### Copyright (C) 2019 Jeremiah Orians ### This file is part of mescc-tools. ### ### mescc-tools is free software: you can redistribute it and/or modify ### it under the terms of the GNU General Public License as published by ### the Free Software Foundation, either version 3 of the License, or ### (at your option) any later version. ### ### mescc-tools is distributed in the hope that it will be useful, ### but WITHOUT ANY WARRANTY; without even the implied warranty of ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ### GNU General Public License for more details. ### ### You should have received a copy of the GNU General Public License ### along with mescc-tools. If not, see . ### elf64.hex2: 64 bit elf header in hex2 ### if you wish to use this header, you need to add :ELF_end to the end of your ### M1 or hex2 files. ## ELF Header # :ELF_base 7F 45 4C 46 ## e_ident[EI_MAG0-3] ELF's magic number 02 ## e_ident[EI_CLASS] Indicating 64 bit 01 ## e_ident[EI_DATA] Indicating little endianness 01 ## e_ident[EI_VERSION] Indicating original elf 00 ## e_ident[EI_OSABI] Set at 0 because none cares 00 ## e_ident[EI_ABIVERSION] See above 00 00 00 00 00 00 00 ## e_ident[EI_PAD] 02 00 ## e_type Indicating Executable 3E 00 ## e_machine Indicating AMD64 01 00 00 00 ## e_version Indicating original elf 78 00 60 00 00 00 00 00 ## e_entry Address of the entry point (Number of bytes this header is + Base Address) 40 00 00 00 00 00 00 00 ## e_phoff Address of program header table 00 00 00 00 00 00 00 00 ## e_shoff Address of section header table 00 00 00 00 ## e_flags 40 00 ## e_ehsize Indicating our 64 Byte header 38 00 ## e_phentsize size of a program header table 01 00 ## e_phnum number of entries in program table 00 00 ## e_shentsize size of a section header table 00 00 ## e_shnum number of entries in section table 00 00 ## e_shstrndx index of the section names ## Program Header # :ELF_program_headers 01 00 00 00 ## p_type 06 00 00 00 ## Flags 00 00 00 00 00 00 00 00 ## p_offset 00 00 60 00 00 00 00 00 ## p_vaddr 00 00 60 00 00 00 00 00 ## p_physaddr 1D 01 00 00 00 00 00 00 ## p_filesz 1D 01 00 00 00 00 00 00 ## p_memsz 01 00 00 00 00 00 00 00 ## Required alignment # :ELF_text # :_start 58 # POP_RAX ; Get·the·number·of·arguments 5F # POP_RDI ; Get·the·program·name 5F # POP_RDI ; Get·the·actual·output name BE 41020000 # LOADI32_RSI %577 ; Prepare file as O_WRONLY|O_CREAT|O_TRUNC BA 80010000 # LOADI32_RDX %384 ; Prepare file as RW for owner only (600 in octal) 48C7C0 02000000 # LOADI32_RAX %2 ; the·syscall·number·for·open() 0F05 # SYSCALL ; Now open that file 4989C7 # COPY_RAX_to_R15 ; Preserve the file pointer we were given 48C7C0 0C000000 # LOADI32_RAX %12 ; the Syscall # for SYS_BRK BF 00000000 # LOADI32_RDI %0 ; Get current brk 0F05 # SYSCALL ; Let the kernel do the work 4989C6 # COPY_RAX_to_R14 ; Set our malloc pointer 48C7C0 0C000000 # LOADI32_RAX %12 ; the Syscall # for SYS_BRK 4C89F7 # COPY_R14_to_RDI ; Using current pointer 4881C7 00001000 # ADDI32_to_RDI %0x100000 ; Allocate 1MB 0F05 # SYSCALL ; Let the kernel do the work # :core 5F # POP_RDI ; Get·the·actual·input name 4883FF 00 # CMP_RDI_Immediate8 !0 ; Check for null string 0F84 4F000000 # JE32 %done ; Hit null be done BE 00000000 # LOADI32_RSI %0 ; prepare·read_only BA 00000000 # LOADI32_RDX %0 ; prevent any interactions 48C7C0 02000000 # LOADI32_RAX %2 ; the·syscall·number·for·open() 0F05 # SYSCALL ; Now open that damn file 4989C5 # COPY_RAX_to_R13 ; Protect INPUT # :keep BA 00001000 # LOADI32_RDX %0x100000 ; set the size of chars we want 4C89F6 # COPY_R14_to_RSI ; Where to put it 4C89EF # COPY_R13_to_RDI ; Where are we reading from 48C7C0 00000000 # LOADI32_RAX %0 ; the syscall number for read 0F05 # SYSCALL ; call the Kernel 50 # PUSH_RAX ; Protect the number of bytes read 4889C2 # COPY_RAX_to_RDX ; Number of bytes to write 4C89F6 # COPY_R14_to_RSI ; What we are writing 4C89FF # COPY_R15_to_RDI ; Write to target file 48C7C0 01000000 # LOADI32_RAX %1 ; the syscall number for write 0F05 # SYSCALL ; call the Kernel 58 # POP_RAX ; Get bytes read 483D 00001000 # CMP_RAX_Immediate32 %0x100000 ; Check if buffer was fully used 0F84 CCFFFFFF # JE32 %keep ; Keep looping if was full E9 A6FFFFFF # JMP32 %core ; Otherwise move to next file # :done ; program completed Successfully BF 00000000 # LOADI32_RDI %0 ; All is well 48C7C0 3C000000 # LOADI32_RAX %0x3C ; put the exit syscall number in eax 0F05 # SYSCALL ; Call it a good day # :ELF_end