Question: Need help figuring out phase _ 6 input: Dump of assembler code for function phase _ 6 : = > 0 x 5 6 5

Need help figuring out phase_6 input: Dump of assembler code for function phase_6:
=>0x56557762<+0>: sub $0x1c,%esp
0x56557765<+3>: lea 0x8(%esp),%eax
0x56557769<+7>: push %eax
0x5655776a <+8>: lea 0x10(%esp),%eax
0x5655776e <+12>: push %eax
0x5655776f <+13>: push $0x56559409
0x56557774<+18>: push 0x2c(%esp)
0x56557778<+22>: call 0xf7daed00<__isoc99_sscanf>
0x5655777d <+27>: add $0x10,%esp
0x56557780<+30>: cmp $0x2,%eax
0x56557783<+33>: jne 0x5655778c
0x56557785<+35>: cmpl $0xe,0xc(%esp)
0x5655778a <+40>: jbe 0x56557791
0x5655778c <+42>: call 0x56557c9b
0x56557791<+47>: sub $0x4,%esp
0x56557794<+50>: push $0xe
0x56557796<+52>: push $0x0
0x56557798<+54>: push 0x18(%esp)
0x5655779c <+58>: call 0x56557709
0x565577a1<+63>: add $0x10,%esp
0x565577a4<+66>: cmp $0xd,%eax
0x565577a7<+69>: jne 0x565577b0
0x565577a9<+71>: cmpl $0xd,0x8(%esp)
0x565577ae <+76>: je 0x565577b5
0x565577b0<+78>: call 0x56557c9b
0x565577b5<+83>: add $0x1c,%esp
0x565577b8<+86>: ret
End of assembler dump.
Dump of assembler code for function __isoc99_sscanf:
=>0xf7daed00<+0>: endbr32
0xf7daed04<+4>: push %ebp
0xf7daed05<+5>: push %edi
0xf7daed06<+6>: push %esi
0xf7daed07<+7>: push %ebx
0xf7daed08<+8>: call 0xf7ec7df9
0xf7daed0d <+13>: add $0x1d12f3,%ebx
0xf7daed13<+19>: sub $0xc8,%esp
0xf7daed19<+25>: mov %gs:0x14,%eax
0xf7daed1f <+31>: mov %eax,0xb8(%esp)
0xf7daed26<+38>: xor %eax,%eax
0xf7daed28<+40>: mov 0xdc(%esp),%ebp
0xf7daed2f <+47>: mov 0xe0(%esp),%edi
0xf7daed36<+54>: movl $0x0,0x60(%esp)
0xf7daed3e <+62>: push $0x0
0xf7daed40<+64>: push $0x0
0xf7daed42<+66>: push $0xffffffff
0xf7daed44<+68>: push $0x8000
0xf7daed49<+73>: lea 0x28(%esp),%esi
0xf7daed4d <+77>: push %esi
0xf7daed4e <+78>: call 0xf7dd5fd0
0xf7daed53<+83>: lea -0x1540(%ebx),%eax
0xf7daed59<+89>: mov %eax,0xc0(%esp)
0xf7daed60<+96>: add $0x20,%esp
0xf7daed63<+99>: push $0x0
0xf7daed65<+101>: push $0x0
0xf7daed67<+103>: push %ebp
0xf7daed68<+104>: push %esi
0xf7daed69<+105>: call 0xf7dd7450
0xf7daed6e <+110>: lea 0xe8(%esp),%eax
0xf7daed75<+117>: push $0x2
0xf7daed77<+119>: push %eax
0xf7daed78<+120>: push %edi
0xf7daed79<+121>: push %esi
0xf7daed7a <+122>: call 0xf7daf450
0xf7daed7f <+127>: add $0x20,%esp
0xf7daed82<+130>: mov 0xac(%esp),%edx
0xf7daed89<+137>: sub %gs:0x14,%edx
0xf7daed90<+144>: jne 0xf7daed9d <__isoc99_sscanf+157>
0xf7daed92<+146>: add $0xbc,%esp
0xf7daed98<+152>: pop %ebx
0xf7daed99<+153>: pop %esi
0xf7daed9a <+154>: pop %edi
0xf7daed9b <+155>: pop %ebp
0xf7daed9c <+156>: ret
0xf7daed9d <+157>: call 0xf7e899f0<__stack_chk_fail>
End of assembler dump.
Dump of assembler code for function __stack_chk_fail:
0

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!