Advertisement
Guest User

Untitled

a guest
Oct 16th, 2019
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.88 KB | None | 0 0
  1. Dump of assembler code for function phase_3:
  2. => 0x0000000000401092 <+0>: sub $0x28,%rsp
  3. 0x0000000000401096 <+4>: mov %fs:0x28,%rax
  4. 0x000000000040109f <+13>: mov %rax,0x18(%rsp)
  5. 0x00000000004010a4 <+18>: xor %eax,%eax
  6.  
  7. //%rsp = 0x7fffffffdf80, (%rsp) = 0x004027a0
  8. 0x00000000004010a6 <+20>: lea 0x14(%rsp),%r8
  9. //%r8 = 0x7fffffffdf94, (%r8) = 0x00007fff
  10. 0x00000000004010ab <+25>: lea 0xf(%rsp),%rcx
  11. //%rcx = 0x7fffffffdf8f, (%rcx) = 0xffe09800
  12. 0x00000000004010b0 <+30>: lea 0x10(%rsp),%rdx
  13. //%rdx = 7fffffffdf90, (%rdx) = 0xffffe098
  14. 0x00000000004010b5 <+35>: mov $0x4029e3,%esi
  15. //%esi = 0x4029e3
  16. 0x00000000004010ba <+40>: callq 0x400d00 <__isoc99_sscanf@plt>
  17. // format=0x4029e3 "%d %c %d"
  18. // ans = 1 a 1
  19. 0x00000000004010bf <+45>: mov 0x14(%rsp),%edx
  20. 0x00000000004010c3 <+49>: mov %edx,%ecx
  21. 0x00000000004010c5 <+51>: shr $0x1f,%ecx
  22. 0x00000000004010c8 <+54>: add %ecx,%edx
  23. 0x00000000004010ca <+56>: sar %edx
  24. 0x00000000004010cc <+58>: mov %edx,0x14(%rsp)
  25. 0x00000000004010d0 <+62>: cmp $0x2,%eax
  26. 0x00000000004010d3 <+65>: jg 0x4010da <phase_3+72>
  27. 0x00000000004010d5 <+67>: callq 0x401a0a <explode_bomb>
  28. 0x00000000004010da <+72>: cmpl $0x7,0x10(%rsp)
  29. 0x00000000004010df <+77>: ja 0x4011e1 <phase_3+335>
  30. 0x00000000004010e5 <+83>: mov 0x10(%rsp),%eax
  31. 0x00000000004010e9 <+87>: jmpq *0x402a00(,%rax,8)
  32. 0x00000000004010f0 <+94>: mov $0x70,%eax
  33. 0x00000000004010f5 <+99>: cmpl $0xa65,0x14(%rsp)
  34. 0x00000000004010fd <+107>: je 0x4011eb <phase_3+345>
  35. 0x0000000000401103 <+113>: callq 0x401a0a <explode_bomb>
  36. 0x0000000000401108 <+118>: mov $0x70,%eax
  37. 0x000000000040110d <+123>: jmpq 0x4011eb <phase_3+345>
  38. 0x0000000000401112 <+128>: mov $0x71,%eax
  39. 0x0000000000401117 <+133>: cmpl $0xdba,0x14(%rsp)
  40. 0x000000000040111f <+141>: je 0x4011eb <phase_3+345>
  41. 0x0000000000401125 <+147>: callq 0x401a0a <explode_bomb>
  42. 0x000000000040112a <+152>: mov $0x71,%eax
  43. 0x000000000040112f <+157>: jmpq 0x4011eb <phase_3+345>
  44. 0x0000000000401134 <+162>: mov $0x6a,%eax
  45. 0x0000000000401139 <+167>: cmpl $0x50e,0x14(%rsp)
  46. 0x0000000000401141 <+175>: je 0x4011eb <phase_3+345>
  47. 0x0000000000401147 <+181>: callq 0x401a0a <explode_bomb>
  48. 0x000000000040114c <+186>: mov $0x6a,%eax
  49. 0x0000000000401151 <+191>: jmpq 0x4011eb <phase_3+345>
  50. 0x0000000000401156 <+196>: mov $0x74,%eax
  51. 0x000000000040115b <+201>: cmpl $0x149,0x14(%rsp)
  52. 0x0000000000401163 <+209>: je 0x4011eb <phase_3+345>
  53. 0x0000000000401169 <+215>: callq 0x401a0a <explode_bomb>
  54. 0x000000000040116e <+220>: mov $0x74,%eax
  55. 0x0000000000401173 <+225>: jmp 0x4011eb <phase_3+345>
  56. 0x0000000000401175 <+227>: mov $0x71,%eax
  57. 0x000000000040117a <+232>: cmpl $0xb91,0x14(%rsp)
  58. 0x0000000000401182 <+240>: je 0x4011eb <phase_3+345>
  59. 0x0000000000401184 <+242>: callq 0x401a0a <explode_bomb>
  60. 0x0000000000401189 <+247>: mov $0x71,%eax
  61. 0x000000000040118e <+252>: jmp 0x4011eb <phase_3+345>
  62. 0x0000000000401190 <+254>: mov $0x79,%eax
  63. 0x0000000000401195 <+259>: cmpl $0xe13,0x14(%rsp)
  64. 0x000000000040119d <+267>: je 0x4011eb <phase_3+345>
  65. 0x000000000040119f <+269>: callq 0x401a0a <explode_bomb>
  66. 0x00000000004011a4 <+274>: mov $0x79,%eax
  67. 0x00000000004011a9 <+279>: jmp 0x4011eb <phase_3+345>
  68. 0x00000000004011ab <+281>: mov $0x6b,%eax
  69. 0x00000000004011b0 <+286>: cmpl $0x3ca,0x14(%rsp)
  70. 0x00000000004011b8 <+294>: je 0x4011eb <phase_3+345>
  71. 0x00000000004011ba <+296>: callq 0x401a0a <explode_bomb>
  72. 0x00000000004011bf <+301>: mov $0x6b,%eax
  73. 0x00000000004011c4 <+306>: jmp 0x4011eb <phase_3+345>
  74. 0x00000000004011c6 <+308>: mov $0x64,%eax
  75. 0x00000000004011cb <+313>: cmpl $0x8ee,0x14(%rsp)
  76. 0x00000000004011d3 <+321>: je 0x4011eb <phase_3+345>
  77. 0x00000000004011d5 <+323>: callq 0x401a0a <explode_bomb>
  78. 0x00000000004011da <+328>: mov $0x64,%eax
  79. 0x00000000004011df <+333>: jmp 0x4011eb <phase_3+345>
  80. 0x00000000004011e1 <+335>: callq 0x401a0a <explode_bomb>
  81. 0x00000000004011e6 <+340>: mov $0x6b,%eax
  82. 0x00000000004011eb <+345>: cmp 0xf(%rsp),%al
  83. 0x00000000004011ef <+349>: je 0x4011f6 <phase_3+356>
  84. 0x00000000004011f1 <+351>: callq 0x401a0a <explode_bomb>
  85. 0x00000000004011f6 <+356>: mov 0x18(%rsp),%rax
  86. 0x00000000004011fb <+361>: xor %fs:0x28,%rax
  87. 0x0000000000401204 <+370>: je 0x40120b <phase_3+377>
  88. 0x0000000000401206 <+372>: callq 0x400c40 <__stack_chk_fail@plt>
  89. 0x000000000040120b <+377>: add $0x28,%rsp
  90. 0x000000000040120f <+381>: retq
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement