Guest User

Disassembler

a guest
Dec 27th, 2015
56
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.16 KB | None | 0 0
  1. 0x10114d999 cmpb $0x0, (%r15)
  2. 0x10114d99d <+0x0004> je 0x10114da05 # <+133>
  3. 0x10114d99f <+0x0006> movq %r15, %rdi
  4. 0x10114d9a2 <+0x0009> callq 0x1013fb4aa # symbol stub for: strlen
  5. 0x10114d9a7 <+0x000e> movq %rax, %r12
  6. 0x10114d9aa <+0x0011> leal 0x1(%r12), %r13d
  7. 0x10114d9af <+0x0016> movq (%r14), %rbx
  8. 0x10114d9b2 <+0x0019> movl 0x8(%rbx), %edx
  9. 0x10114d9b5 <+0x001c> cmpl $0x1, (%rbx)
  10. 0x10114d9b8 <+0x001f> ja 0x10114d9d3 # <+83>
  11. 0x10114d9ba <+0x0021> movl %edx, %eax
  12. 0x10114d9bc <+0x0023> andl $0x7fffffff, %eax
  13. 0x10114d9c1 <+0x0028> cmpl %eax, %r13d
  14. 0x10114d9c4 <+0x002b> ja 0x10114d9d3 # <+83>
  15. 0x10114d9c6 <+0x002d> cmpl 0x4(%rbx), %r12d
  16. 0x10114d9ca <+0x0031> jge 0x10114d9e4 # <+100>
  17. 0x10114d9cc <+0x0033> shrl %eax
  18. 0x10114d9ce <+0x0035> cmpl %eax, %r13d
  19. 0x10114d9d1 <+0x0038> jae 0x10114d9e4 # <+100>
  20. 0x10114d9d3 <+0x003a> shrl $0x1f, %edx
  21. 0x10114d9d6 <+0x003d> movq %r14, %rdi
  22. 0x10114d9d9 <+0x0040> movl %r13d, %esi
  23. 0x10114d9dc <+0x0043> callq 0x10114da70 # QByteArray::reallocData(unsigned int, QFlags<QArrayData::AllocationOption>)
  24. 0x10114d9e1 <+0x0048> movq (%r14), %rbx
  25. 0x10114d9e4 <+0x004b> movq 0x10(%rbx), %rdi
  26. 0x10114d9e8 <+0x004f> addq %rbx, %rdi
  27. 0x10114d9eb <+0x0052> movl %r13d, %edx
  28. 0x10114d9ee <+0x0055> movq %r15, %rsi
  29. 0x10114d9f1 <+0x0058> callq 0x1013fb270 # symbol stub for: memcpy
  30. 0x10114d9f6 <+0x005d> movl %r12d, 0x4(%rbx)
  31. 0x10114d9fa <+0x0061> jmp 0x10114da1b # <+155>
  32. 0x10114d9fc <+0x0063> leaq 0x2f1d0d(%rip), %rbx # QArrayData::shared_null
  33. 0x10114da03 <+0x006a> jmp 0x10114da1b # <+155>
  34. 0x10114da05 <+0x006c> movl $0x1, %edi
  35. 0x10114da0a <+0x0071> movl $0x8, %esi
  36. 0x10114da0f <+0x0076> xorl %edx, %edx
  37. 0x10114da11 <+0x0078> xorl %ecx, %ecx
  38. 0x10114da13 <+0x007a> callq 0x10114b5d0 # QArrayData::allocate(unsigned long, unsigned long, unsigned long, QFlags<QArrayData::AllocationOption>)
  39. 0x10114da18 <+0x007f> movq %rax, %rbx
  40. 0x10114da1b <+0x0082> movl (%rbx), %eax
  41. 0x10114da1d <+0x0084> incl %eax
  42. 0x10114da1f <+0x0086> cmpl $0x2, %eax
  43. 0x10114da22 <+0x0089> jb 0x10114da2c # <+172>
  44. 0x10114da24 <+0x008b> lock
  45. 0x10114da25 <+0x008c> addl $0x1, (%rbx)
  46. 0x10114da28 <+0x008f> setne -0x29(%rbp)
  47. 0x10114da2c <+0x0093> movq (%r14), %rdi
  48. 0x10114da2f <+0x0096> movl (%rdi), %eax
  49. 0x10114da31 <+0x0098> cmpl $-0x1, %eax
  50. 0x10114da34 <+0x009b> je 0x10114da5a # <+218>
  51. 0x10114da36 <+0x009d> testl %eax, %eax
  52. 0x10114da38 <+0x009f> je 0x10114da4b # <+203>
  53. 0x10114da3a <+0x00a1> lock
  54. 0x10114da3b <+0x00a2> subl $0x1, (%rdi)
  55. 0x10114da3e <+0x00a5> setne -0x2a(%rbp)
  56. 0x10114da42 <+0x00a9> cmpb $0x0, -0x2a(%rbp)
  57. 0x10114da46 <+0x00ad> jne 0x10114da5a # <+218>
  58. 0x10114da48 <+0x00af> movq (%r14), %rdi
  59. 0x10114da4b <+0x00b2> movl $0x1, %esi
  60. 0x10114da50 <+0x00b7> movl $0x8, %edx
  61. 0x10114da55 <+0x00bc> callq 0x10114b6d0 # QArrayData::deallocate(QArrayData*, unsigned long, unsigned long)
  62. 0x10114da5a <+0x00c1> movq %rbx, (%r14)
  63. 0x10114da5d <+0x00c4> movq %r14, %rax
  64. 0x10114da60 <+0x00c7> addq $0x8, %rsp
  65. 0x10114da64 <+0x00cb> popq %rbx
  66. 0x10114da65 <+0x00cc> popq %r12
  67. 0x10114da67 <+0x00ce> popq %r13
  68. 0x10114da69 <+0x00d0> popq %r14
  69. 0x10114da6b <+0x00d2> popq %r15
  70. 0x10114da6d <+0x00d4> popq %rbp
  71. 0x10114da6e <+0x00d5> retq
  72. 0x10114da6f <+0x00d6> nop
  73. 0x10114da70 <+0x00d7> pushq %rbp
  74. 0x10114da71 <+0x00d8> movq %rsp, %rbp
  75. 0x10114da74 <+0x00db> pushq %r15
  76. 0x10114da76 <+0x00dd> pushq %r14
  77. 0x10114da78 <+0x00df> pushq %r13
  78. 0x10114da7a <+0x00e1> pushq %r12
  79. 0x10114da7c <+0x00e3> pushq %rbx
  80. 0x10114da7d <+0x00e4> pushq %rax
  81. 0x10114da7e <+0x00e5> movl %edx, %r15d
  82. 0x10114da81 <+0x00e8> movl %esi, %ebx
  83. 0x10114da83 <+0x00ea> movq %rdi, %r14
  84. 0x10114da86 <+0x00ed> movq (%r14), %rax
  85. 0x10114da89 <+0x00f0> cmpl $0x1, (%rax)
  86. 0x10114da8c <+0x00f3> ja 0x10114dad0 # <+96>
  87. 0x10114da8e <+0x00f5> cmpq $0x18, 0x10(%rax)
  88. 0x10114da93 <+0x00fa> jne 0x10114dad0 # <+96>
  89. 0x10114da95 <+0x00fc> testb $0x8, %r15b
  90. 0x10114da99 <+0x0100> je 0x10114db56 # <+230>
  91. 0x10114da9f <+0x0106> cmpl $0x3fffffe8, %ebx
  92. 0x10114daa5 <+0x010c> jb 0x10114daac # <+60>
  93. 0x10114daa7 <+0x010e> callq 0x101133fc0 # qBadAlloc()
  94. 0x10114daac <+0x0113> addl $0x18, %ebx
  95. 0x10114daaf <+0x0116> movl $0xffffffe9, %r13d
  96. 0x10114dab5 <+0x011c> je 0x10114db59 # <+233>
  97. 0x10114dabb <+0x0122> bsrl %ebx, %ecx
  98. 0x10114dabe <+0x0125> movl $0x2, %r13d
  99. 0x10114dac4 <+0x012b> shll %cl, %r13d
  100. 0x10114dac7 <+0x012e> addl $-0x18, %r13d
Advertisement
Add Comment
Please, Sign In to add comment