From e99038ea514a8703b170689d5a0730c8d2e542e7 Mon Sep 17 00:00:00 2001 From: Kartik Agaram Date: Mon, 18 Feb 2019 22:43:01 -0800 Subject: 4982 --- html/subx/019functions.cc.html | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) (limited to 'html/subx/019functions.cc.html') diff --git a/html/subx/019functions.cc.html b/html/subx/019functions.cc.html index b8d3113f..ef8f791b 100644 --- a/html/subx/019functions.cc.html +++ b/html/subx/019functions.cc.html @@ -78,12 +78,12 @@ if ('onhashchange' in window) { 16 17 :(before "End Single-Byte Opcodes") 18 case 0xe8: { // call disp32 relative to next EIP -19 const int32_t offset = next32(); +19 const int32_t offset = next32(); 20 trace(90, "run") << "call imm32 0x" << HEXWORD << offset << end(); 21 //? cerr << "push: EIP: " << EIP << " => " << Reg[ESP].u << '\n'; -22 push(EIP); -23 EIP += offset; -24 trace(90, "run") << "jumping to 0x" << HEXWORD << EIP << end(); +22 push(EIP); +23 EIP += offset; +24 trace(90, "run") << "jumping to 0x" << HEXWORD << EIP << end(); 25 break; 26 } 27 @@ -106,9 +106,9 @@ if ('onhashchange' in window) { 44 case 2: { // call function pointer at r/m32 45 trace(90, "run") << "call to r/m32" << end(); 46 const int32_t* offset = effective_address(modrm); -47 push(EIP); -48 EIP += *offset; -49 trace(90, "run") << "jumping to 0x" << HEXWORD << EIP << end(); +47 push(EIP); +48 EIP += *offset; +49 trace(90, "run") << "jumping to 0x" << HEXWORD << EIP << end(); 50 break; 51 } 52 @@ -146,8 +146,8 @@ if ('onhashchange' in window) { 84 :(before "End Single-Byte Opcodes") 85 case 0xc3: { // return from a call 86 trace(90, "run") << "return" << end(); -87 EIP = pop(); -88 trace(90, "run") << "jumping to 0x" << HEXWORD << EIP << end(); +87 EIP = pop(); +88 trace(90, "run") << "jumping to 0x" << HEXWORD << EIP << end(); 89 break; 90 } -- cgit 1.4.1-2-gfad0