using X86Disassembler.X86.Operands; namespace X86Disassembler.X86.Handlers.Sbb; /// /// Handler for SBB r/m16, r16 instruction (0x19 with 0x66 prefix) /// public class SbbRm16R16Handler : InstructionHandler { /// /// Initializes a new instance of the SbbRm16R16Handler class /// /// The instruction decoder that owns this handler public SbbRm16R16Handler(InstructionDecoder decoder) : base(decoder) { } /// /// Checks if this handler can decode the given opcode /// /// The opcode to check /// True if this handler can decode the opcode public override bool CanHandle(byte opcode) { // Only handle opcode 0x19 when the operand size prefix IS present return opcode == 0x19 && Decoder.HasOperandSizePrefix(); } /// /// Decodes a SBB r/m16, r16 instruction /// /// The opcode of the instruction /// The instruction object to populate /// True if the instruction was successfully decoded public override bool Decode(byte opcode, Instruction instruction) { // Set the instruction type instruction.Type = InstructionType.Sbb; // Check if we have enough bytes for the ModR/M byte if (!Decoder.CanReadByte()) { return false; } // Read the ModR/M byte // For SBB r/m16, r16 (0x19 with 0x66 prefix): // - The r/m field with mod specifies the destination operand (register or memory) // - The reg field specifies the source register var (_, reg, _, destinationOperand) = ModRMDecoder.ReadModRM16(); // Create the register operand for the reg field (16-bit) var sourceOperand = OperandFactory.CreateRegisterOperand(reg, 16); // Set the structured operands instruction.StructuredOperands = [ destinationOperand, sourceOperand ]; return true; } }