using X86Disassembler.X86.Operands;
namespace X86Disassembler.X86.Handlers.Sbb;
///
/// Handler for SBB r/m16, r16 instruction (0x19 with 0x66 prefix)
///
public class SbbRm16R16Handler : InstructionHandler
{
///
/// Initializes a new instance of the SbbRm16R16Handler class
///
/// The instruction decoder that owns this handler
public SbbRm16R16Handler(InstructionDecoder decoder)
: base(decoder)
{
}
///
/// Checks if this handler can decode the given opcode
///
/// The opcode to check
/// True if this handler can decode the opcode
public override bool CanHandle(byte opcode)
{
// Only handle opcode 0x19 when the operand size prefix IS present
return opcode == 0x19 && Decoder.HasOperandSizePrefix();
}
///
/// Decodes a SBB r/m16, r16 instruction
///
/// The opcode of the instruction
/// The instruction object to populate
/// True if the instruction was successfully decoded
public override bool Decode(byte opcode, Instruction instruction)
{
// Set the instruction type
instruction.Type = InstructionType.Sbb;
// Check if we have enough bytes for the ModR/M byte
if (!Decoder.CanReadByte())
{
return false;
}
// Read the ModR/M byte
// For SBB r/m16, r16 (0x19 with 0x66 prefix):
// - The r/m field with mod specifies the destination operand (register or memory)
// - The reg field specifies the source register
var (_, reg, _, destinationOperand) = ModRMDecoder.ReadModRM16();
// Create the register operand for the reg field (16-bit)
var sourceOperand = OperandFactory.CreateRegisterOperand(reg, 16);
// Set the structured operands
instruction.StructuredOperands =
[
destinationOperand,
sourceOperand
];
return true;
}
}