Advertisement
Guest User

Untitled

a guest
Apr 24th, 2018
75
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.86 KB | None | 0 0
  1. Dump of assembler code for function main:
  2. 0x0000000000400660 <+0>: push rbp
  3. 0x0000000000400661 <+1>: push rbx
  4. 0x0000000000400662 <+2>: xor esi,esi
  5. 0x0000000000400664 <+4>: sub rsp,0x118
  6. 0x000000000040066b <+11>: mov rdi,QWORD PTR [rip+0x2009fe] # 0x601070 <stdout@@GLIBC_2.2.5>
  7. 0x0000000000400672 <+18>: mov rax,QWORD PTR fs:0x28
  8. 0x000000000040067b <+27>: mov QWORD PTR [rsp+0x108],rax
  9. 0x0000000000400683 <+35>: xor eax,eax
  10. 0x0000000000400685 <+37>: call 0x400600 <setbuf@plt>
  11. 0x000000000040068a <+42>: lea rdx,[rsp+0x7]
  12. 0x000000000040068f <+47>: xor eax,eax
  13. 0x0000000000400691 <+49>: mov ecx,0x101
  14. 0x0000000000400696 <+54>: mov rdi,rdx
  15. 0x0000000000400699 <+57>: rep stos BYTE PTR es:[rdi],al
  16. 0x000000000040069b <+59>: call 0x400640 <getpagesize@plt>
  17. 0x00000000004006a0 <+64>: neg eax
  18. 0x00000000004006a2 <+66>: xor r9d,r9d
  19. 0x00000000004006a5 <+69>: or r8d,0xffffffff
  20. 0x00000000004006a9 <+73>: mov ebx,eax
  21. 0x00000000004006ab <+75>: mov ecx,0x22
  22. 0x00000000004006b0 <+80>: mov edx,0x7
  23. 0x00000000004006b5 <+85>: and ebx,0x4096
  24. 0x00000000004006bb <+91>: xor edi,edi
  25. 0x00000000004006bd <+93>: movsxd rsi,ebx
  26. 0x00000000004006c0 <+96>: call 0x4005f0 <mmap@plt>
  27. 0x00000000004006c5 <+101>: mov edi,0x4008c4
  28. 0x00000000004006ca <+106>: mov rbp,rax
  29. 0x00000000004006cd <+109>: call 0x4005e0 <puts@plt>
  30. 0x00000000004006d2 <+114>: mov rdx,QWORD PTR [rip+0x2009a7] # 0x601080 <stdin@@GLIBC_2.2.5>
  31. 0x00000000004006d9 <+121>: mov esi,ebx
  32. 0x00000000004006db <+123>: mov rdi,rbp
  33. 0x00000000004006de <+126>: call 0x400620 <fgets@plt>
  34. 0x00000000004006e3 <+131>: mov rdi,QWORD PTR [rip+0x200996] # 0x601080 <stdin@@GLIBC_2.2.5>
  35. 0x00000000004006ea <+138>: call 0x400630 <fflush@plt>
  36. 0x00000000004006ef <+143>: mov rdx,rbp
  37. 0x00000000004006f2 <+146>: movzx eax,BYTE PTR [rdx]
  38. 0x00000000004006f5 <+149>: cmp al,0xa
  39. 0x00000000004006f7 <+151>: je 0x400712 <main+178>
  40. 0x00000000004006f9 <+153>: cmp BYTE PTR [rsp+rax*1+0x7],0x0
  41. 0x00000000004006fe <+158>: sete cl
  42. 0x0000000000400701 <+161>: add BYTE PTR [rsp+0x107],cl
  43. 0x0000000000400708 <+168>: inc rdx
  44. 0x000000000040070b <+171>: or BYTE PTR [rsp+rax*1+0x7],0x1
  45. 0x0000000000400710 <+176>: jmp 0x4006f2 <main+146>
  46. 0x0000000000400712 <+178>: cmp BYTE PTR [rsp+0x107],0x7
  47. 0x000000000040071a <+186>: jbe 0x40072d <main+205>
  48. 0x000000000040071c <+188>: mov edi,0x4008cf
  49. 0x0000000000400721 <+193>: call 0x4005e0 <puts@plt>
  50. 0x0000000000400726 <+198>: mov edi,0x1
  51. 0x000000000040072b <+203>: jmp 0x400731 <main+209>
  52. 0x000000000040072d <+205>: call rbp
  53. 0x000000000040072f <+207>: xor edi,edi
  54. 0x0000000000400731 <+209>: call 0x4005d0 <_exit@plt>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement