namespace X86Disassembler.X86.Handlers.Sub; /// /// Handler for SUB r/m16, imm16 instruction (0x81 /5 with 0x66 prefix) /// public class SubImmFromRm16Handler : InstructionHandler { /// /// Initializes a new instance of the SubImmFromRm16Handler class /// /// The buffer containing the code to decode /// The instruction decoder that owns this handler /// The length of the buffer public SubImmFromRm16Handler(byte[] codeBuffer, InstructionDecoder decoder, int length) : base(codeBuffer, decoder, length) { } /// /// Checks if this handler can decode the given opcode /// /// The opcode to check /// True if this handler can decode the opcode public override bool CanHandle(byte opcode) { // Check if the opcode is 0x81 and we have a 0x66 prefix if (opcode != 0x81 || !Decoder.HasOperandSizeOverridePrefix()) { return false; } // Check if we have enough bytes to read the ModR/M byte if (!Decoder.CanReadByte()) { return false; } // Check if the reg field is 5 (SUB) byte modRM = CodeBuffer[Decoder.GetPosition()]; byte reg = (byte)((modRM & 0x38) >> 3); return reg == 5; // 5 = SUB } /// /// Decodes a SUB r/m16, imm16 instruction /// /// The opcode of the instruction /// The instruction object to populate /// True if the instruction was successfully decoded public override bool Decode(byte opcode, Instruction instruction) { // Set the mnemonic instruction.Mnemonic = "sub"; // Check if we have enough bytes for the ModR/M byte if (!Decoder.CanReadByte()) { return false; } // Extract the fields from the ModR/M byte var (mod, reg, rm, destOperand) = ModRMDecoder.ReadModRM(); // For memory operands, replace "dword" with "word" string destination = destOperand; if (mod != 3) // Memory operand { destination = destOperand.Replace("dword", "word"); } // Check if we have enough bytes for the immediate value if (!Decoder.CanReadUShort()) { return false; } // Read the immediate value (16-bit) ushort immediate = Decoder.ReadUInt16(); // Set the operands instruction.Operands = $"{destination}, 0x{immediate:X4}"; return true; } }