stage0/Linux Bootstrap/AMD64/catm_AMD64.hex0

124 lines
6.3 KiB
Plaintext

### Copyright (C) 2019 Jeremiah Orians
### This file is part of mescc-tools.
###
### mescc-tools is free software: you can redistribute it and/or modify
### it under the terms of the GNU General Public License as published by
### the Free Software Foundation, either version 3 of the License, or
### (at your option) any later version.
###
### mescc-tools is distributed in the hope that it will be useful,
### but WITHOUT ANY WARRANTY; without even the implied warranty of
### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
### GNU General Public License for more details.
###
### You should have received a copy of the GNU General Public License
### along with mescc-tools. If not, see <http://www.gnu.org/licenses/>.
### elf64.hex2: 64 bit elf header in hex2
### if you wish to use this header, you need to add :ELF_end to the end of your
### M1 or hex2 files.
## ELF Header
# :ELF_base
7F 45 4C 46 ## e_ident[EI_MAG0-3] ELF's magic number
02 ## e_ident[EI_CLASS] Indicating 64 bit
01 ## e_ident[EI_DATA] Indicating little endianness
01 ## e_ident[EI_VERSION] Indicating original elf
00 ## e_ident[EI_OSABI] Set at 0 because none cares
00 ## e_ident[EI_ABIVERSION] See above
00 00 00 00 00 00 00 ## e_ident[EI_PAD]
02 00 ## e_type Indicating Executable
3E 00 ## e_machine Indicating AMD64
01 00 00 00 ## e_version Indicating original elf
78 00 60 00 00 00 00 00 ## e_entry Address of the entry point (Number of bytes this header is + Base Address)
40 00 00 00 00 00 00 00 ## e_phoff Address of program header table
00 00 00 00 00 00 00 00 ## e_shoff Address of section header table
00 00 00 00 ## e_flags
40 00 ## e_ehsize Indicating our 64 Byte header
38 00 ## e_phentsize size of a program header table
01 00 ## e_phnum number of entries in program table
00 00 ## e_shentsize size of a section header table
00 00 ## e_shnum number of entries in section table
00 00 ## e_shstrndx index of the section names
## Program Header
# :ELF_program_headers
01 00 00 00 ## p_type
06 00 00 00 ## Flags
00 00 00 00 00 00 00 00 ## p_offset
00 00 60 00 00 00 00 00 ## p_vaddr
00 00 60 00 00 00 00 00 ## p_physaddr
1D 01 00 00 00 00 00 00 ## p_filesz
1D 01 00 00 00 00 00 00 ## p_memsz
01 00 00 00 00 00 00 00 ## Required alignment
# :ELF_text
# :_start
58 # POP_RAX ; Get·the·number·of·arguments
5F # POP_RDI ; Get·the·program·name
5F # POP_RDI ; Get·the·actual·output name
BE 41020000 # LOADI32_RSI %577 ; Prepare file as O_WRONLY|O_CREAT|O_TRUNC
BA 80010000 # LOADI32_RDX %384 ; Prepare file as RW for owner only (600 in octal)
48C7C0 02000000 # LOADI32_RAX %2 ; the·syscall·number·for·open()
0F05 # SYSCALL ; Now open that file
4989C7 # COPY_RAX_to_R15 ; Preserve the file pointer we were given
48C7C0 0C000000 # LOADI32_RAX %12 ; the Syscall # for SYS_BRK
BF 00000000 # LOADI32_RDI %0 ; Get current brk
0F05 # SYSCALL ; Let the kernel do the work
4989C6 # COPY_RAX_to_R14 ; Set our malloc pointer
48C7C0 0C000000 # LOADI32_RAX %12 ; the Syscall # for SYS_BRK
4C89F7 # COPY_R14_to_RDI ; Using current pointer
4881C7 00001000 # ADDI32_to_RDI %0x100000 ; Allocate 1MB
0F05 # SYSCALL ; Let the kernel do the work
# :core
5F # POP_RDI ; Get·the·actual·input name
4883FF 00 # CMP_RDI_Immediate8 !0 ; Check for null string
0F84 4F000000 # JE32 %done ; Hit null be done
BE 00000000 # LOADI32_RSI %0 ; prepare·read_only
BA 00000000 # LOADI32_RDX %0 ; prevent any interactions
48C7C0 02000000 # LOADI32_RAX %2 ; the·syscall·number·for·open()
0F05 # SYSCALL ; Now open that damn file
4989C5 # COPY_RAX_to_R13 ; Protect INPUT
# :keep
BA 00001000 # LOADI32_RDX %0x100000 ; set the size of chars we want
4C89F6 # COPY_R14_to_RSI ; Where to put it
4C89EF # COPY_R13_to_RDI ; Where are we reading from
48C7C0 00000000 # LOADI32_RAX %0 ; the syscall number for read
0F05 # SYSCALL ; call the Kernel
50 # PUSH_RAX ; Protect the number of bytes read
4889C2 # COPY_RAX_to_RDX ; Number of bytes to write
4C89F6 # COPY_R14_to_RSI ; What we are writing
4C89FF # COPY_R15_to_RDI ; Write to target file
48C7C0 01000000 # LOADI32_RAX %1 ; the syscall number for write
0F05 # SYSCALL ; call the Kernel
58 # POP_RAX ; Get bytes read
483D 00001000 # CMP_RAX_Immediate32 %0x100000 ; Check if buffer was fully used
0F84 CCFFFFFF # JE32 %keep ; Keep looping if was full
E9 A6FFFFFF # JMP32 %core ; Otherwise move to next file
# :done
; program completed Successfully
BF 00000000 # LOADI32_RDI %0 ; All is well
48C7C0 3C000000 # LOADI32_RAX %0x3C ; put the exit syscall number in eax
0F05 # SYSCALL ; Call it a good day
# :ELF_end