[*] Binary protection state of cryptsetup

  
  	Full RELRO     Canary found      NX disabled  PIE enabled  No RPATH     No RUNPATH   No Symbols


[*] Function strcat tear down of cryptsetup

    ; assembly                           | /* r2dec pseudo code output */
                                         | /* /logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/sbin/cryptsetup @ 0x88f0 */
                                         | #include <stdint.h>
                                         |  
    ; (fcn) sym.clogger ()               | void clogger () {
    0x000088f0 lui gp, 3                 |     
    0x000088f4 addiu gp, gp, 0x330       |     
    0x000088f8 addu gp, gp, t9           |     gp += t9;
    0x000088fc addiu sp, sp, -0x1048     |     
    0x00008900 addiu v0, sp, 0x105c      |     v0 = sp + 0x105c;
    0x00008904 sw s0, 0x1034(sp)         |     *(var_1034h) = s0;
    0x00008908 lw s0, -0x7bf0(gp)        |     s0 = *((gp - 7932));
    0x0000890c sw v0, 0x24(sp)           |     *(var_24h) = v0;
    0x00008910 lw t9, -0x7cac(gp)        |     t9 = sym.imp.__vsnprintf_chk;
    0x00008914 lw v1, (s0)               |     v1 = *(s0);
    0x00008918 sw v0, 0x14(sp)           |     *(var_14h) = v0;
    0x0000891c lw v0, 0x1058(sp)         |     v0 = *(arg_1058h);
    0x00008920 sw s1, 0x1038(sp)         |     *(var_1038h) = s1;
    0x00008924 addiu s1, sp, 0x28        |     s1 = sp + 0x28;
    0x00008928 sw gp, 0x18(sp)           |     *(var_18h) = gp;
    0x0000892c sw s3, 0x1040(sp)         |     *(var_1040h) = s3;
    0x00008930 sw s2, 0x103c(sp)         |     *(var_103ch) = s2;
    0x00008934 sw ra, 0x1044(sp)         |     *(var_1044h) = ra;
    0x00008938 move s3, a0               |     s3 = a0;
    0x0000893c move s2, a1               |     s2 = a1;
    0x00008940 sw v0, 0x10(sp)           |     *(var_10h) = v0;
    0x00008944 addiu a3, zero, 0x1002    |     a3 = 0x1002;
    0x00008948 addiu a2, zero, 1         |     a2 = 1;
    0x0000894c addiu a1, zero, 0x1000    |     a1 = 0x1000;
    0x00008950 move a0, s1               |     a0 = s1;
    0x00008954 sw v1, 0x102c(sp)         |     *(var_102ch) = v1;
    0x00008958 jalr t9                   |     t9 ();
    0x0000895c nop                       |     
    0x00008960 lw gp, 0x18(sp)           |     gp = *(var_18h);
                                         |     if (v0 <= 0) {
    0x00008964 blez v0, 0x8998           |         goto label_0;
                                         |     }
    0x00008968 addiu v0, s2, -1          |     v0 = s2 + -1;
    0x0000896c sltiu v0, v0, 2           |     v0 = (v0 < 2) ? 1 : 0;
    0x00008970 addiu v0, s2, 2           |     v0 = s2 + 2;
                                         |     if (v0 != 0) {
    0x00008974 bnez v0, 0x89c0           |         goto label_1;
                                         |     }
    0x00008978 sltiu v0, v0, 2           |     v0 = (v0 < 2) ? 1 : 0;
    0x0000897c lw t9, -0x7e68(gp)        |     t9 = sym.imp.crypt_log;
                                         |     if (v0 != 0) {
    0x00008980 bnez v0, 0x89c0           |         goto label_1;
                                         |     }
    0x00008984 move a2, s1               |     a2 = s1;
    0x00008988 move a1, s2               |     a1 = s2;
    0x0000898c move a0, s3               |     a0 = s3;
    0x00008990 jalr t9                   |     t9 ();
    0x00008994 lw gp, 0x18(sp)           |     gp = *(var_18h);
                                         |     do {
                                         | label_0:
    0x00008998 lw v1, 0x102c(sp)         |         v1 = *(var_102ch);
    0x0000899c lw v0, (s0)               |         v0 = *(s0);
    0x000089a0 lw ra, 0x1044(sp)         |         ra = *(var_1044h);
                                         |         if (v1 != v0) {
    0x000089a4 bne v1, v0, 0x89f8        |             goto label_2;
                                         |         }
    0x000089a8 lw s3, 0x1040(sp)         |         s3 = *(var_1040h);
    0x000089ac lw s2, 0x103c(sp)         |         s2 = *(var_103ch);
    0x000089b0 lw s1, 0x1038(sp)         |         s1 = *(var_1038h);
    0x000089b4 lw s0, 0x1034(sp)         |         s0 = *(var_1034h);
    0x000089b8 addiu sp, sp, 0x1048      |         
    0x000089bc jr ra                     |         return v1;
                                         | label_1:
    0x000089c0 lw a1, -0x7fd8(gp)        |         a1 = *((gp - 8182));
    0x000089c4 lw t9, -0x7cfc(gp)        |         t9 = sym.imp.__strcat_chk
    0x000089c8 addiu a2, zero, 0x1002    |         a2 = 0x1002;
    0x000089cc addiu a1, a1, -0x46d4     |         a1 += -0x46d4;
    0x000089d0 move a0, s1               |         a0 = s1;
    0x000089d4 jalr t9                   |         t9 ();
    0x000089d8 lw gp, 0x18(sp)           |         gp = *(var_18h);
    0x000089dc move a2, s1               |         a2 = s1;
    0x000089e0 move a1, s2               |         a1 = s2;
    0x000089e4 lw t9, -0x7e68(gp)        |         t9 = sym.imp.crypt_log;
    0x000089e8 move a0, s3               |         a0 = s3;
    0x000089ec jalr t9                   |         t9 ();
    0x000089f0 lw gp, 0x18(sp)           |         gp = *(var_18h);
    0x000089f4 b 0x8998                  |         
                                         |     } while (1);
                                         | label_2:
    0x000089f8 lw t9, -0x7d34(gp)        |     t9 = sym.imp.__stack_chk_fail;
    0x000089fc jalr t9                   |     t9 ();
    0x00008a00 nop                       |     
                                         | }

[*] Function strcat used 2 times cryptsetup