Last active
March 23, 2016 21:56
-
-
Save m0wfo/16075149ec8b6310edba to your computer and use it in GitHub Desktop.
HotSpot-generated assembly for a volatile read
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
0x000000010d6895e3: jmpq 0x000000010d68963c ;*iload_3 | |
; - com.logentries.blog.VolatileClass::run@2 (line 13) | |
0x000000010d6895e8: vmovsd 0x10(%rsi),%xmm0 ; implicit exception: dispatches to 0x000000010d6897ce | |
0x000000010d6895ed: vmovq %xmm0,%rdx ;*getfield a | |
; - com.logentries.blog.VolatileClass::run@12 (line 14) | |
0x000000010d6895f2: inc %edi |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment