2025-04-13 03:08:37 +03:00
|
|
|
namespace X86DisassemblerTests;
|
|
|
|
|
|
|
|
using System;
|
|
|
|
using Xunit;
|
|
|
|
using X86Disassembler.X86;
|
|
|
|
|
|
|
|
/// <summary>
|
|
|
|
/// Tests for specific instruction sequences that were problematic
|
|
|
|
/// </summary>
|
|
|
|
public class InstructionSequenceTests
|
|
|
|
{
|
|
|
|
/// <summary>
|
2025-04-13 03:38:50 +03:00
|
|
|
/// Tests that the disassembler correctly handles the sequence at address 0x10001C4B
|
|
|
|
/// </summary>
|
2025-04-13 03:08:37 +03:00
|
|
|
[Fact]
|
|
|
|
public void Disassembler_HandlesJmpSequence_Correctly()
|
|
|
|
{
|
|
|
|
// Arrange - This is the sequence from address 0x10001C4B
|
|
|
|
byte[] codeBuffer = new byte[] { 0x7D, 0x05, 0x83, 0xC5, 0x18, 0xEB, 0x03, 0x83, 0xC5, 0xB8, 0x8B, 0x56, 0x04 };
|
|
|
|
var disassembler = new Disassembler(codeBuffer, 0x10001C4A);
|
|
|
|
|
|
|
|
// Act
|
|
|
|
var instructions = disassembler.Disassemble();
|
|
|
|
|
|
|
|
// Assert
|
|
|
|
Assert.True(instructions.Count >= 5, $"Expected at least 5 instructions, but got {instructions.Count}");
|
|
|
|
|
|
|
|
// First instruction: JGE LAB_10001c51 (JNL is an alternative mnemonic for JGE)
|
|
|
|
Assert.True(instructions[0].Mnemonic == "jge" || instructions[0].Mnemonic == "jnl",
|
|
|
|
$"Expected 'jge' or 'jnl', but got '{instructions[0].Mnemonic}'");
|
|
|
|
// Don't check the exact target address as it depends on the base address calculation
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("0x00000007", instructions[0].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Second instruction: ADD EBP, 0x18
|
|
|
|
Assert.Equal("add", instructions[1].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("ebp, 0x00000018", instructions[1].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Third instruction: JMP LAB_10001c54
|
|
|
|
Assert.Equal("jmp", instructions[2].Mnemonic);
|
|
|
|
// Don't check the exact target address as it depends on the base address calculation
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("0x0000000A", instructions[2].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Fourth instruction: ADD EBP, -0x48
|
|
|
|
Assert.Equal("add", instructions[3].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("ebp, 0xFFFFFFB8", instructions[3].Operands); // -0x48 sign-extended to 32-bit
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Fifth instruction: MOV EDX, dword ptr [ESI + 0x4]
|
|
|
|
Assert.Equal("mov", instructions[4].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("dword ptr [esi+0x04], edx", instructions[4].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/// <summary>
|
|
|
|
/// Tests that the disassembler correctly handles the sequence at address 0x00001C4B
|
|
|
|
/// </summary>
|
|
|
|
[Fact]
|
|
|
|
public void Disassembler_HandlesAddSequence_Correctly()
|
|
|
|
{
|
|
|
|
// Arrange - This is the sequence from address 0x00001C4B
|
|
|
|
byte[] codeBuffer = new byte[] { 0x05, 0x83, 0xC5, 0x18, 0xEB, 0x03, 0x83, 0xC5, 0xB8, 0x8B, 0x56, 0x04, 0x8A, 0x02, 0x8D, 0x4A, 0x18 };
|
|
|
|
var disassembler = new Disassembler(codeBuffer, 0x00001C4B);
|
|
|
|
|
|
|
|
// Act
|
|
|
|
var instructions = disassembler.Disassemble();
|
|
|
|
|
|
|
|
// Assert
|
|
|
|
Assert.True(instructions.Count >= 7, $"Expected at least 7 instructions, but got {instructions.Count}");
|
|
|
|
|
|
|
|
// First instruction should be ADD EAX, ?? (incomplete immediate)
|
|
|
|
Assert.Equal("add", instructions[0].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("eax, ??", instructions[0].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Second instruction should be ADD EBP, 0x18
|
|
|
|
Assert.Equal("add", instructions[1].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("ebp, 0x00000018", instructions[1].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Third instruction should be JMP
|
|
|
|
Assert.Equal("jmp", instructions[2].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("0x00000009", instructions[2].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Fourth instruction should be ADD EBP, -0x48
|
|
|
|
Assert.Equal("add", instructions[3].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("ebp, 0xFFFFFFB8", instructions[3].Operands); // -0x48 sign-extended to 32-bit
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Fifth instruction should be MOV EDX, [ESI+0x4]
|
|
|
|
Assert.Equal("mov", instructions[4].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("dword ptr [esi+0x04], edx", instructions[4].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Sixth instruction should be MOV AL, [EDX]
|
|
|
|
Assert.Equal("mov", instructions[5].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("dword ptr [edx], al", instructions[5].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
|
|
|
|
// Seventh instruction should be LEA ECX, [EDX+0x18]
|
|
|
|
Assert.Equal("lea", instructions[6].Mnemonic);
|
2025-04-13 03:38:50 +03:00
|
|
|
Assert.Equal("ecx, [edx+0x18]", instructions[6].Operands);
|
2025-04-13 03:08:37 +03:00
|
|
|
}
|
|
|
|
}
|