Question: For help, type help. Type apropos word to search for commands related to word... Reading symbols from bomb...done. ( gdb ) disass phase _ 3

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from bomb...done.
(gdb) disass phase_3
Dump of assembler code for function phase_3:
0x0000000000400f54<+0>: sub $0x18,%rsp
0x0000000000400f58<+4>: lea 0x8(%rsp),%r8
0x0000000000400f5d <+9>: lea 0x7(%rsp),%rcx
0x0000000000400f62<+14>: lea 0xc(%rsp),%rdx
0x0000000000400f67<+19>: mov $0x402596,%esi
0x0000000000400f6c <+24>: mov $0x0,%eax
0x0000000000400f71<+29>: callq 0x400c30<__isoc99_sscanf@plt>
0x0000000000400f76<+34>: cmp $0x2,%eax
0x0000000000400f79<+37>: jle 0x400f91
0x0000000000400f7b <+39>: cmpl $0x7,0xc(%rsp)
0x0000000000400f80<+44>: ja 0x401082
0x0000000000400f86<+50>: mov 0xc(%rsp),%eax
0x0000000000400f8a <+54>: jmpq *0x4025a0(,%rax,8)
0x0000000000400f91<+61>: callq 0x401606
0x0000000000400f96<+66>: jmp 0x400f7b
0x0000000000400f98<+68>: mov $0x6a,%eax
0x0000000000400f9d <+73>: cmpl $0xce,0x8(%rsp)
0x0000000000400fa5<+81>: je 0x40108c
0x0000000000400fab <+87>: callq 0x401606
0x0000000000400fb0<+92>: mov $0x6a,%eax
0x0000000000400fb5<+97>: jmpq 0x40108c
0x0000000000400fba <+102>: mov $0x75,%eax
0x0000000000400fbf <+107>: cmpl $0xb8,0x8(%rsp)
0x0000000000400fc7<+115>: je 0x40108c
0x0000000000400fcd <+121>: callq 0x401606
0x0000000000400fd2<+126>: mov $0x75,%eax
0x0000000000400fd7<+131>: jmpq 0x40108c
0x0000000000400fdc <+136>: mov $0x79,%eax
--Type for more, q to quit, c to continue without paging--
0x0000000000400fe1<+141>: cmpl $0x1fb,0x8(%rsp)
0x0000000000400fe9<+149>: je 0x40108c
0x0000000000400fef <+155>: callq 0x401606
0x0000000000400ff4<+160>: mov $0x79,%eax
0x0000000000400ff9<+165>: jmpq 0x40108c
0x0000000000400ffe <+170>: mov $0x79,%eax
0x0000000000401003<+175>: cmpl $0x379,0x8(%rsp)
0x000000000040100b <+183>: je 0x40108c
0x000000000040100d <+185>: callq 0x401606
0x0000000000401012<+190>: mov $0x79,%eax
0x0000000000401017<+195>: jmp 0x40108c
0x0000000000401019<+197>: mov $0x6c,%eax
0x000000000040101e <+202>: cmpl $0x72,0x8(%rsp)
0x0000000000401023<+207>: je 0x40108c
0x0000000000401025<+209>: callq 0x401606
0x000000000040102a <+214>: mov $0x6c,%eax
0x000000000040102f <+219>: jmp 0x40108c
0x00000000004010<

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!