Question: ( gdb ) disassemble phase _ 6 Dump of assembler code for function phase _ 6 : 0 x 0 0 0 0 0 0

(gdb) disassemble phase_6
Dump of assembler code for function phase_6:
0x00000000004010f7<+0>: push %r14
0x00000000004010f9<+2>: push %r13
0x00000000004010fb <+4>: push %r12
0x00000000004010fd <+6>: push %rbp
0x00000000004010fe <+7>: push %rbx
0x00000000004010ff <+8>: sub $0x50,%rsp
0x0000000000401103<+12>: lea0x30(%rsp),%rsi
0x0000000000401108<+17>: callq0x401300
0x000000000040110d <+22>: lea0x30(%rsp),%r12
0x0000000000401112<+27>: lea0x14(%r12),%r14
0x0000000000401117<+32>: mov $0x1,%r13d
0x000000000040111d <+38>: jmp0x401147
0x000000000040111f <+40>: callq0x4016cd
0x0000000000401124<+45>: jmp0x401156
0x0000000000401126<+47>: callq0x4016cd
0x000000000040112b <+52>: add $0x1,%rbx
0x000000000040112f <+56>: cmp $0x5,%ebx
0x0000000000401132<+59>: jg 0x40113f
0x0000000000401134<+61>: mov0x30(%rsp,%rbx,4),%eax
0x0000000000401138<+65>: cmp%eax,0x0(%rbp)
0x000000000040113b <+68>: jne0x40112b
0x000000000040113d <+70>: jmp0x401126
0x000000000040113f <+72>: add $0x1,%r13
0x0000000000401143<+76>: add $0x4,%r12
0x0000000000401147<+80>: mov%r12,%rbp
0x000000000040114a <+83>: mov(%r12),%eax
0x000000000040114e <+87>: sub $0x1,%eax
0x0000000000401151<+90>: cmp $0x5,%eax
0x0000000000401154<+93>: ja 0x40111f
0x0000000000401156<+95>: cmp%r14,%r12
0x0000000000401159<+98>: je 0x401160
0x000000000040115b <+100>: mov%r13,%rbx
0x000000000040115e <+103>: jmp0x401134
0x0000000000401160<+105>: mov $0x0,%esi
0x0000000000401165<+110>: mov0x30(%rsp,%rsi,4),%ecx
0x0000000000401169<+114>: mov $0x6042f0,%edx
0x000000000040116e <+119>: cmp $0x1,%ecx
0x0000000000401171<+122>: jle0x401188
0x0000000000401173<+124>: mov $0x1,%eax
0x0000000000401178<+129>: mov $0x6042f0,%edx
0x000000000040117d <+134>: mov0x8(%rdx),%rdx

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!