xc0,0x60,0x00 = jmpl %g1, %g2
11 0x81,0xcf,0xe0,0x08 = rett %i7+8
#define jmp
int call(int a, int b)
Definition: bcj_test.c:25