diff options
| author | Camille Mougey <commial@gmail.com> | 2016-01-30 16:43:30 +0100 |
|---|---|---|
| committer | Camille Mougey <commial@gmail.com> | 2016-01-30 16:43:30 +0100 |
| commit | dbf10438741443d59b8db500905d3d110a34c73c (patch) | |
| tree | 678a6229f3ab9bd93207faedc9425d89da56275a /test | |
| parent | 32b2b3ea15b42cbc76cb49119e76ee6e031f72ce (diff) | |
| parent | 7ed8f7c5638cdca4950d05b8021233d13e339fb7 (diff) | |
| download | miasm-dbf10438741443d59b8db500905d3d110a34c73c.tar.gz miasm-dbf10438741443d59b8db500905d3d110a34c73c.zip | |
Merge pull request #313 from serpilliere/x86_fix
X86 fix
Diffstat (limited to 'test')
| -rw-r--r-- | test/arch/x86/arch.py | 36 |
1 files changed, 32 insertions, 4 deletions
diff --git a/test/arch/x86/arch.py b/test/arch/x86/arch.py index dfe4ef91..6d20d473 100644 --- a/test/arch/x86/arch.py +++ b/test/arch/x86/arch.py @@ -767,20 +767,41 @@ reg_tests = [ "e830221100"), (m32, "00000000 CALL DWORD PTR [EAX]", "ff10"), + (m32, "00000000 CALL EAX", + "ffd0"), + (m32, "00000000 CALL DWORD PTR [EAX+EBX]", + "ff1403"), + (m32, "00000000 CALL DWORD PTR [EAX+EBX+0x11223344]", + "ff941844332211"), + + + + + (m64, "00000000 CALL QWORD PTR [RAX]", "ff10"), - (m32, "00000000 CALL 0x6655:0x44332211", "9a112233445566"), (m32, "00000000 CALL 0x6655:0xFF332211", "9a112233FF5566"), - (m32, "00000000 CALL DWORD PTR [0xFFFFFFA3]", + (m64, "00000000 CALL QWORD PTR [RAX+RBX]", + "ff1403"), + (m64, "00000000 CALL QWORD PTR [RAX+RBX+0x11223344]", + "ff941844332211"), + + + (m32, "00000000 CALL FAR DWORD PTR [EAX]", + "ff18"), + (m32, "00000000 CALL FAR DWORD PTR [EAX+EBX]", + "ff1c03"), + (m32, "00000000 CALL FAR DWORD PTR [EAX+EBX+0x11223344]", + "ff9c1844332211"), + (m32, "00000000 CALL FAR DWORD PTR [0xFFFFFFA3]", "FF1DA3FFFFFF"), - (m64, "00000000 CALL QWORD PTR [RIP+0xFFFFFFFFFFFFFFA3]", + (m64, "00000000 CALL FAR QWORD PTR [RIP+0xFFFFFFFFFFFFFFA3]", "FF1DA3FFFFFF"), - (m16, "00000000 CBW", "98"), (m16, "00000000 CWDE", @@ -2419,6 +2440,13 @@ reg_tests = [ (m64, "00000000 JMP RDX", "FFE2"), + (m32, "00000000 JMP FAR DWORD PTR [EAX]", + "FF28"), + (m64, "00000000 JMP FAR DWORD PTR [RAX]", + "FF28"), + (m32, "00000000 JMP 0x6655:0x44332211", + "EA112233445566"), + (m32, "00000000 XGETBV", "0f01d0"), |