123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051 |
- mov ah, 0x0e
- ; attempt 1
- ; Fails because it tries to print the memory address (i.e. pointer)
- ; not its actual contents
- mov al, "1"
- int 0x10
- mov al, the_secret
- int 0x10
- ; attempt 2
- ; It tries to print the memory address of 'the_secret' which is the correct approach.
- ; However, BIOS places our bootsector binary at address 0x7c00
- ; so we need to add that padding beforehand. We'll do that in attempt 3
- mov al, "2"
- int 0x10
- mov al, [the_secret]
- int 0x10
- ; attempt 3
- ; Add the BIOS starting offset 0x7c00 to the memory address of the X
- ; and then dereference the contents of that pointer.
- ; We need the help of a different register 'bx' because 'mov al, [ax]' is illegal.
- ; A register can't be used as source and destination for the same command.
- mov al, "3"
- int 0x10
- mov bx, the_secret
- add bx, 0x7c00
- mov al, [bx]
- int 0x10
- ; attempt 4
- ; We try a shortcut since we know that the X is stored at byte 0x2d in our binary
- ; That's smart but ineffective, we don't want to be recounting label offsets
- ; every time we change the code
- mov al, "4"
- int 0x10
- mov al, [0x7c2d]
- int 0x10
- jmp $ ; infinite loop
- the_secret:
- ; ASCII code 0x58 ('X') is stored just before the zero-padding.
- ; On this code that is at byte 0x2d (check it out using 'xxd file.bin')
- db "X"
- ; zero padding and magic bios number
- times 510-($-$$) db 0
- dw 0xaa55
|