csapp bomb lab详解

本文详细分析了CSAPP实验室中的爆破程序,涉及字符串比较、数值验证、字符串长度计算等多个环节。通过逐行解释汇编代码,揭示了各个阶段的解密逻辑,包括输入的限制、节点遍历和树结构计算等。解答了不同阶段的正确输入,如'边界关系从未如此和谐'、12481632、3256、'IONEFG'和432165,同时提到了秘密阶段的解密思路。
摘要由CSDN通过智能技术生成

如果觉得这里有不清楚的地方可以看看最后的参考博客,都很有参考价值

phase_1

answer: Border relations with Canada have never been better.

0000000000400ee0 <phase_1>:
  // 栈指针减8,存储返回地址。即phase_defused()的地址
  400ee0:	48 83 ec 08          	sub    $0x8,%rsp
  // %esi是第二个参数,即0x402400处存储的字符串
  // %rdi是第一个参数,即input
  400ee4:	be 00 24 40 00       	mov    $0x402400,%esi
  400ee9:	e8 4a 04 00 00       	callq   <strings_not_equal>
  // 将两个参数传入后,返回值若为零,则将栈指针归位,继续执行phase_defused(),否则,调用bomb程序,答案错误
  400eee:	85 c0                	test   %eax,%eax
  400ef0:	74 05                	je     400ef7 <phase_1+0x17>
  400ef2:	e8 43 05 00 00       	callq  40143a <explode_bomb>
  400ef7:	48 83 c4 08          	add    $0x8,%rsp
  400efb:	c3                   	retq   
0000000000401338 <strings_not_equal>:
  401338:	41 54                	push   %r12
  40133a:	55                   	push   %rbp
  40133b:	53                   	push   %rbx
  40133c:	48 89 fb             	mov    %rdi,%rbx
  40133f:	48 89 f5             	mov    %rsi,%rbp
  401342:	e8 d4 ff ff ff       	callq  40131b <string_length>
  401347:	41 89 c4             	mov    %eax,%r12d
  40134a:	48 89 ef             	mov    %rbp,%rdi
  40134d:	e8 c9 ff ff ff       	callq  40131b <string_length>
  401352:	ba 01 00 00 00       	mov    $0x1,%edx
  401357:	41 39 c4             	cmp    %eax,%r12d
  // 如果两个字符串长度不一样,返回1
  40135a:	75 3f                	jne    40139b <strings_not_equal+0x63>
  // 输入做零扩充传送到双字
  40135c:	0f b6 03             	movzbl (%rbx),%eax
  40135f:	84 c0                	test   %al,%al
  // %al存储的值为0时,跳到401388,最终返回0
  401361:	74 25                	je     401388 <strings_not_equal+0x50>
  // input和0x402400处第一个字节值相同时,进入到401372,判断下一个字节是否相同;否则,进入到40138f,最终返回1,bomb!注意这里0x0(%rbp)存储的是地址,%al存储的是值(参考40135c)
  401363:	3a 45 00             	cmp    0x0(%rbp),%al
  401366:	74 0a                	je     401372 <strings_not_equal+0x3a>
  401368:	eb 25                	jmp    40138f <strings_not_equal+0x57>
      
  40136a:	3a 45 00             	cmp    0x0(%rbp),%al
  40136d:	0f 1f 00             	nopl   (%rax)
  401370:	75 24                	jne    401396 <strings_not_equal+0x5e>
  401372:	48 83 c3 01          	add    $0x1,%rbx
  401376:	48 83 c5 01          	add    $0x1,%rbp
  40137a:	0f b6 03             	movzbl (%rbx),%eax
  40137d:	84 c0                	test   %al,%al
  // 逐个判断input的值和0x402400存储的值是否相同,直到input检测完,即%al为0时,退出循环,并返回0
  40137f:	75 e9                	jne    40136a <strings_not_equal+0x32>
      
  401381:	ba 00 00 00 00       	mov    $0x0,%edx
  401386:	eb 13                	jmp    40139b <strings_not_equal+0x63>
  401388:	ba 00 00 00 00       	mov    $0x0,%edx
  40138d:	eb 0c                	jmp    40139b <strings_not_equal+0x63>
  40138f:	ba 01 00 00 00       	mov    $0x1,%edx
  401394:	eb 05                	jmp    40139b <strings_not_equal+0x63>
  401396:	ba 01 00 00 00       	mov    $0x1,%edx
  40139b:	89 d0                	mov    %edx,%eax
  40139d:	5b                   	pop    %rbx
  40139e:	5d                   	pop    %rbp
  40139f:	41 5c                	pop    %r12
  4013a1:	c3                   	retq   
c版本:
  int strings_not_equal(string a){
      int length_a = string_length(a);
      int length_b = string_length((*0x402400));
      if (length_a != length_b) {
          return 1; //bomb!
      }
      if (length_a == 0) {
          return 0;
      }
      // 这里把input a 看作数组,0x402400存储的当作b,也看作数组
      int i = 0;
      while (a[i] != 0) {
          if (a[i] == b[i]) {
              i++;
          } else {
              return 1;
          }
      }
      return 0;
  }
000000000040131b <string_length>:
  40131b:	80 3f 00             	cmpb   $0x0,(%rdi)
  40131e:	74 12                	je     401332 <string_length+0x17>
  401320:	48 89 fa             	mov    %rdi,%rdx 
  401323:	48 83 c2 01          	add    $0x1,%rdx 
  401327:	89 d0                	mov    %edx,%eax 
  401329:	29 f8                	sub    %edi,%eax 
  40132b:	80 3a 00             	cmpb   $0x0,(%rdx) 
  40132e:	75 f3                	jne    401323 <string_length+0x8>
  401330:	f3 c3                	repz retq 
  401332:	b8 00 00 00 00       	mov    $0x0,%eax
  401337:	c3                   	retq   
c版本:
  int string_length(string a) {
      int *cur = a;
      int res;
      do {
          cur += 1; //参考csapp177页,p + i -> x_p + L * i
          res = cur;  
      } while((*(res - a) != 0))    
      return res;
  }

参考gdb手册可以看到以string形式打印特定地址处数据的指令为x/s,输入x/s 0x402400得到答案

Border relations with Canada have never been better.

也可以参考这个方法,通过打断点来分析程序,这也是lab建议的方法

phase_2:

answer: 1 2 4 8 16 32

0000000000400efc <phase_2>:
  400efc:	55                   	push   %rbp
  400efd:	53                   	push   %rbx
  400efe:	48 83 ec 28          	sub    $0x28,%rsp
  400f02:	48 89 e6             	mov    %rsp,%rsi
  
  400f05:	e8 52 05 00 00       	callq  40145c <read_six_numbers>
  400f0a:	83 3c 24 01          	cmpl   $0x1,(%rsp) //(%rsp),即输入的第一个数必须等于1,否则爆炸
  400f0e:	74 20                	je     400f30 <phase_2+0x34>
  400f10:	e8 25 05 00 00       	callq  40143a <explode_bomb>
  400f15:	eb 19                	jmp    400f30 <phase_2+0x34>
  400f17:	8b 43 fc             	mov    -0x4(%rbx),%eax // rbx -= 4 = rsp
  400f1a:	01 c0                	add    %eax,%eax       // eax += eax
  400f1c:	39 03                	cmp    %eax,(%rbx)     // 输入的第一个值的2倍和输入的第二个数比较
  400f1e:	74 05                	je     400f25 <phase_2+0x29> //必须相同,否则爆炸
  400f20:	e8 15 05 00 00       	callq  40143a <explode_bomb>
  400f25:	48 83 c3 04          	add    $0x4,%rbx
  400f29:	48 39 eb             	cmp    %rbp,%rbx
  400f2c:	75 e9                	jne    400f17 <phase_2+0x1b>
  400f2e:	eb 0c                	jmp    400f3c <phase_2+0x40>
  400f30:	48 8d 5c 24 04       	lea    0x4(%rsp),%rbx  // rbx = rsp + 4
  400f35:	48 8d 6c 24 18       	lea    0x18(%rsp),%rbp // rbp = rsp + 18
  400f3a:	eb db                	jmp    400f17 <phase_2+0x1b>
  400f3c:	48 83 c4 28          	add    $0x28,%rsp
  400f40:	5b                   	pop    %rbx
  400f41:	5d                   	pop    %rbp
  400f42:	c3                   	retq   
000000000040145c <read_six_numbers>:
  40145c:	48 83 ec 18          	sub    $0x18,%rsp
  // 为调用sscanf配置参数
  // rdx(%rsi),rcx(0x4(%rsi)),r8(0x8~),r9(c),(%rsp)(10),0x8(%rsp)(14)分别为input中6个整数的地址
  401460:	48 89 f2             	mov    %rsi,%rdx
  401463:	48 8d 4e 04          	lea    0x4(%rsi),%rcx
  401467:	48 8d 46 14          	lea    0x14(%rsi),%rax
  40146b:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  401470:	48 8d 46 10          	lea    0x10(%rsi),%rax
  401474:	48 89 04 24          	mov    %rax,(%rsp)
  401478:	4c 8d 4e 0c          	lea    0xc(%rsi),%r9
  40147c:	4c 8d 46 08          	lea    0x8(%rsi),%r8
  401480:	be c3 25 40 00       	mov    $0x4025c3,%esi //0x4025c3:"%d %d %d %d %d %d"
  401485:	b8 00 00 00 00       	mov    $0x0,%eax
  40148a:	e8 61 f7 ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  40148f:	83 f8 05             	cmp    $0x5,%eax
  401492:	7f 05                	jg     401499 <read_six_numbers+0x3d>
  401494:	e8 a1 ff ff ff       	callq  40143a <explode_bomb>
  401499:	48 83 c4 18          	add    $0x18,%rsp
  40149d:	c3                   	retq   
int sscanf(const char *buffer, const char *format, [argument]...)

其中,buffer是输入的字符串,format是字符串的格式,argument是根据format提取出来的内容保存的位置,而该函数的返回值为格式化参数的数目。

phase_3:

answer(不唯一): 3 256

0000000000400f43 <phase_3>:
  400f43:	48 83 ec 18          	sub    $0x18,%rsp
  // 输入两个数的地址以此为0x8(%rsp),0xc(%rsp)
  400f47:	48 8d 4c 24 0c       	lea    0xc(%rsp),%rcx
  400f4c:	48 8d 54 24 08       	lea    0x8(%rsp),%rdx
  400f51:	be cf 25 40 00       	mov    $0x4025cf,%esi
  400f56:	b8 00 00 00 00       	mov    $0x0,%eax
  400f5b:	e8 90 fc ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  400f60:	83 f8 01             	cmp    $0x1,%eax
  400f63:	7f 05                	jg     400f6a <phase_3+0x27>
  400f65:	e8 d0 04 00 00       	callq  40143a <explode_bomb>
  400f6a:	83 7c 24 08 07       	cmpl   $0x7,0x8(%rsp)
  400f6f:	77 3c                	ja     400fad <phase_3+0x6a>
  400f71:	8b 44 24 08          	mov    0x8(%rsp),%eax
  // switch语句,起始地址为0x402470,假设输入3,则地址为0x402488,查询此处的值
  // (gdb) x/x 0x402488
  // 0x402488:       0x00400f8a
  // 查看0x00400f8a,返回值为0x100,即256
  400f75:	ff 24 c5 70 24 40 00 	jmpq   *0x402470(,%rax,8)
  400f7c:	b8 cf 00 00 00       	mov    $0xcf,%eax
  400f81:	eb 3b                	jmp    400fbe <phase_3+0x7b>
  400f83:	b8 c3 02 00 00       	mov    $0x2c3,%eax
  400f88:	eb 34                	jmp    400fbe <phase_3+0x7b>

  400f8a:	b8 00 01 00 00       	mov    $0x100,%eax
  400f8f:	eb 2d                	jmp    400fbe <phase_3+0x7b>
  400f91:	b8 85 01 00 00       	mov    $0x185,%eax
  400f96:	eb 26                	jmp    400fbe <phase_3+0x7b>
  400f98:	b8 ce 00 00 00       	mov    $0xce,%eax
  400f9d:	eb 1f                	jmp    400fbe <phase_3+0x7b>
  400f9f:	b8 aa 02 00 00       	mov    $0x2aa,%eax
  400fa4:	eb 18                	jmp    400fbe <phase_3+0x7b>
  400fa6:	b8 47 01 00 00       	mov    $0x147,%eax
  400fab:	eb 11                	jmp    400fbe <phase_3+0x7b>
  400fad:	e8 88 04 00 00       	callq  40143a <explode_bomb>
  400fb2:	b8 00 00 00 00       	mov    $0x0,%eax
  400fb7:	eb 05                	jmp    400fbe <phase_3+0x7b>
  400fb9:	b8 37 01 00 00       	mov    $0x137,%eax
  // 跳转到此处,要求0xc(%rsp)和%eax值相同才不会爆炸,因此0xc(%rsp)值为256
  400fbe:	3b 44 24 0c          	cmp    0xc(%rsp),%eax
  400fc2:	74 05                	je     400fc9 <phase_3+0x86>
  400fc4:	e8 71 04 00 00       	callq  40143a <explode_bomb>
  400fc9:	48 83 c4 18          	add    $0x18,%rsp
  400fcd:	c3                   	retq  

故输入为3 256

当然随着输入的第一个数不同,也会有其他组合

phase_4:

answer: 7 0

000000000040100c <phase_4>:
  40100c:	48 83 ec 18          	sub    $0x18,%rsp
  401010:	48 8d 4c 24 0c       	lea    0xc(%rsp),%rcx
  401015:	48 8d 54 24 08       	lea    0x8(%rsp),%rdx
  40101a:	be cf 25 40 00       	mov    $0x4025cf,%esi
  40101f:	b8 00 00 00 00       	mov    $0x0,%eax
  401024:	e8 c7 fb ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  401029:	83 f8 02             	cmp    $0x2,%eax
  40102c:	75 07                	jne    401035 <phase_4+0x29>
  // 要求0x8(%rsp)存储的值小于0xe
  40102e:	83 7c 24 08 0e       	cmpl   $0xe,0x8(%rsp)
  401033:	76 05                	jbe    40103a <phase_4+0x2e>
  401035:	e8 00 04 00 00       	callq  40143a <explode_bomb>
  40103a:	ba 0e 00 00 00       	mov    $0xe,%edx
  40103f:	be 00 00 00 00       	mov    $0x0,%esi
  401044:	8b 7c 24 08          	mov    0x8(%rsp),%edi
  401048:	e8 81 ff ff ff       	callq  400fce <func4>
  40104d:	85 c0                	test   %eax,%eax
  // 要求返回值必须为0
  40104f:	75 07                	jne    401058 <phase_4+0x4c>
  // 要求0xc(%rsp)存储值0
  401051:	83 7c 24 0c 00       	cmpl   $0x0,0xc(%rsp)
  401056:	74 05                	je     40105d <phase_4+0x51>
  401058:	e8 dd 03 00 00       	callq  40143a <explode_bomb>
  40105d:	48 83 c4 18          	add    $0x18,%rsp
  401061:	c3                   	retq  
0000000000400fce <func4>:
  400fce:	48 83 ec 08          	sub    $0x8,%rsp
  400fd2:	89 d0                	mov    %edx,%eax
  400fd4:	29 f0                	sub    %esi,%eax
  400fd6:	89 c1                	mov    %eax,%ecx
  400fd8:	c1 e9 1f             	shr    $0x1f,%ecx
  400fdb:	01 c8                	add    %ecx,%eax
  400fdd:	d1 f8                	sar    %eax
  400fdf:	8d 0c 30             	lea    (%rax,%rsi,1),%ecx
  (1)
  400fe2:	39 f9                	cmp    %edi,%ecx
  400fe4:	7e 0c                	jle    400ff2 <func4+0x24>
  
  400fe6:	8d 51 ff             	lea    -0x1(%rcx),%edx
  400fe9:	e8 e0 ff ff ff       	callq  400fce <func4>
  400fee:	01 c0                	add    %eax,%eax
  400ff0:	eb 15                	jmp    401007 <func4+0x39>
  400ff2:	b8 00 00 00 00       	mov    $0x0,%eax
  (2)
  400ff7:	39 f9                	cmp    %edi,%ecx
  400ff9:	7d 0c                	jge    401007 <func4+0x39>
  // 注意要求返回为0,即0x400ff2之后不要再嵌套,而是直接到0x401007
  // (1)(2)下面的条件刚好相反,因此%edi,%ecx值相等时满足要求,即7
  // 因此%edi值为7,看到父函数mov 0x8(%rsp),%edi后调用,因此0x8(%rsp)存储7
  400ffb:	8d 71 01             	lea    0x1(%rcx),%esi
  400ffe:	e8 cb ff ff ff       	callq  400fce <func4>
  401003:	8d 44 00 01          	lea    0x1(%rax,%rax,1),%eax
  401007:	48 83 c4 08          	add    $0x8,%rsp
  40100b:	c3                   	retq 
对应的c:
    int func4(int a=arg1, int b=0, int c=14){
      if(c-b>=0){
        int ans=(c-b)/2;
      }else{
        int ans=(c-b+1)/2;
      }
      int temp1=ans+b;
      if(temp1-a<=0){
        int ans=0;
        if(temp1-a>=0){
          return ans;
        }else{
          b=temp1+1;
          int ans = func4(a,b,c);
          ans=ans*2+1;
          return ans;
        }
      }else{
        c = temp1-1;
        int ans = func4(a,b,c);
        return ans*2;
      }
    }

phase_5:

answer: IONEFG

0000000000401062 <phase_5>:
  401062:	53                   	push   %rbx
  401063:	48 83 ec 20          	sub    $0x20,%rsp
  401067:	48 89 fb             	mov    %rdi,%rbx
  40106a:	64 48 8b 04 25 28 00 	mov    %fs:0x28,%rax
  401071:	00 00 
  401073:	48 89 44 24 18       	mov    %rax,0x18(%rsp)
  401078:	31 c0                	xor    %eax,%eax
  40107a:	e8 9c 02 00 00       	callq  40131b <string_length>
  40107f:	83 f8 06             	cmp    $0x6,%eax
  401082:	74 4e                	je     4010d2 <phase_5+0x70>
  401084:	e8 b1 03 00 00       	callq  40143a <explode_bomb>
  401089:	eb 47                	jmp    4010d2 <phase_5+0x70>
  
  40108b:	0f b6 0c 03          	movzbl (%rbx,%rax,1),%ecx
  40108f:	88 0c 24             	mov    %cl,(%rsp)
  401092:	48 8b 14 24          	mov    (%rsp),%rdx
  401096:	83 e2 0f             	and    $0xf,%edx
  // 0x4024b0存储的字符串0x4024b0 <array.3449>:  "maduiersnfotvbylSo you think you can stop the bomb with ctrl-c, do you?"
  // %rdx的值可看作字符串索引,输入有六个,即6个索引
  401099:	0f b6 92 b0 24 40 00 	movzbl 0x4024b0(%rdx),%edx
  4010a0:	88 54 04 10          	mov    %dl,0x10(%rsp,%rax,1)
  4010a4:	48 83 c0 01          	add    $0x1,%rax
  4010a8:	48 83 f8 06          	cmp    $0x6,%rax
  4010ac:	75 dd                	jne    40108b <phase_5+0x29>
  4010ae:	c6 44 24 16 00       	movb   $0x0,0x16(%rsp)
  // 0x40245e:"flyers"与0x10(%rsp)存储的值一样,"flyers"通过将0x4024b0存储的字符串作为数组,%rdx(输入的6个字符)的后四位值作为索引查找得到。因此输入的后四位值分别为9,15,14,5,6,7,这里我们加上64,后四位不变,然后在下表中取值,得到IONEFG {言外之意时答案也可以是  )/.%&'  }
  4010b3:	be 5e 24 40 00       	mov    $0x40245e,%esi
  4010b8:	48 8d 7c 24 10       	lea    0x10(%rsp),%rdi
  4010bd:	e8 76 02 00 00       	callq  401338 <strings_not_equal>
  4010c2:	85 c0                	test   %eax,%eax
  4010c4:	74 13                	je     4010d9 <phase_5+0x77>
  4010c6:	e8 6f 03 00 00       	callq  40143a <explode_bomb>
  4010cb:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  4010d0:	eb 07                	jmp    4010d9 <phase_5+0x77>
  
  4010d2:	b8 00 00 00 00       	mov    $0x0,%eax
  4010d7:	eb b2                	jmp    40108b <phase_5+0x29>
  4010d9:	48 8b 44 24 18       	mov    0x18(%rsp),%rax
  4010de:	64 48 33 04 25 28 00 	xor    %fs:0x28,%rax
  4010e5:	00 00 
  4010e7:	74 05                	je     4010ee <phase_5+0x8c>
  4010e9:	e8 42 fa ff ff       	callq  400b30 <__stack_chk_fail@plt>
  4010ee:	48 83 c4 20          	add    $0x20,%rsp
  4010f2:	5b                   	pop    %rbx
  4010f3:	c3                   	retq   

image-20220908095641808

phase_6:

answer: 4 3 2 1 6 5

00000000004010f4 <phase_6>:
  4010f4:	41 56                	push   %r14
  4010f6:	41 55                	push   %r13
  4010f8:	41 54                	push   %r12
  4010fa:	55                   	push   %rbp
  4010fb:	53                   	push   %rbx
  4010fc:	48 83 ec 50          	sub    $0x50,%rsp
  401100:	49 89 e5             	mov    %rsp,%r13 //%r13=%rsp
  401103:	48 89 e6             	mov    %rsp,%rsi
  401106:	e8 51 03 00 00       	callq  40145c <read_six_numbers>
  
  40110b:	49 89 e6             	mov    %rsp,%r14  	    //%r14=%rsp
  40110e:	41 bc 00 00 00 00    	mov    $0x0,%r12d   	//%r12d=0x0
  
  // 要求输入的6个数都<=6
  401114:	4c 89 ed             	mov    %r13,%rbp 	    //%rbp=%r13
  401117:	41 8b 45 00          	mov    0x0(%r13),%eax   //eax = a1
  40111b:	83 e8 01             	sub    $0x1,%eax 	    //eax = a1-1
  40111e:	83 f8 05             	cmp    $0x5,%eax 	    //a1-1-5 = a1-6
  401121:	76 05                	jbe    401128 <phase_6+0x34>  //a1-6 <= 0 
  401123:	e8 12 03 00 00       	callq  40143a <explode_bomb>
  
  401128:	41 83 c4 01          	add    $0x1,%r12d	//%r12d += 1 = 1
  40112c:	41 83 fc 06          	cmp    $0x6,%r12d	//%cmp r12d - 6
  401130:	74 21                	je     401153 <phase_6+0x5f>  //== jmp 401153
  401132:	44 89 e3             	mov    %r12d,%ebx		//	%ebx = %r12d = 1
  401135:	48 63 c3             	movslq %ebx,%rax		//%rax = %ebx = 1
  401138:	8b 04 84            	mov    (%rsp,%rax,4),%eax//%eax=M(rsp+4*rax)=M(rsp+4)
  40113b:	39 45 00             	cmp    %eax,0x0(%rbp)	 //comp %rsp - %eax
  40113e:	75 05                	jne    401145 <phase_6+0x51> // != jmp 4001145
  401140:	e8 f5 02 00 00       	callq  40143a <explode_bomb>
  401145:	83 c3 01             	add    $0x1,%ebx	// %ebx += 1 = 2
  401148:	83 fb 05             	cmp    $0x5,%ebx	// comp %ebx - 5
  40114b:	7e e8                	jle    401135 <phase_6+0x41>	// <=0 jmp 401135
  40114d:	49 83 c5 04          	add    $0x4,%r13	//%r13 += 4
  401151:	eb c1                	jmp    401114 <phase_6+0x20>
  // 114-151的c代码:
  int r12d=0
  func (int a[6],int i=0 ){ //里面保存了我们的6个参数
  if(a[i]>6) bomb!
  r12d+=1;
  if (r12d=6){call 0x401153}
  int tmp=r12d;
  while(tmp<=5) {
    int c=tmp;
    int res=a[c];
    if(res==a[i]) bomb!;
    else{
      tmp+=1;
    }
  }
  func(a[6],i++);
}

上面就是说我们的参数都不能一样。并且每一个都不能大于6

  401153:	48 8d 74 24 18       	lea    0x18(%rsp),%rsi  //rsi =  rsp + 0x18
  401158:	4c 89 f0             	mov    %r14,%rax  //rax = rsp
  40115b:	b9 07 00 00 00       	mov    $0x7,%ecx  //ecx = 7
  401160:	89 ca                	mov    %ecx,%edx  //edx = 7
  401162:	2b 10                	sub    (%rax),%edx  // edx = 7 - a1 
  401164:	89 10                	mov    %edx,(%rax)  // eax = 7 - a1
  401166:	48 83 c0 04          	add    $0x4,%rax  //rax = rsp + 4
  40116a:	48 39 f0             	cmp    %rsi,%rax  //cmp  rsp+4 : esp+0x18
  40116d:	75 f1                	jne    401160 <phase_6+0x6c>
  c版本:
  int rsi=6;
  func(int i=0){
  a[i]=7-a[i];
  if(i!=6)func(i++);
}
  

上面相当于让ai=7-ai(i=1,2,3,4,5,6)

下面代码的执行顺序为(1) ->(2)->(3)->(4) 或者(A)->(B)->©,查看寄存器值时依此向上回溯

  (1) (A)
  40116f:	be 00 00 00 00       	mov    $0x0,%esi
  401174:	eb 21                	jmp    401197 <phase_6+0xa3>
  (3) 
  401176:	48 8b 52 08          	mov    0x8(%rdx),%rdx  // rdx=M(R[rdx]+8)=M(0x6032d8)
  40117a:	83 c0 01             	add    $0x1,%eax       //eax += 1 = 2
  40117d:	39 c8                	cmp    %ecx,%eax   //comp eax:a1
  40117f:	75 f5                	jne    401176 <phase_6+0x82>  //eax !=a1 jump
  401181:	eb 05                	jmp    401188 <phase_6+0x94>
      (C)a1==6跳转到这里
  401183:	ba d0 32 60 00       	mov    $0x6032d0,%edx
  (4) (D)
  // 可以看出对于ai=6,%edx = 0x6032d0
  // ai != 6,假设ai=1,%edx = 0x6032d8;ai=2,%edx = 0x6032e0
  401188:	48 89 54 74 20       	mov    %rdx,0x20(%rsp,%rsi,2)  //m[%rsp+20]=rdx
  40118d:	48 83 c6 04          	add    $0x4,%rsi  //rsi += 4 = 4
  401191:	48 83 fe 18          	cmp    $0x18,%rsi  // comp rsi : 0x18
  401195:	74 14                	je     4011ab <phase_6+0xb7>
  (2) (B)
  401197:	8b 0c 34             	mov    (%rsp,%rsi,1),%ecx // ecx = M(rsp+rsi) = 7-a1
  40119a:	83 f9 01             	cmp    $0x1,%ecx  // comp a1 : 1
  40119d:	7e e4                	jle    401183 <phase_6+0x8f>  //即7-a1<=1 => a1=6 jump
  // ai < 6 继续执行
  40119f:	b8 01 00 00 00       	mov    $0x1,%eax  //eax = 1
  4011a4:	ba d0 32 60 00       	mov    $0x6032d0,%edx  // edx = 0x6032d0 
  4011a9:	eb cb                	jmp    401176 <phase_6+0x82>

从401176可以看到,对于ai = 6,edx = 0x6032d0;对于ai = 1,edx = M(0x6032d0+8)=0x006032e0…

(gdb) x/4w 0x6032d0
0x6032d0 <node1>:       0x0000014c      0x00000001      0x006032e0      0x00000000
(gdb) x/4w 0x6032d8
0x6032d8 <node1+8>:     0x006032e0      0x00000000      0x000000a8      0x00000002
(gdb) x/4w 0x6032e0
0x6032e0 <node2>:       0x000000a8      0x00000002      0x006032f0      0x00000000
(gdb) x/4w 0x6032e8
0x6032e8 <node2+8>:     0x006032f0      0x00000000      0x0000039c      0x00000003
(gdb) x/4w 0x6032f0
0x6032f0 <node3>:       0x0000039c      0x00000003      0x00603300      0x00000000
(gdb) x/4w 0x6032f8
0x6032f8 <node3+8>:     0x00603300      0x00000000      0x000002b3      0x00000004
(gdb) x/4w 0x603300
0x603300 <node4>:       0x000002b3      0x00000004      0x00603310      0x00000000

因此上面代码的作用就是从%rsp+0x20,r[rsp+28]=0x28 ...开始存储6个node,到这里可以总结一下前面的操作

  • 输入6个数,每个数不能大于6,且互不相同
  • ai = 7 - ai
  • ai对应node i,例如输入的数为5,6,4,…
    • a1 = 7 - 5 = 2,存储地址为%rsp+0x20,存储的值为M(R[rdx]+8) = 0x0x6032e0,即node2
    • a2 == 7 - 6 = 1,存储地址为%rsp+0x28,存储的值为0x6032d0,即node1
    • a3 == 7 - 4 = 3,存储地址为%rsp+0x30,存储的值为M( M {M(R[rdx]+8) + 8} + 8) = M( M {0x6032d8} + 8) = M(0x6032e8) = 0x6032f0,即node3

因此对于输入:5,6,4,…
(从%rsp+0x20开始)存储的节点依次为 node2 -> node1 -> node3 -> …

下面的pi均为重新排列之后的pi,也就是说我们把上例的node2看作p1,node1看作p2,node3看作p3,…

  (5) (E)
  4011ab:	48 8b 5c 24 20       	mov    0x20(%rsp),%rbx  // rbx = p1
  4011b0:	48 8d 44 24 28       	lea    0x28(%rsp),%rax  // rax = rsp + 0x28
  4011b5:	48 8d 74 24 50       	lea    0x50(%rsp),%rsi  // rsi = rsp + 0x50
  4011ba:	48 89 d9             	mov    %rbx,%rcx        // rcx = p1
  // 可以看出下面代码的功能是将节点链接
  4011bd:	48 8b 10             	mov    (%rax),%rdx  	// rdx = p2
  4011c0:	48 89 51 08          	mov    %rdx,0x8(%rcx)   //
  4011c4:	48 83 c0 08          	add    $0x8,%rax		// rax += 8 = 0x30
  4011c8:	48 39 f0             	cmp    %rsi,%rax		// comp rax : rsp + 0x50
  4011cb:	74 05                	je     4011d2 <phase_6+0xde>
  4011cd:	48 89 d1             	mov    %rdx,%rcx
  4011d0:	eb eb                	jmp    4011bd <phase_6+0xc9> 
0x6032d0 <node1>:       0x0000014c      0x00000001      0x006032e0      0x00000000
0x6032d8 <node1+8>:     0x006032e0      0x00000000      0x000000a8      0x00000002
0x6032e0 <node2>:       0x000000a8      0x00000002      0x006032f0      0x00000000
0x6032e8 <node2+8>:     0x006032f0      0x00000000      0x0000039c      0x00000003
0x6032f0 <node3>:       0x0000039c      0x00000003      0x00603300      0x00000000
0x6032f8 <node3+8>:     0x00603300      0x00000000      0x000002b3      0x00000004
0x603300 <node4>:       0x000002b3      0x00000004      0x00603310      0x00000000

以上例说明:

4011bd ~ 4011c0: rax = rsp + 0x28(node1的位置) rcx = 0x20(%rsp) = 0x6032e0

mov (%rax),%rdx => rdx = node3 = 0x6032d0

mov %rdx,0x8(%rcx) => 0x8(%rcx) = M(0x6032e0 + 8) = M(0x6032e8) 因此这行的意思是做该变化0x6032e8 <node1+8>: 0x6032d0,也就是说原来node2下一个节点是node1

因此上面代码的作用为将node链接起来

  // 节点必须按照递减的顺序否则就会直接爆炸 (mov 0x20(%rsp),%rbx //%rbx = p1,(%rbx) = p1->val)
  4011d2:	48 c7 42 08 00 00 00 	movq   $0x0,0x8(%rdx)
  4011d9:	00 
  4011da:	bd 05 00 00 00       	mov    $0x5,%ebp  	//ebp = 5
  4011df:	48 8b 43 08          	mov    0x8(%rbx),%rax	//rax = p2
  4011e3:	8b 00                	mov    (%rax),%eax	
  4011e5:	39 03                	cmp    %eax,(%rbx)	(p1->val) > (p2->val)
  4011e7:	7d 05                	jge    4011ee <phase_6+0xfa>
  4011e9:	e8 4c 02 00 00       	callq  40143a <explode_bomb>
  4011ee:	48 8b 5b 08          	mov    0x8(%rbx),%rbx
  4011f2:	83 ed 01             	sub    $0x1,%ebp    //ebp -=1 = 4
  4011f5:	75 e8                	jne    4011df <phase_6+0xeb>
  4011f7:	48 83 c4 50          	add    $0x50,%rsp
  4011fb:	5b                   	pop    %rbx
  4011fc:	5d                   	pop    %rbp
  4011fd:	41 5c                	pop    %r12
  4011ff:	41 5d                	pop    %r13
  401201:	41 5e                	pop    %r14
  401203:	c3                   	retq  

上面的式子告诉我们我们重新排列完之后的节点必须按照递减的顺序否则就会直接爆炸。那我们先按照之前的结点把结点大小排序一下。

0x6032d0 <node1>: 0x0000014c  0x00000001  0x006032e0  0x00000000
0x6032e0 <node2>: 0x000000a8  0x00000002  0x006032f0  0x00000000
0x6032f0 <node3>: 0x0000039c  0x00000003  0x00603300  0x00000000
0x603300 <node4>: 0x000002b3  0x00000004  0x00603310  0x00000000
0x603310 <node5>: 0x000001dd  0x00000005  0x00603320  0x00000000
0x603320 <node6>: 0x000001bb  0x00000006  0x00000000  0x00000000

node3>node4>node5>node6>node1>node2

现在我们就可以做题了,已知我们的输入为A,B,C,D,E,F(每个输入大小1~6),经过一系列处理,得到的节点顺序为node3>node4>node5>node6>node1>node2

处理流程如下:

  • 输入6个数,每个数不能大于6,且互不相同
  • ai = 7 - ai
  • ai对应node i,例如输入的数为5,6,4,…
    • a1 = 7 - 5 = 2,存储地址为%rsp+0x20,存储的值为M(R[rdx]+8) = 0x0x6032e0,即node2
    • a2 == 7 - 6 = 1,存储地址为%rsp+0x28,存储的值为0x6032d0,即node1
    • a3 == 7 - 4 = 3,存储地址为%rsp+0x30,存储的值为M( M {M(R[rdx]+8) + 8} + 8) = M( M {0x6032d8} + 8) = M(0x6032e8) = 0x6032f0,即node3

因此对于输入:5,6,4,…
(从%rsp+0x20开始)存储的节点依次为 node2 -> node1 -> node3 -> …

已知我们的输入为A,B,C,D,E,F(每个输入大小1~6)

  • a = 7 - A , b = 7 - B ,…,得到a, b, c, d, e, f
  • a对应node3;b对应node4;…

可以推出a = 3; b = 4; c = 5; d = 6; e = 1; f = 2

因此A~F依次为:4 3 2 1 6 5

secret_phase

00000000004015c4 <phase_defused>:
  4015c4:	48 83 ec 78          	sub    $0x78,%rsp
  4015c8:	64 48 8b 04 25 28 00 	mov    %fs:0x28,%rax
  4015cf:	00 00 
  4015d1:	48 89 44 24 68       	mov    %rax,0x68(%rsp)
  4015d6:	31 c0                	xor    %eax,%eax
  4015d8:	83 3d 81 21 20 00 06 	cmpl   $0x6,0x202181(%rip)        # 603760 <num_input_strings>
  4015df:	75 5e                	jne    40163f <phase_defused+0x7b>
  4015e1:	4c 8d 44 24 10       	lea    0x10(%rsp),%r8  // 第五个参数
  4015e6:	48 8d 4c 24 0c       	lea    0xc(%rsp),%rcx  // 第四个参数
  4015eb:	48 8d 54 24 08       	lea    0x8(%rsp),%rdx  // 第三个参数
  4015f0:	be 19 26 40 00       	mov    $0x402619,%esi  // %d %d %s
  4015f5:	bf 70 38 60 00       	mov    $0x603870,%edi  // 7 0
  4015fa:	e8 f1 f5 ff ff       	callq  400bf0 <__isoc99_sscanf@plt>
  4015ff:	83 f8 03             	cmp    $0x3,%eax
  401602:	75 31                	jne    401635 <phase_defused+0x71>
  401604:	be 22 26 40 00       	mov    $0x402622,%esi  // DrEvil
  401609:	48 8d 7c 24 10       	lea    0x10(%rsp),%rdi
  40160e:	e8 25 fd ff ff       	callq  401338 <strings_not_equal> 
  401613:	85 c0                	test   %eax,%eax
  // 第三个输入若不是DrEvil,则jump 401635
  401615:	75 1e                	jne    401635 <phase_defused+0x71>  
  // 0x4024f8: "Curses, you've found the secret phase!"
  401617:	bf f8 24 40 00       	mov    $0x4024f8,%edi
  40161c:	e8 ef f4 ff ff       	callq  400b10 <puts@plt>
  // 0x402520: "But finding it and solving it are quite different..."
  401621:	bf 20 25 40 00       	mov    $0x402520,%edi
  401626:	e8 e5 f4 ff ff       	callq  400b10 <puts@plt>
  40162b:	b8 00 00 00 00       	mov    $0x0,%eax       //eax = 0
  // 进入secret_phase
  401630:	e8 0d fc ff ff       	callq  401242 <secret_phase>
  // 0x402558: "Congratulations! You've defused the bomb!"
  401635:	bf 58 25 40 00       	mov    $0x402558,%edi
  40163a:	e8 d1 f4 ff ff       	callq  400b10 <puts@plt>
  40163f:	48 8b 44 24 68       	mov    0x68(%rsp),%rax
  401644:	64 48 33 04 25 28 00 	xor    %fs:0x28,%rax
  40164b:	00 00 
  40164d:	74 05                	je     401654 <phase_defused+0x90>
  40164f:	e8 dc f4 ff ff       	callq  400b30 <__stack_chk_fail@plt>
  401654:	48 83 c4 78          	add    $0x78,%rsp
  401658:	c3                   	retq   
  401659:	90                   	nop
  ...
0000000000401242 <secret_phase>:
  401242:	53                   	push   %rbx
  // 先读入一行然后调用strtol函数,rdi中存放的read_line返回值rax是str参数,而edx中的0xa应该是代表十进制,esi应该是特殊值0
  // 之前我没注意这个函数的返回值赋到%rax,一直把rax当40162b处的0,看了很长时间(现在想,rax既不是调用者保存寄存器也不是被调用者保存寄存器,当时以为%rax能传到secret_phase就是错的)
  401243:	e8 56 02 00 00       	callq  40149e <read_line>
  401248:	ba 0a 00 00 00       	mov    $0xa,%edx // edx = 0xa
  40124d:	be 00 00 00 00       	mov    $0x0,%esi // esi = 0
  401252:	48 89 c7             	mov    %rax,%rdi // rdi = rax = input
  401255:	e8 76 f9 ff ff       	callq  400bd0 <strtol@plt> // string to long
  
  40125a:	48 89 c3             	mov    %rax,%rbx       // rbx = (long)input
  40125d:	8d 40 ff             	lea    -0x1(%rax),%eax // eax = input - 1
  401260:	3d e8 03 00 00       	cmp    $0x3e8,%eax // input-1 <= 1000
  401265:	76 05                	jbe    40126c <secret_phase+0x2a>
  401267:	e8 ce 01 00 00       	callq  40143a <explode_bomb>
  
  40126c:	89 de                	mov    %ebx,%esi   // esi = input
  40126e:	bf f0 30 60 00       	mov    $0x6030f0,%edi //edi = 0x6030f0
  // 进入fun7,把 0x6030f0 和 输入的值 传递给fun7
  401273:	e8 8c ff ff ff       	callq  401204 <fun7>
  401278:	83 f8 02             	cmp    $0x2,%eax // 返回结果必须为2
  40127b:	74 05                	je     401282 <secret_phase+0x40>
  40127d:	e8 b8 01 00 00       	callq  40143a <explode_bomb>
  401282:	bf 38 24 40 00       	mov    $0x402438,%edi
  401287:	e8 84 f8 ff ff       	callq  400b10 <puts@plt>
  40128c:	e8 33 03 00 00       	callq  4015c4 <phase_defused>
  401291:	5b                   	pop    %rbx
  401292:	c3                   	retq   
  401293:	90                   	nop
  ...
(gdb) x/120w 0x6030f0
0x6030f0 <n1>:  0x00000024      0x00000000      0x00603110      0x00000000
0x603100 <n1+16>:       0x00603130      0x00000000      0x00000000      0x00000000
0x603110 <n21>: 0x00000008      0x00000000      0x00603190      0x00000000
0x603120 <n21+16>:      0x00603150      0x00000000      0x00000000      0x00000000
0x603130 <n22>: 0x00000032      0x00000000      0x00603170      0x00000000
0x603140 <n22+16>:      0x006031b0      0x00000000      0x00000000      0x00000000
0x603150 <n32>: 0x00000016      0x00000000      0x00603270      0x00000000
0x603160 <n32+16>:      0x00603230      0x00000000      0x00000000      0x00000000
0x603170 <n33>: 0x0000002d      0x00000000      0x006031d0      0x00000000
0x603180 <n33+16>:      0x00603290      0x00000000      0x00000000      0x00000000
0x603190 <n31>: 0x00000006      0x00000000      0x006031f0      0x00000000
0x6031a0 <n31+16>:      0x00603250      0x00000000      0x00000000      0x00000000
0x6031b0 <n34>: 0x0000006b      0x00000000      0x00603210      0x00000000
0x6031c0 <n34+16>:      0x006032b0      0x00000000      0x00000000      0x00000000
0x6031d0 <n45>: 0x00000028      0x00000000      0x00000000      0x00000000
0x6031e0 <n45+16>:      0x00000000      0x00000000      0x00000000      0x00000000
0x6031f0 <n41>: 0x00000001      0x00000000      0x00000000      0x00000000
0x603200 <n41+16>:      0x00000000      0x00000000      0x00000000      0x00000000
0x603210 <n47>: 0x00000063      0x00000000      0x00000000      0x00000000
0x603220 <n47+16>:      0x00000000      0x00000000      0x00000000      0x00000000
0x603230 <n44>: 0x00000023      0x00000000      0x00000000      0x00000000
0x603240 <n44+16>:      0x00000000      0x00000000      0x00000000      0x00000000
0x603250 <n42>: 0x00000007      0x00000000      0x00000000      0x00000000
0x603260 <n42+16>:      0x00000000      0x00000000      0x00000000      0x00000000
0x603270 <n43>: 0x00000014      0x00000000      0x00000000      0x00000000
0x603280 <n43+16>:      0x00000000      0x00000000      0x00000000      0x00000000
0x603290 <n46>: 0x0000002f      0x00000000      0x00000000      0x00000000
0x6032a0 <n46+16>:      0x00000000      0x00000000      0x00000000      0x00000000
0x6032b0 <n48>: 0x000003e9      0x00000000      0x00000000      0x00000000
0x6032c0 <n48+16>:      0x00000000      0x00000000      0x00000000      0x00000000

上面就是我们的树结构,每个节点有一个值,和两个指针,指向左子树和右子树,对于叶子节点,指针的值是0,以上面0x6030f0为例,该节点的值是0x24,即36,左子树地址为0x00603110,右子树地址为0x00603130,都可以在上面查到,根据这个规则,可以画出下面的树结构:

image-20220910200501615

0000000000401204 <fun7>:
  401204:	48 83 ec 08          	sub    $0x8,%rsp
  401208:	48 85 ff             	test   %rdi,%rdi // rdi = 0x6030f0
  40120b:	74 2b                	je     401238 <fun7+0x34>
  40120d:	8b 17                	mov    (%rdi),%edx // m[rdi]=m[0x6030f0] 即tree->val
  40120f:	39 f2                	cmp    %esi,%edx //comp tree->val : input
  401211:	7e 0d                	jle    401220 <fun7+0x1c> // tree->val <= input
  
  401213:	48 8b 7f 08          	mov    0x8(%rdi),%rdi //左子节点
  401217:	e8 e8 ff ff ff       	callq  401204 <fun7>
  40121c:	01 c0                	add    %eax,%eax      // res = 2 * res
  40121e:	eb 1d                	jmp    40123d <fun7+0x39>
  
  401220:	b8 00 00 00 00       	mov    $0x0,%eax // res = 0
  401225:	39 f2                	cmp    %esi,%edx // comp tree->val : input
  401227:	74 14                	je     40123d <fun7+0x39> //tree->val == input
  
  401229:	48 8b 7f 10          	mov    0x10(%rdi),%rdi //右子节点
  40122d:	e8 d2 ff ff ff       	callq  401204 <fun7>
  401232:	8d 44 00 01          	lea    0x1(%rax,%rax,1),%eax //res = res * 2 + 1
  401236:	eb 05                	jmp    40123d <fun7+0x39>
  
  401238:	b8 ff ff ff ff       	mov    $0xffffffff,%eax
  
  40123d:	48 83 c4 08          	add    $0x8,%rsp
  401241:	c3                   	retq 
c语言版本:  
int res=0;
func(Bitree *r ,long input){
    if(!r)return 0xffffffff
        if(r->val<=input){ 
            res=0;
            if(r->val <input){
                func(r->right,input);
                res=res*2+1;
            } 
            else return res;

        }else{
            func(r->left,input);
            res*=2;
        }
    return res;
}

image-20220910203419964

由于返回值为2,因此input不可能大于36,因为无论val=50处的节点处res是奇数还是偶数,val=36处的节点处值为res*2+1,一定是奇数。

根据这种思想,val=8处的节点res一定为1,因此要求val=6处的节点res为0.5,这种情况也可以排除,因为从这道题的汇编指令中可以看出不涉及浮点数的操作。

既然val=8处的节点res为1,则val=22处的节点res一定为0,因此input一种情况是22

val=22处的节点res为0,val=35处的节点res无论是什么都不行,而val=20处的节点res为0时,向上回溯得到的val=22处的节点res也为0,因此input另一种情况是20

你可能会问input是21时会出现什么,他会走到20的右子节点处(空节点,值全为0),然后触发中40120b处代码,最终返回0xffffffff

最后附上用不同答案完成的图

答案总结:

Border relations with Canada have never been better.

1 2 4 8 16 32

3 256 或者 很多组合~~~

7 0 DrEvil

IONEFG 或者 )/.%&' 或者 ionefg

4 3 2 1 6 5

22 或者 20

image-20220910205202128

image-20220910205215018

参考博客:

超精讲-逐例分析 CSAPP:Lab2-Bomb!(下)

[读书笔记]CSAPP:BombLab

CSAPP Lab2 实验记录 ---- Bomb Lab(Secret Phase彩蛋解析)

Bomb Lab ( Hai Dang )

CSAPP: Bomb Lab 详细实验解析

评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值