address | instruction | %rax | %rcx | %rdx | %rdi | %r12 | %r14 | %r15 | rflags | cs |
---|---|---|---|---|---|---|---|---|---|---|
0xffffffff80000000 |
0xffffffffffffffff |
0xffffffffffffffff |
0x0000000000000000 |
0x0000000000000017 |
0xffffffffffffffff |
0x8000000000000000 |
0x000000000000002b |
|||
0x1066ccb36 <+12534> |
movq %r15, %rax |
0x8000000000000000 |
||||||||
0x1066ccb39 <+12537> |
addq $0x80, %rax |
0x8000000000000080 |
0x0000000000000282 |
|||||||
0x1066ccb3f <+12543> |
movq %r14, %rcx |
0xffffffffffffffff |
||||||||
0x1066ccb42 <+12546> |
adcq $0x0, %rcx |
0xffffffffffffffff |
0x0000000000000286 |
|||||||
0x1066ccb46 <+12550> |
cmpq $0x100, %rax |
0x0000000000000a02 |
||||||||
0x1066ccb4c <+12556> |
sbbq $0x0, %rcx |
0xffffffffffffffff |
0x0000000000000286 |
|||||||
0x1066ccb50 <+12560> |
jae 0x1066ccbbf |
0x0000000000000286 |
||||||||
... | ... | ... | ... | ... | ... | ... | ... | ... | ... | ... |
0x1066ccbbf <+12671> |
movq %r15, %rcx |
0x8000000000000000 |
||||||||
0x1066ccbc2 <+12674> |
addq $0x8000, %rcx |
0x8000000000008000 |
||||||||
0x1066ccbc9 <+12681> |
movq %r14, %rdx |
0xffffffffffffffff |
||||||||
0x1066ccbcc <+12684> |
adcq $0x0, %rdx |
0xffffffffffffffff |
||||||||
0x1066ccbd0 <+12688> |
movb $0x1, %al |
0x8000000000000001 |
||||||||
0x1066ccbd2 <+12690> |
cmpq $0x10000, %rcx |
0x0000000000000a06 |
||||||||
0x1066ccbd9 <+12697> |
sbbq $0x0, %rdx |
0xffffffffffffffff |
0x0000000000000286 |
|||||||
0x1066ccbdd <+12701> |
jb 0x1066ccbfd |
|||||||||
0x1066ccbdf <+12703> |
movl $0x80000000, %eax |
0x0000000080000000 |
||||||||
0x1066ccbe4 <+12708> |
addq %rax, %r15 |
0x8000000080000000 |
||||||||
0x1066ccbe7 <+12711> |
adcq $0x0, %r14 |
0xffffffffffffffff |
||||||||
0x1066ccbeb <+12715> |
shrdq $0x20, %r14, %r15 |
0xffffffff80000000 |
0x0000000000000287 |
|||||||
0x1066ccbf0 <+12720> |
shrq $0x20, %r14 |
0x00000000ffffffff |
0x0000000000000a07 |
|||||||
0x1066ccbf4 <+12724> |
orq %r15, %r14 |
0xffffffffffffffff |
0x0000000000000286 |
|||||||
0x1066ccbf7 <+12727> |
movb $0x2, %al |
0x0000000080000002 |
||||||||
0x1066ccbf9 <+12729> |
je 0x1066ccbfd |
0x0000000080000002 |
||||||||
0x1066ccbfb <+12731> |
movb $0x4, %al |
0x0000000080000004 |
-
-
Save pnkfelix/9c0f225d014be9536cac5069d7e137c0 to your computer and use it in GitHub Desktop.
mal-optimized instruction invocation
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment