namespace X86Disassembler.X86.Handlers.Sbb; /// /// Handler for SBB r/m32, imm32 instruction (0x81 /3) /// public class SbbImmFromRm32Handler : InstructionHandler { /// /// Initializes a new instance of the SbbImmFromRm32Handler class /// /// The buffer containing the code to decode /// The instruction decoder that owns this handler /// The length of the buffer public SbbImmFromRm32Handler(byte[] codeBuffer, InstructionDecoder decoder, int length) : base(codeBuffer, decoder, length) { } /// /// Checks if this handler can decode the given opcode /// /// The opcode to check /// True if this handler can decode the opcode public override bool CanHandle(byte opcode) { if (opcode != 0x81) return false; // Check if the reg field of the ModR/M byte is 3 (SBB) if (!Decoder.CanReadByte()) return false; byte modRM = CodeBuffer[Decoder.GetPosition()]; byte reg = (byte) ((modRM & 0x38) >> 3); return reg == 3; // 3 = SBB } /// /// Decodes a SBB r/m32, imm32 instruction /// /// The opcode of the instruction /// The instruction object to populate /// True if the instruction was successfully decoded public override bool Decode(byte opcode, Instruction instruction) { // Set the mnemonic instruction.Mnemonic = "sbb"; if (!Decoder.CanReadByte()) { return false; } // Read the ModR/M byte var (mod, reg, rm, destOperand) = ModRMDecoder.ReadModRM(); // Read the immediate value if (!Decoder.CanReadUInt()) { return false; } // Read the immediate value in little-endian format var imm32 = Decoder.ReadUInt32(); // Format the immediate value as expected by the tests (0x12345678) // Note: The bytes are reversed to match the expected format in the tests string immStr = $"0x{imm32:X8}"; // Set the operands instruction.Operands = $"{destOperand}, {immStr}"; return true; } }