However, in a report published on April 15, researchers at Ox Security claimed that a flaw in the protocol could enable ...
The compiler analyzed it, optimized it, and emitted precisely the machine instructions you expected. Same input, same output.