Question: Dump of assembler code for function bombphase _ 4 : 0 x 0 0 0 0 0 0 0 0 0 0 4 0 1

Dump of assembler code for function bombphase_4:
0x0000000000401715<+0>: sub $0x278,%rsp
0x000000000040171c <+7>: mov%rdi,%rsi
0x000000000040171f <+10>: movl $0x0,0x4c(%rsp)
0x0000000000401727<+18>: movw $0x63a,0x40(%rsp)
0x000000000040172e <+25>: movw $0x96c,0x42(%rsp)
0x0000000000401735<+32>: movl $0x181dd183,0x44(%rsp)
0x000000000040173d <+40>: movb $0xb,0x48(%rsp)
0x0000000000401742<+45>: movl $0x56d52a01,0x50(%rsp)
0x000000000040174a <+53>: movzwl 0x40(%rsp),%eax
0x000000000040174f <+58>: add $0x263,%ax
0x0000000000401753<+62>: mov%ax,0x40(%rsp)
0x0000000000401758<+67>: lea0x30(%rsp),%rdi
0x000000000040175d <+72>: callq0x400f10
0x0000000000401762<+77>: movzwl 0x42(%rsp),%edx
0x0000000000401767<+82>: mov $0x0,%eax
0x000000000040176c <+87>: cmp $0x3f46,%dx
0x0000000000401771<+92>: je 0x40177f
0x0000000000401773<+94>: callq0x401e6f
0x0000000000401778<+99>: mov $0xffffffffb31769c2,%rax
0x000000000040177f <+106>: movzbl 0x48(%rsp),%edx
0x0000000000401784<+111>: cmp $0x56,%dl
0x0000000000401787<+114>: je 0x401795

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!