| 网站首页 | 业界新闻 | 小组 | 威客 | 人才 | 下载频道 | 博客 | 代码贴 | 在线编程 | 编程论坛
欢迎加入我们,一同切磋技术
用户名:   
 
密 码:  
共有 1272 人关注过本帖
标题:求助关于 bomb lab 的问题
取消只看楼主 加入收藏
cirsumal
Rank: 1
等 级:新手上路
帖 子:1
专家分:0
注 册:2014-9-23
结帖率:0
收藏
已结贴  问题点数:20 回复次数:0 
求助关于 bomb lab 的问题
请问这个应该怎么解答?
程序代码:
Dump of assembler code for function phase_3:
=> 0x0000000000401174 <+0>:     sub    $0x18,%rsp
   0x0000000000401178 <+4>:     lea    0x7(%rsp),%rcx
   0x000000000040117d <+9>:     lea    0xc(%rsp),%rdx
   0x0000000000401182 <+14>:    lea    0x8(%rsp),%r8
   0x0000000000401187 <+19>:    mov    $0x40246e,%esi
   0x000000000040118c <+24>:    mov    $0x0,%eax
   0x0000000000401191 <+29>:    callq  0x400ac8 <__isoc99_sscanf@plt>
   0x0000000000401196 <+34>:    cmp    $0x2,%eax
   0x0000000000401199 <+37>:    jg     0x4011a0 <phase_3+44>
   0x000000000040119b <+39>:    callq  0x40149a <explode_bomb>
   0x00000000004011a0 <+44>:    cmpl   $0x7,0xc(%rsp)
   0x00000000004011a5 <+49>:    ja     0x40129a <phase_3+294>
   0x00000000004011ab <+55>:    mov    0xc(%rsp),%eax
   0x00000000004011af <+59>:    jmpq   *0x402480(,%rax,8)
   0x00000000004011b6 <+66>:    mov    $0x61,%eax
   0x00000000004011bb <+71>:    cmpl   $0x3cc,0x8(%rsp)
   0x00000000004011c3 <+79>:    je     0x4012ab <phase_3+311>
   0x00000000004011c9 <+85>:    callq  0x40149a <explode_bomb>
   0x00000000004011ce <+90>:    mov    $0x61,%eax
   0x00000000004011d3 <+95>:    jmpq   0x4012ab <phase_3+311>
   0x00000000004011d8 <+100>:   cmpl   $0x3d0,0x8(%rsp)
   0x00000000004011e0 <+108>:   je     0x4012a6 <phase_3+306>
   0x00000000004011e6 <+114>:   callq  0x40149a <explode_bomb>
   0x00000000004011eb <+119>:   mov    $0x70,%eax
   0x00000000004011f0 <+124>:   jmpq   0x4012ab <phase_3+311>
   0x00000000004011f5 <+129>:   mov    $0x6e,%eax
   0x00000000004011fa <+134>:   cmpl   $0x116,0x8(%rsp)
   0x0000000000401202 <+142>:   je     0x4012ab <phase_3+311>
   0x0000000000401208 <+148>:   callq  0x40149a <explode_bomb>
   0x000000000040120d <+153>:   mov    $0x6e,%eax
   0x0000000000401212 <+158>:   jmpq   0x4012ab <phase_3+311>
   0x0000000000401217 <+163>:   mov    $0x7a,%eax
   0x000000000040121c <+168>:   cmpl   $0x347,0x8(%rsp)
   0x0000000000401224 <+176>:   je     0x4012ab <phase_3+311>
   0x000000000040122a <+182>:   callq  0x40149a <explode_bomb>
   0x000000000040122f <+187>:   mov    $0x7a,%eax
   0x0000000000401234 <+192>:   jmp    0x4012ab <phase_3+311>
   0x0000000000401236 <+194>:   mov    $0x63,%eax
   0x000000000040123b <+199>:   cmpl   $0x261,0x8(%rsp)
   0x0000000000401243 <+207>:   je     0x4012ab <phase_3+311>
   0x0000000000401245 <+209>:   callq  0x40149a <explode_bomb>
   0x000000000040124a <+214>:   mov    $0x63,%eax
   0x000000000040124f <+219>:   jmp    0x4012ab <phase_3+311>
   0x0000000000401251 <+221>:   cmpl   $0x3b7,0x8(%rsp)
   0x0000000000401259 <+229>:   je     0x4012a6 <phase_3+306>
   0x000000000040125b <+231>:   callq  0x40149a <explode_bomb>
   0x0000000000401260 <+236>:   mov    $0x70,%eax
   0x0000000000401265 <+241>:   jmp    0x4012ab <phase_3+311>
   0x0000000000401267 <+243>:   mov    $0x77,%eax
   0x000000000040126c <+248>:   cmpl   $0x40,0x8(%rsp)
   0x0000000000401271 <+253>:   je     0x4012ab <phase_3+311>
   0x0000000000401273 <+255>:   callq  0x40149a <explode_bomb>
   0x0000000000401278 <+260>:   mov    $0x77,%eax
   0x000000000040127d <+265>:   jmp    0x4012ab <phase_3+311>
   0x000000000040127f <+267>:   mov    $0x74,%eax
   0x0000000000401284 <+272>:   cmpl   $0xef,0x8(%rsp)
   0x000000000040128c <+280>:   je     0x4012ab <phase_3+311>
   0x000000000040128e <+282>:   callq  0x40149a <explode_bomb>
   0x0000000000401293 <+287>:   mov    $0x74,%eax
   0x0000000000401298 <+292>:   jmp    0x4012ab <phase_3+311>
   0x000000000040129a <+294>:   callq  0x40149a <explode_bomb>
   0x000000000040129f <+299>:   mov    $0x62,%eax
   0x00000000004012a4 <+304>:   jmp    0x4012ab <phase_3+311>
   0x00000000004012a6 <+306>:   mov    $0x70,%eax
   0x00000000004012ab <+311>:   cmp    0x7(%rsp),%al
   0x00000000004012af <+315>:   je     0x4012b6 <phase_3+322>
   0x00000000004012b1 <+317>:   callq  0x40149a <explode_bomb>
   0x00000000004012b6 <+322>:   add    $0x18,%rsp
   0x00000000004012ba <+326>:   retq
搜索更多相关主题的帖子: function 
2014-09-23 12:15
快速回复:求助关于 bomb lab 的问题
数据加载中...
 
   



关于我们 | 广告合作 | 编程中国 | 清除Cookies | TOP | 手机版

编程中国 版权所有,并保留所有权利。
Powered by Discuz, Processed in 0.020861 second(s), 8 queries.
Copyright©2004-2024, BCCN.NET, All Rights Reserved