# SPDX-FileCopyrightText: 2022 Andrius Štikonas # SPDX-FileCopyrightText: 2017 Jeremiah Orians # # SPDX-License-Identifier: GPL-3.0-or-later # Register usage: # R15 => Flag # R14 => High bits # R13 => IP # R12 => MALLOC # R11 => HEAD # Struct format: (size 24) # NEXT => 0 # TARGET => 8 # NAME => 16 # DOS MZ header 4D 5A # Signature 00 00 # Number of bytes in the last page. 00 00 # Number of whole/partial pages 00 00 # Number of entries in the relocation table. 00 00 # Header size 00 00 # Minimum allocation 00 00 # Maximum allocation 00 00 # Relocatable segment address for SS 00 00 # Initial value for SP 00 00 # Checksum (I don't think is looked at) 00 00 # Initial value for IP (Seems ignored) 00 00 # Relocatable segment address for CS (Seems ignored) 00 00 # The (absolute) offset to the relocation table. 00 00 # Value used for overlay management. If zero, this is the main executable 00 00 00 00 00 00 00 00 # Reserved in PE 00 00 # OEM identifier 00 00 # OEM info 00 00 00 00 00 00 00 00 00 00 # The required reserved 20 bytes of NULLS 00 00 00 00 00 00 00 00 00 00 40 00 00 00 # Starting address of the PE header # [0x40] # PE header 50 45 00 00 # Signature "PE" 64 86 # Machine 01 00 # number of sections 00 00 00 00 # Timestamp supposedly 00 00 00 00 # PointerToSymbolTable 00 00 00 00 # number of symbols F0 00 # SizeOfOptionalHeader 00 00 # 'Characteristics' # [0x58] # COFF header bits 0B 02 # Magic PE32+ (64 bit) 00 00 # Linker version 00 00 00 00 # size of code 00 00 00 00 # sizeOfInitializedData 00 00 00 00 # SizeOfUninitializedData 00 10 00 00 # AddressOfEntryPoint 00 10 00 00 # BaseOfCode 00 00 00 80 01 00 00 00 # ImageBase 01 00 00 00 # SectionAlignment 01 00 00 00 # FileAlignment 00 00 00 00 # OperatingSystemVersion 00 00 00 00 # ImageVersion 00 00 00 00 # SubsystemVersion 00 00 00 00 # Win32VersionValue 00 20 00 00 # SizeOfImage 70 01 00 00 # SizeOfHeaders 00 00 00 00 # CheckSum (isn't used at all) 0A 00 # Subsystem 00 00 # DllCharacteristics 00 00 00 00 # SizeOfStackReserve 00 00 00 00 # SizeOfStackCommit 00 00 00 00 # SizeOfHeapReserve 00 00 00 00 # SizeOfHeapCommit 00 00 00 00 # LoaderFlags 00 00 00 00 # NumberOfRvaAndSizes # [0xB8] # Data directories (has to be 16 entries always 16bytes per entry) 00 00 00 00 # Export Table 00 00 00 00 # Size of Export Table 00 00 00 00 # Import Table 10 00 00 00 # Size of Import Table 00 00 00 00 # Resource Table 00 00 00 00 # Size of Resource Table 00 00 00 00 # Exception Table 00 00 00 00 # Size of Exception Table 00 00 00 00 # Certificate Table 00 00 00 00 # Size of Certificate Table 00 00 00 00 # Base Relocation Table 00 00 00 00 # Size of Base Relocation Table 00 00 00 00 # Debug Table 00 00 00 00 # Size of Debug Table 00 00 00 00 # Architecture Data Table 00 00 00 00 # Size of Architecture Data Table 00 00 00 00 # Global Pointer 00 00 00 00 # NULL 00 00 00 00 # TLS Table 00 00 00 00 # Size of TLS Table 00 00 00 00 # Load Config Table 00 00 00 00 # Size of Load Config Table 00 00 00 00 # Bound Import Table 00 00 00 00 # Size of Bound Import Table 00 00 00 00 # Import Address Table 00 00 00 00 # Size of Import Address Table 00 00 00 00 # Delay Import Descriptor Table 00 00 00 00 # Size of Delay Import Descriptor Table 00 00 00 00 # CLR Runtime header table 00 00 00 00 # Size of CLR Runtime Header table 00 00 00 00 00 00 00 00 # MUST BE NULL # no idea what it is yet 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 # [0x148] # Start of section headers 00 00 00 00 00 00 00 00 ; Name of the section (empty) but could set to ".text" 52 06 00 00 ; VirtualSize 00 10 00 00 ; VirtualAddress 52 06 00 00 ; SizeOfRawData 70 01 00 00 ; PointerToRawData 00 00 00 00 ; PointerToRelocations 00 00 00 00 ; PointerToLinenumbers 00 00 ; NumberOfRelocations 00 00 ; NumberOfLinenumbers 00 00 00 00 ; 'Characteristics' # [0x170] #:PE32_text # efi_main(void *image_handle, struct efi_system_table *system) #:_start 4889E5 ; COPY_RSP_to_RBP # save stack pointer 4989CF ; COPY_RCX_to_R15 # save image_handle 4C8B72 60 ; LOAD64_into_R14_from_Address_RDX_Immediate8 !96 # system->boot 4C8935 %1 ; STORE64_rel_R14 %SystemBoot # save system->boot # Open Loaded Image protocol 50 ; PUSH_RAX # allocate stack for image 4989E0 ; COPY_RSP_to_R8 # arg3 = &image 488B15 %W ; LOAD64_rel_RDX %LOADED_IMAGE_PROTOCOL_8 # EFI_LOADED_IMAGE_PROTOCOL_GUID (last 64 bits) 52 ; PUSH_RDX # push last 64 bits onto stack 488B15 %V ; LOAD64_rel_RDX %LOADED_IMAGE_PROTOCOL # EFI_LOADED_IMAGE_PROTOCOL_GUID (first 64 bits) 52 ; PUSH_RDX # push first 64 bits onto stack 4889E2 ; COPY_RSP_to_RDX # arg2 = &guid 6A 01 ; PUSH !1 # arg6 = EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL 6A 00 ; PUSH !0 # arg5 = NULL 4D89F9 ; COPY_R15_to_R9 # arg4 = image_handle 4C89F9 ; COPY_R15_to_RCX # arg1 = image_handle 4883EC 20 ; SUBI8_RSP !32 # allocate shadow stack space for UEFI function 41FF96 18010000 ; CALL_R14_Immediate32 %280 # system->boot->open_protocol(image_handle, &guid, &image, image_handle, 0, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL) 488B4424 40 ; LOAD64_into_RAX_from_Address_RSP_Immediate8 !64 # get_image 4889C1 ; COPY_RCX_to_RAX # save image # Command line args 488B58 38 ; LOAD64_into_RBX_from_Address_RAX_Immediate8 !56 # options = image->load_options :a #:loop_options1 # Skip application name 4883C3 02 ; ADDI8_RBX !2 # ++options 8A03 ; LOAD8_AL_from_Address_RBX # *options 3C 20 ; CMPI8_AL !0x20 # if *options != ' ' 0F85 %a ; JNE32 %loop_options1 # then jump 4883C3 02 ; ADDI8_RBX !2 # ++options 4989DC ; COPY_RBX_to_R12 # save input file :b #:loop_options2 # Skip argv[1] 4883C3 02 ; ADDI8_RBX !2 # ++options 8A03 ; LOAD8_AL_from_Address_RBX # *options 3C 20 ; CMPI8_AL !0x20 # if *options != ' ' 0F85 %b ; JNE32 %loop_options2 # then jump C603 00 ; STOREI8_into_Address_RBX !0 # *options = 0; 4883C3 02 ; ADDI8_RBX !2 # ++options 4989DD ; COPY_RBX_to_R13 # save output file # Get root file system 50 ; PUSH_RAX # allocate stack for rootfs 4989E0 ; COPY_RSP_to_R8 # arg3 = &rootfs 488B15 %Y ; LOAD64_rel_RDX %SIMPLE_FS_PROTOCOL_8 # EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_GUID (last 64 bits) 52 ; PUSH_RDX # push last 64 bits onto stack 488B15 %X ; LOAD64_rel_RDX %SIMPLE_FS_PROTOCOL # EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_GUID (first 64 bits) 52 ; PUSH_RDX # push first 64 bits onto stack 4889E2 ; COPY_RSP_to_RDX # arg2 = &guid 6A 01 ; PUSH !1 # arg6 = EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL 6A 00 ; PUSH !0 # arg5 = NULL 4D89F9 ; COPY_R15_to_R9 # arg4 = image_handle 488B49 18 ; LOAD64_into_RCX_from_Address_RCX_Immediate8 !24 # arg1 = root_device = image->device 4883EC 20 ; SUBI8_RSP !32 # allocate shadow stack space for UEFI function 41FF96 18010000 ; CALL_R14_Immediate32 %280 # system->boot->open_protocol(root_device, &guid, &rootfs, image_handle, 0, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL) 488B4C24 40 ; LOAD64_into_RCX_from_Address_RSP_Immediate8 !64 # get rootfs # Get root directory 52 ; PUSH_RDX # allocate stack for rootdir 4889E2 ; COPY_RSP_to_RDX # arg2 = &rootdir 50 ; PUSH_RAX # allocate shadow stack space for UEFI function 50 ; PUSH_RAX # allocate shadow stack space for UEFI function FF51 08 ; CALL_RCX_Immediate8 !8 # rootfs->open_volume(rootfs, &rootdir) 58 ; POP_RAX # deallocate stack 58 ; POP_RAX # deallocate stack 5B ; POP_RBX # save rootdir # Open file for reading 52 ; PUSH_RDX # allocate stack for fin 4889E2 ; COPY_RSP_to_RDX # arg2 = &fin 6A 01 ; PUSH !1 # arg5 = EFI_FILE_READ_ONLY 6A 01 ; PUSH !1 # prepare to set arg4 to EFI_FILE_MODE_READ 4159 ; POP_R9 # arg4 = EFI_FILE_MODE_READ 4D89E0 ; COPY_R12_to_R8 # arg3 = in 4889D9 ; COPY_RBX_to_RCX # arg1 = rootdir 4883EC 20 ; SUBI8_RSP !32 # allocate shadow stack space for UEFI function FF51 08 ; CALL_RCX_Immediate8 !8 # rootdir->open() 488B4424 28 ; LOAD64_into_RAX_from_Address_RSP_Immediate8 !40 # get fin 488905 %Z ; STORE64_rel_RAX %fin # save fin # Open file for writing 52 ; PUSH_RDX # allocate stack for fout 4889E2 ; COPY_RSP_to_RDX # arg2 = &fout 6A 00 ; PUSH !0 # arg5 = 0 6A 07 ; PUSH !7 # to get 0x8000000000000003 we set the rightmost 3 bits 4159 ; POP_R9 # and then do right rotation by 1 49D1C9 ; ROR_R9 # arg4 = EFI_FILE_MODE_CREATE| EFI_FILE_MODE_WRITE | EFI_FILE_MODE_READ 4D89E8 ; COPY_R13_to_R8 # arg3 = out 4889D9 ; COPY_RBX_to_RCX # arg1 = rootdir 4883EC 20 ; SUBI8_RSP !32 # allocate shadow stack space for UEFI function FF51 08 ; CALL_RCX_Immediate8 !8 # rootdir->open() 4C8B5424 28 ; LOAD64_into_R10_from_Address_RSP_Immediate8 !40 # get fout # Allocate ourselves 16 MiB of memory 48C7C2 00000001 ; LOADI32_RDX %0x1000000 # allocate 16 MiB of memory E8 %U ; CALLI32 %allocate_pool 488905 %0 ; STORE64_rel_RAX %scratch # Allocate space for scratch area 4805 00080000 ; ADDI32_RAX %0x800 # 2 KiB of scratch 4989C4 ; COPY_RAX_to_R12 # save structs pointer E8 %H ; CALLI32 %ClearScratch # Zero scratch 49C7C7 FFFFFFFF ; LOADI32_R15 %-1 # Our flag for byte processing 49C7C6 00000000 ; LOADI32_R14 %0 # temp storage for the sum 49C7C5 00006000 ; LOADI32_R13 %0x00600000 # Our starting IP 49C7C3 00000000 ; LOADI32_R11 %0 # HEAD = NULL E8 %c ; CALLI32 %First_pass # Process it # rewind input file 4152 ; PUSH_R10 # Protect r10 4153 ; PUSH_R11 # Protect r11 488B0D %Z ; LOAD64_rel_RCX %fin # Using our input file 31D2 ; XOR_EDX_EDX # Offset Zero 50 ; PUSH_RAX # allocate shadow stack space for UEFI function 50 ; PUSH_RAX # allocate shadow stack space for UEFI function FF51 38 ; CALL_RCX_Immediate8 !56 # fin->set_position(fin, 0) 58 ; POP_RAX # deallocate stack 58 ; POP_RAX # deallocate stack 415B ; POP_R11 # restore r11 415A ; POP_R10 # restore r10 49C7C7 FFFFFFFF ; LOADI32_R15 %-1 # Our flag for byte processing 49C7C6 00000000 ; LOADI32_R14 %0 # temp storage for the sum 49C7C5 00006000 ; LOADI32_R13 %0x00600000 # Our starting IP E8 %m ; CALLI32 %Second_pass # Process it E9 %S ; JMP32 %Done :c #:First_pass E8 %x ; CALLI32 %Read_byte # Deal with EOF 4883F8 FC ; CMP_RAX_Immediate8 !-4 0F84 %k ; JE32 %First_pass_done # Check for : 4883F8 3A ; CMP_RAX_Immediate8 !0x3A 0F85 %d ; JNE32 %First_pass_0 # Deal with label E8 %C ; CALLI32 %StoreLabel :d #:First_pass_0 # Check for ! 4883F8 21 ; CMP_RAX_Immediate8 !0x21 0F84 %j ; JE32 %First_pass_pointer # Check for @ 4883F8 40 ; CMP_RAX_Immediate8 !0x40 0F84 %j ; JE32 %First_pass_pointer # Check for $ 4883F8 24 ; CMP_RAX_Immediate8 !0x24 0F84 %j ; JE32 %First_pass_pointer # Check for % 4883F8 25 ; CMP_RAX_Immediate8 !0x25 0F84 %j ; JE32 %First_pass_pointer # Check for & 4883F8 26 ; CMP_RAX_Immediate8 !0x26 0F84 %j ; JE32 %First_pass_pointer # Deal with everything else E8 %l ; CALLI32 %hex # Process our char # Deal with EOF 4883F8 FC ; CMP_RAX_Immediate8 !-4 0F84 %k ; JE32 %First_pass_done # deal with -1 values 4883F8 00 ; CMP_RAX_Immediate8 !0 0F8C %c ; JL32 %First_pass # deal with toggle 4983FF 00 ; CMP_R15_Immediate8 !0 0F84 %e ; JE32 %First_pass_1 4983C5 01 ; ADDI8_to_R13 !1 # Increment IP :e #:First_pass_1 49F7D7 ; NOT_R15 E9 %c ; JMP32 %First_pass :f #:Update_Pointer # Check for ! 4883F8 21 ; CMP_RAX_Immediate8 !0x21 0F84 %i ; JE32 %Update_Pointer_1 # Check for @ 4883F8 40 ; CMP_RAX_Immediate8 !0x40 0F84 %h ; JE32 %Update_Pointer_2 # Check for $ 4883F8 24 ; CMP_RAX_Immediate8 !0x24 0F84 %h ; JE32 %Update_Pointer_2 # Check for % 4883F8 25 ; CMP_RAX_Immediate8 !0x25 0F84 %g ; JE32 %Update_Pointer_4 # Check for & 4883F8 26 ; CMP_RAX_Immediate8 !0x26 0F84 %g ; JE32 %Update_Pointer_4 # deal with bad input E8 %R ; CALLI32 %fail :g #:Update_Pointer_4 4983C5 02 ; ADDI8_to_R13 !2 # Increment IP :h #:Update_Pointer_2 4983C5 01 ; ADDI8_to_R13 !1 # Increment IP :i #:Update_Pointer_1 4983C5 01 ; ADDI8_to_R13 !1 # Increment IP C3 ; RET :j #:First_pass_pointer # Deal with Pointer to label E8 %f ; CALLI32 %Update_Pointer # Increment IP 488B1D %0 ; LOAD64_rel_RBX %scratch # Using scratch E8 %A ; CALLI32 %consume_token # Read token E8 %H ; CALLI32 %ClearScratch # Throw away token 4883F8 3E ; CMP_RAX_Immediate8 !0x3E # check for '>' 0F85 %c ; JNE32 %First_pass # Loop again # Deal with %label>label case 488B1D %0 ; LOAD64_rel_RBX %scratch # Write to scratch E8 %A ; CALLI32 %consume_token # get token E8 %H ; CALLI32 %ClearScratch # Clean up after ourselves E9 %c ; JMP32 %First_pass # Loop again :k #:First_pass_done C3 ; RET :l #:hex # deal with EOF 4883F8 FC ; CMP_RAX_Immediate8 !-4 0F84 %p ; JE32 %EOF # deal with line comments starting with # 4883F8 23 ; CMP_RAX_Immediate8 !0x23 0F84 %u ; JE32 %ascii_comment # deal with line comments starting with ; 4883F8 3B ; CMP_RAX_Immediate8 !0x3B 0F84 %u ; JE32 %ascii_comment # deal all ascii less than 0 4883F8 30 ; CMP_RAX_Immediate8 !0x30 0F8C %t ; JL32 %ascii_other # deal with 0-9 4883F8 3A ; CMP_RAX_Immediate8 !0x3A 0F8C %q ; JL32 %ascii_num # deal with all ascii less than A 4883F8 41 ; CMP_RAX_Immediate8 !0x41 0F8C %t ; JL32 %ascii_other # deal with A-F 4883F8 47 ; CMP_RAX_Immediate8 !0x47 0F8C %s ; JL32 %ascii_high # deal with all ascii less than a 4883F8 61 ; CMP_RAX_Immediate8 !0x61 0F8C %t ; JL32 %ascii_other # deal with a-f 4883F8 67 ; CMP_RAX_Immediate8 !0x67 0F8C %r ; JL32 %ascii_low # The rest that remains needs to be ignored E9 %t ; JMP32 %ascii_other :m #:Second_pass E8 %x ; CALLI32 %Read_byte # Deal with EOF 4883F8 FC ; CMP_RAX_Immediate8 !-4 0F84 %p ; JE32 %Second_pass_done # Simply drop the label 4883F8 3A ; CMP_RAX_Immediate8 !0x3A 0F85 %n ; JNE32 %Second_pass_0 488B1D %0 ; LOAD64_rel_RBX %scratch # Using scratch E8 %A ; CALLI32 %consume_token # Read token E8 %H ; CALLI32 %ClearScratch # Throw away token E9 %m ; JMP32 %Second_pass :n #:Second_pass_0 # Deal with % pointer 4883F8 25 ; CMP_RAX_Immediate8 !0x25 0F84 %M ; JE32 %StorePointer_rel4 # Deal with @ pointer 4883F8 40 ; CMP_RAX_Immediate8 !0x40 0F84 %N ; JE32 %StorePointer_rel2 # Deal with ! pointer 4883F8 21 ; CMP_RAX_Immediate8 !0x21 0F84 %O ; JE32 %StorePointer_rel1 # Deal with & pointer 4883F8 26 ; CMP_RAX_Immediate8 !0x26 0F84 %P ; JE32 %StorePointer_abs4 # Deal with $ pointer 4883F8 24 ; CMP_RAX_Immediate8 !0x24 0F84 %Q ; JE32 %StorePointer_abs2 :o #:Second_pass_1 # Deal with everything else E8 %l ; CALLI32 %hex # Process our char # Deal with EOF 4883F8 FC ; CMP_RAX_Immediate8 !-4 0F84 %p ; JE32 %Second_pass_done # deal with -1 values 4883F8 00 ; CMP_RAX_Immediate8 !0 0F8C %m ; JL32 %Second_pass # deal with toggle 4983FF 00 ; CMP_R15_Immediate8 !0 0F84 %w ; JE32 %print # process first byte of pair 4989C6 ; COPY_RAX_to_R14 49C7C7 00000000 ; LOADI32_R15 %0 E9 %m ; JMP32 %Second_pass :p #:Second_pass_done #:EOF C3 ; RET :q #:ascii_num 83E8 30 ; SUBI8_RAX !0x30 C3 ; RET :r #:ascii_low 83E8 57 ; SUBI8_RAX !0x57 C3 ; RET :s #:ascii_high 83E8 37 ; SUBI8_RAX !0x37 C3 ; RET :t #:ascii_other 48C7C0 FFFFFFFF ; LOADI32_RAX %-1 C3 ; RET :u #:ascii_comment E8 %x ; CALLI32 %Read_byte 4883F8 0D ; CMP_RAX_Immediate8 !0x0D 0F84 %v ; JE32 %ascii_comment_cr 4883F8 0A ; CMP_RAX_Immediate8 !0x0A 0F85 %u ; JNE32 %ascii_comment :v #:ascii_comment_cr 48C7C0 FFFFFFFF ; LOADI32_RAX %-1 C3 ; RET # process second byte of pair :w #:print # update the sum and store in output 49C1E6 04 ; SHL_R14_Immediate8 !4 4C01F0 ; ADD_R14_to_RAX # flip the toggle 49F7D7 ; NOT_R15 # r15 = -1 # Print our first Hex 48C7C2 01000000 ; LOADI32_RDX %1 # set the size of chars we want E8 %z ; CALLI32 %print_chars 4983C5 01 ; ADDI8_to_R13 !1 # Increment IP E9 %m ; JMP32 %Second_pass :x #:Read_byte 4152 ; PUSH_R10 # Protect r10 4153 ; PUSH_R11 # Protect r11 488B0D %Z ; LOAD64_rel_RCX %fin # arg1 = fin 6A 01 ; PUSH !1 # size = 1 4889E2 ; COPY_RSP_to_RDX # arg2 = &size 31F6 ; XOR_ESI_ESI # zero rsi 56 ; PUSH_RSI # allocate stack 4989E0 ; COPY_RSP_to_R8 # arg3 = &input 50 ; PUSH_RAX # allocate shadow stack space for UEFI function 50 ; PUSH_RAX # allocate shadow stack space for UEFI function 50 ; PUSH_RAX # allocate shadow stack space for UEFI function FF51 20 ; CALL_RCX_Immediate8 !32 # fin->read() 58 ; POP_RAX # deallocate stack 58 ; POP_RAX # deallocate stack 58 ; POP_RAX # deallocate stack 58 ; POP_RAX # save input to rax 5E ; POP_RSI # save size to rsi 415B ; POP_R11 # restore r11 415A ; POP_R10 # restore r10 # If the file ended (0 bytes read) return EOF 85F6 ; TEST_ESI_ESI 0F85 %y ; JNE32 %Read_byte_1 48C7C0 FCFFFFFF ; LOADI32_RAX %-4 # Put EOF in rax :y #:Read_byte_1 C3 ; RET # Writes bytes stored in rax :z #:print_chars 4152 ; PUSH_R10 # Protect r10 4153 ; PUSH_R11 # Protect r11 4C89D1 ; COPY_R10_to_RCX # arg1 = fout 52 ; PUSH_RDX # set size 4889E2 ; COPY_RSP_to_RDX # arg2 = &size 50 ; PUSH_RAX # allocate stack 4989E0 ; COPY_RSP_to_R8 # arg3 = &output 50 ; PUSH_RAX # allocate shadow stack space for UEFI function 50 ; PUSH_RAX # allocate shadow stack space for UEFI function 50 ; PUSH_RAX # allocate shadow stack space for UEFI function FF51 28 ; CALL_RCX_Immediate8 !40 # fout->write() 4883C4 28 ; ADDI8_RSP !40 # deallocate stack 415B ; POP_R11 # restore r11 415A ; POP_R10 # restore r10 C3 ; RET # Receives pointer in RBX # Writes out char and updates RBX :A #:consume_token E8 %x ; CALLI32 %Read_byte # Consume_token # Check for \t 4883F8 09 ; CMP_RAX_Immediate8 !0x09 0F84 %B ; JE32 %consume_token_done # Check for \n 4883F8 0A ; CMP_RAX_Immediate8 !0x0A 0F84 %B ; JE32 %consume_token_done # Check for ' ' 4883F8 20 ; CMP_RAX_Immediate8 !0x20 0F84 %B ; JE32 %consume_token_done # Check for '>' 4883F8 3E ; CMP_RAX_Immediate8 !0x3E 0F84 %B ; JE32 %consume_token_done # Looks like we are still reading token 8803 ; STORE8_al_into_Address_RBX # Store char 4883C3 01 ; ADDI8_RBX !1 # Point to next spot E9 %A ; JMP32 %consume_token # loop until done :B #:consume_token_done 48C7C1 00000000 ; LOADI32_RCX %0 # Pad with nulls 48890B ; STORE32_RCX_into_Address_RBX 4883C3 08 ; ADDI8_RBX !8 C3 ; RET :C #:StoreLabel 4C89E0 ; COPY_R12_to_RAX # ENTRY 4983C4 18 ; ADDI8_to_R12 !24 # CALLOC 4C8968 08 ; STORE32_R13_into_Address_RAX_Immediate8 !8 # ENTRY->TARGET = IP 4C8918 ; STORE32_R11_into_Address_RAX # ENTRY->NEXT = JUMP_TABLE 4989C3 ; COPY_RAX_to_R11 # JUMP_TABLE = ENTRY 4D8963 10 ; STORE32_R12_into_Address_R11_Immediate8 !16 # ENTRY->NAME = TOKEN 4C89E3 ; COPY_R12_to_RBX # Write Starting after struct E8 %A ; CALLI32 %consume_token # Collect whole string 4989DC ; COPY_RBX_to_R12 # Update HEAP E9 %c ; JMP32 %First_pass :D #:GetTarget 488B3D %0 ; LOAD64_rel_RDI %scratch # Reset scratch 4C89D9 ; COPY_R11_to_RCX # Grab JUMP_TABLE 488B71 10 ; LOAD32_into_RSI_from_Address_RCX_Immediate8 !16 # I->NAME :E #:GetTarget_loop 8A06 ; LOAD8_AL_from_Address_RSI # I->NAME[0] 8A1F ; LOAD8_BL_from_Address_RDI # scratch[0] 480FB6DB ; ZERO_EXTEND_BL # Zero extend 480FB6C0 ; ZERO_EXTEND_AL # Zero extend 38D8 ; CMP_AL_to_BL # IF TOKEN == I->NAME 0F85 %F ; JNE32 %GetTarget_miss # Oops 4883C6 01 ; ADDI8_to_RSI !1 4883C7 01 ; ADDI8_to_RDI !1 3C 00 ; CMPI8_AL !0 0F85 %E ; JNE32 %GetTarget_loop # Loop until E9 %G ; JMP32 %GetTarget_done # Match # Miss :F #:GetTarget_miss 488B09 ; LOAD32_into_RCX_from_Address_RCX # I = I->NEXT 4883F9 00 ; CMP_RCX_Immediate8 !0 # IF NULL == I 0F84 %R ; JE32 %fail # Abort hard 488B71 10 ; LOAD32_into_RSI_from_Address_RCX_Immediate8 !16 # I->NAME 488B3D %0 ; LOAD64_rel_RDI %scratch # Reset scratch E9 %E ; JMP32 %GetTarget_loop :G #:GetTarget_done 488B41 08 ; LOAD32_into_RAX_from_Address_RCX_Immediate8 !8 # Get address C3 ; RET :H #:ClearScratch 50 ; PUSH_RAX # Protect against changes 53 ; PUSH_RBX # And overwrites 51 ; PUSH_RCX 52 ; PUSH_RDX # While we work 488B1D %0 ; LOAD64_rel_RBX %scratch # Where our table is B0 00 ; LOADI8_AL !0 # Using null 4889DA ; COPY_RBX_to_RDX # Get scratch 4881C2 00080000 ; ADDI32_RDX %0x800 # end of scratch area :I #:ClearScratch_loop 4839D3 ; CMP_RBX_RDX # Make sure 0F84 %J ; JE32 %ClearScratch_end # we do not overflow 488B0B ; LOAD32_into_RCX_from_Address_RBX # Get current value 8803 ; STORE8_al_into_Address_RBX # Because we want null 4883C3 01 ; ADDI8_RBX !1 # Increment 4883F9 00 ; CMP_RCX_Immediate8 !0 # Check if we hit null 0F85 %I ; JNE32 %ClearScratch_loop # Keep looping :J #:ClearScratch_end 5A ; POP_RDX 59 ; POP_RCX # Don't Forget to 5B ; POP_RBX # Restore Damage 58 ; POP_RAX # Entirely C3 ; RET :K #:StorePointer E8 %f ; CALLI32 %Update_Pointer # Increment IP 488B1D %0 ; LOAD64_rel_RBX %scratch # Write to scratch E8 %A ; CALLI32 %consume_token # get token 50 ; PUSH_RAX # Protect base_sep_p 488B05 %0 ; LOAD64_rel_RAX %scratch # Pointer to scratch E8 %D ; CALLI32 %GetTarget # Get address of pointer E8 %H ; CALLI32 %ClearScratch # Clean up after ourselves 4C89EA ; COPY_R13_to_RDX # base = IP 5B ; POP_RBX # Restore base_sep_p 4883FB 3E ; CMP_RBX_Immediate8 !0x3E # If base_sep_p == '>' 0F85 %L ; JNE32 %StorePointer_done # If not # Deal with %label>label case 50 ; PUSH_RAX # We need to preserve main target 488B1D %0 ; LOAD64_rel_RBX %scratch # Write to scratch E8 %A ; CALLI32 %consume_token # get token 488B05 %0 ; LOAD64_rel_RAX %scratch # Pointer to scratch E8 %D ; CALLI32 %GetTarget # Get address of pointer E8 %H ; CALLI32 %ClearScratch # Clean up after ourselves 4889C2 ; COPY_RAX_to_RDX # Use our new base 58 ; POP_RAX # Restore main target :L #:StorePointer_done C3 ; RET :M #:StorePointer_rel4 E8 %K ; CALLI32 %StorePointer # Do Common 4829D0 ; SUB_RDX_from_RAX # target - ip 48C7C2 04000000 ; LOADI32_RDX %4 # set the size of chars we want E8 %z ; CALLI32 %print_chars E9 %m ; JMP32 %Second_pass :N #:StorePointer_rel2 E8 %K ; CALLI32 %StorePointer # Do Common 4829D0 ; SUB_RDX_from_RAX # target - ip 48C7C2 02000000 ; LOADI32_RDX %2 # set the size of chars we want E8 %z ; CALLI32 %print_chars E9 %m ; JMP32 %Second_pass :O #:StorePointer_rel1 E8 %K ; CALLI32 %StorePointer # Do Common 4829D0 ; SUB_RDX_from_RAX # target - ip 48C7C2 01000000 ; LOADI32_RDX %1 # set the size of chars we want E8 %z ; CALLI32 %print_chars E9 %m ; JMP32 %Second_pass :P #:StorePointer_abs4 E8 %K ; CALLI32 %StorePointer # Do Common 48C7C2 04000000 ; LOADI32_RDX %4 # set the size of chars we want E8 %z ; CALLI32 %print_chars E9 %m ; JMP32 %Second_pass :Q #:StorePointer_abs2 E8 %K ; CALLI32 %StorePointer # Do Common 48C7C2 02000000 ; LOADI32_RDX %2 # set the size of chars we want E8 %z ; CALLI32 %print_chars E9 %m ; JMP32 %Second_pass :R #:fail 48C7C0 01000000 ; LOADI32_RAX %1 # Set exit code 1 E9 %T ; JMP32 %terminate :S #:Done 31C0 ; XOR_EAX_EAX # Set exit code 0 :T #:terminate 50 ; PUSH_RAX # save exit code 4152 ; PUSH_R10 # protect fout 50 ; PUSH_RAX # allocate shadow stack space for UEFI function 4C8B35 %1 ; LOAD64_rel_R14 %SystemBoot # get system->boot 488B0D %0 ; LOAD64_rel_RCX %scratch # arg1 = scratch 41FF56 48 ; CALL_R14_Immediate8 !72 # system->boot->free_pool(scratch) 488B0D %Z ; LOAD64_rel_RCX %fin # arg1 = fin FF51 10 ; CALL_RCX_Immediate8 !16 # fin->close(fin) 58 ; POP_RAX # deallocate stack 59 ; POP_RCX # restore fout 50 ; PUSH_RAX # allocate shadow stack space for UEFI function FF51 10 ; CALL_RCX_Immediate8 !16 # fout->close(fout) 58 ; POP_RAX # deallocate stack 58 ; POP_RAX # restore exit code 4889EC ; COPY_RBP_to_RSP # restore stack C3 ; RET # return to UEFI # rdx: number of bytes to allocate # r14: system->boot # returns pointer in rax :U #:allocate_pool 52 ; PUSH_RDX # allocate stack for pool pointer 4989E0 ; COPY_RSP_to_R8 # arg3 = &pool 6A 02 ; PUSH !2 59 ; POP_RCX # arg1 = EFI_LOADER_DATA 4883EC 18 ; SUBI8_RSP !24 # allocate shadow stack space for UEFI 41FF56 40 ; CALL_R14_Immediate8 !64 # system->boot->allocate_pool(EFI_LOADER_DATA, 2048, &pool) 4883C4 18 ; ADDI8_RSP !24 # deallocate stack 58 ; POP_RAX # get pool C3 ; RET # Protocol GUIDs :V #:LOADED_IMAGE_PROTOCOL A1 31 1B 5B ; %0x5b1b31a1 62 95 ; @0x9562 D2 11 ; @0x11d2 :W #:LOADED_IMAGE_PROTOCOL_8 8E 3F 00 A0 C9 69 72 3B ; !0x8e !0x3f !0 !0xa0 !0xc9 !0x69 !0x72 !0x3b :X #:SIMPLE_FS_PROTOCOL 22 5B 4E 96 ; %0x0964e5b22 59 64 ; @0x6459 D2 11 ; @0x11d2 :Y #:SIMPLE_FS_PROTOCOL_8 8E 39 00 A0 C9 69 72 3B ; !0x8e !0x39 !0 !0xa0 !0xc9 !0x69 !0x72 !0x3b :Z #:fin 00000000 00000000 :0 #:scratch 00000000 00000000 :1 #:SystemBoot 00000000 00000000 # :PE32_end