Very cool! Lots of food for thought.

There are different trade offs going on

Use ram hidey hole(s), or not as you mention
Using short branch or long branch
Protecting listability by avoiding bytes < 32
What registers to protect and which to assume come out damaged
Cycles required for a reljmp/relbranch
Code bytes consumed by branch code

— John.

Reply via email to