Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 0x0000000000400f49 <+0>: push %rbp
- 0x0000000000400f4a <+1>: push %rbx
- 0x0000000000400f4b <+2>: sub $0x28,%rsp
- 0x0000000000400f4f <+6>: mov %fs:0x28,%rax
- 0x0000000000400f58 <+15>: mov %rax,0x18(%rsp)
- 0x0000000000400f5d <+20>: xor %eax,%eax
- 0x0000000000400f5f <+22>: mov %rsp,%rsi
- 0x0000000000400f62 <+25>: callq 0x4016c6 <read_six_numbers>
- 0x0000000000400f67 <+30>: cmpl $0x0,(%rsp)
- 0x0000000000400f6b <+34>: jns 0x400f72 <phase_2+41>
- 0x0000000000400f6d <+36>: callq 0x401690 <explode_bomb>
- 0x0000000000400f72 <+41>: mov %rsp,%rbp
- 0x0000000000400f75 <+44>: mov $0x1,%ebx
- 0x0000000000400f7a <+49>: mov %ebx,%eax
- 0x0000000000400f7c <+51>: add 0x0(%rbp),%eax
- 0x0000000000400f7f <+54>: cmp %eax,0x4(%rbp)
- 0x0000000000400f82 <+57>: je 0x400f89 <phase_2+64>
- 0x0000000000400f84 <+59>: callq 0x401690 <explode_bomb>
- 0x0000000000400f89 <+64>: add $0x1,%ebx
- 0x0000000000400f8c <+67>: add $0x4,%rbp
- 0x0000000000400f90 <+71>: cmp $0x6,%ebx
- 0x0000000000400f93 <+74>: jne 0x400f7a <phase_2+49>
- 0x0000000000400f95 <+76>: mov 0x18(%rsp),%rax
- 0x0000000000400f9a <+81>: xor %fs:0x28,%rax
- 0x0000000000400fa3 <+90>: je 0x400faa <phase_2+97>
- 0x0000000000400fa5 <+92>: callq 0x400b90 <__stack_chk_fail@plt>
- 0x0000000000400faa <+97>: add $0x28,%rsp
- 0x0000000000400fae <+101>: pop %rbx
- 0x0000000000400faf <+102>: pop %rbp
- 0x0000000000400fb0 <+103>: retq
Add Comment
Please, Sign In to add comment