Advertisement
Guest User

Untitled

a guest
May 7th, 2017
236
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.29 KB | None | 0 0
  1. 00000000 <start1>:
  2. 0: e8 .byte 0xe8
  3. ...
  4.  
  5. 00000003 <get_ip>:
  6. 3: b8 03 00 cd 10 mov eax,0x10cd0003
  7. 8: 66 31 db xor bx,bx
  8. b: 5b pop ebx
  9. c: 83 e3 f0 and ebx,0xfffffff0
  10. f: 8c c8 mov eax,cs
  11. 11: 8e d8 mov ds,eax
  12. 13: 8b 87 45 00 01 d8 mov eax,DWORD PTR [edi-0x27feffbb]
  13. 19: 89 87 45 00 8b 87 mov DWORD PTR [edi-0x7874ffbb],eax
  14. 1f: aa stos BYTE PTR es:[edi],al
  15. 20: 00 01 add BYTE PTR [ecx],al
  16. 22: d8 89 87 aa 00 eb fmul DWORD PTR [ecx-0x14ff5579]
  17. ...
  18.  
  19. 00000029 <flush_conv>:
  20. 29: e4 92 in al,0x92
  21. 2b: 0c 02 or al,0x2
  22. 2d: e6 92 out 0x92,al
  23. 2f: 0f 01 97 a8 00 fa e4 lgdtd [edi-0x1b05ff58]
  24. 36: 70 0c jo 44 <jmp_addr+0x1>
  25. 38: 80 e6 70 and dh,0x70
  26. 3b: 0f 20 c0 mov eax,cr0
  27. 3e: 0c 01 or al,0x1
  28. 40: 0f 22 c0 mov cr0,eax
  29.  
  30. 00000043 <jmp_addr>:
  31. 43: 66 ea 4b 00 00 00 jmp 0x0:0x4b
  32. 49: 08 00 or BYTE PTR [eax],al
  33.  
  34. 0000004b <pm_entry>:
  35. 4b: b8 10 00 00 00 mov eax,0x10
  36. 50: 8e d8 mov ds,eax
  37. 52: 8e c0 mov es,eax
  38. 54: 8e e0 mov fs,eax
  39. 56: 8e e8 mov gs,eax
  40. 58: 8d bb 77 00 00 00 lea edi,[ebx+0x77]
  41. 5e: be 00 80 0b 00 mov esi,0xb8000
  42. 63: b4 07 mov ah,0x7
  43.  
  44. 00000065 <print>:
  45. 65: 3e 8a 07 mov al,BYTE PTR ds:[edi]
  46. 68: 84 c0 test al,al
  47. 6a: 74 09 je 75 <exit>
  48. 6c: 3e 66 89 06 mov WORD PTR ds:[esi],ax
  49. 70: 46 inc esi
  50. 71: 46 inc esi
  51. 72: 47 inc edi
  52. 73: eb f0 jmp 65 <print>
  53.  
  54. 00000075 <exit>:
  55. 75: eb fe jmp 75 <exit>
  56.  
  57. 00000077 <msg>:
  58. 77: 49 dec ecx
  59. 78: 6e outs dx,BYTE PTR ds:[esi]
  60. 79: 20 70 72 and BYTE PTR [eax+0x72],dh
  61. 7c: 6f outs dx,DWORD PTR ds:[esi]
  62. 7d: 74 65 je e4 <kernel_start+0x36>
  63. 7f: 63 74 65 64 arpl WORD PTR [ebp+eiz*2+0x64],si
  64. 83: 20 6d 6f and BYTE PTR [ebp+0x6f],ch
  65. 86: 64 65 20 21 fs and BYTE PTR gs:[ecx],ah
  66. 8a: 00 90 90 90 90 90 add BYTE PTR [eax-0x6f6f6f70],dl
  67.  
  68. 00000090 <gdt>:
  69. ...
  70. 98: ff (bad)
  71. 99: ff 00 inc DWORD PTR [eax]
  72. 9b: 00 00 add BYTE PTR [eax],al
  73. 9d: 9a cf 00 ff ff 00 00 call 0x0:0xffff00cf
  74. a4: 00 .byte 0x0
  75. a5: 92 xchg edx,eax
  76. a6: cf iret
  77. ...
  78.  
  79. 000000a8 <gdtr>:
  80. a8: 17 pop ss
  81. ...
  82.  
  83. 000000aa <gdt_addr>:
  84. aa: 90 nop
  85. ab: 00 00 add BYTE PTR [eax],al
  86. ...
  87.  
  88. 000000ae <kernel_start>:
  89. ae: 66 55 push bp
  90. b0: 66 89 e5 mov bp,sp
  91. b3: 66 83 ec 10 sub sp,0x10
  92. b7: 67 66 c7 45 fc 00 80 mov WORD PTR [di-0x4],0x8000
  93. be: 0b 00 or eax,DWORD PTR [eax]
  94. c0: 67 66 c7 45 f8 00 00 mov WORD PTR [di-0x8],0x0
  95. c7: 00 00 add BYTE PTR [eax],al
  96. c9: eb 2d jmp f8 <kernel_start+0x4a>
  97. cb: 67 66 8b 55 f8 mov dx,WORD PTR [di-0x8]
  98. d0: 67 66 8b 45 fc mov ax,WORD PTR [di-0x4]
  99. d5: 66 01 d0 add ax,dx
  100. d8: 67 c6 00 21 mov BYTE PTR [bx+si],0x21
  101. dc: 67 66 8b 45 f8 mov ax,WORD PTR [di-0x8]
  102. e1: 67 66 8d 50 01 lea dx,[bx+si+0x1]
  103. e6: 67 66 8b 45 fc mov ax,WORD PTR [di-0x4]
  104. eb: 66 01 d0 add ax,dx
  105. ee: 67 c6 00 0f mov BYTE PTR [bx+si],0xf
  106. f2: 67 66 83 45 f8 02 add WORD PTR [di-0x8],0x2
  107. f8: 67 66 81 7d f8 9f 0f cmp WORD PTR [di-0x8],0xf9f
  108. ff: 00 00 add BYTE PTR [eax],al
  109. 101: 7e c8 jle cb <kernel_start+0x1d>
  110. 103: 90 nop
  111. 104: 66 c9 leavew
  112. 106: 66 c3 retw
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement