Skip to content
Snippets Groups Projects
Commit 90b0aef4 authored by Nguyen Anh Quynh's avatar Nguyen Anh Quynh
Browse files

regress: add new test to x64_issue9.py

parent 28cbb4dd
Loading
...@@ -23,6 +23,9 @@ class TestX86(regress.RegressTest): ...@@ -23,6 +23,9 @@ class TestX86(regress.RegressTest):
encoding, _ = ks.asm(b"ADD QWORD PTR [0x7FF68481C8ED], 0x1", 0x7FF6845CB982) encoding, _ = ks.asm(b"ADD QWORD PTR [0x7FF68481C8ED], 0x1", 0x7FF6845CB982)
self.assertEqual(encoding, [ 0x48, 0x83, 0x05, 0x63, 0x0F, 0x25, 0x00, 0x01 ]) self.assertEqual(encoding, [ 0x48, 0x83, 0x05, 0x63, 0x0F, 0x25, 0x00, 0x01 ])
encoding, _ = ks.asm(b"JMP [0x123456789]", 0x123456789)
self.assertEqual(encoding, [ 0xFF, 0x25, 0xFA, 0xFF, 0xFF, 0xFF ])
encoding, _ = ks.asm(b"MOV RAX, QWORD PTR DS:[0x1234567890]", 0x7FFCA9FF1977) encoding, _ = ks.asm(b"MOV RAX, QWORD PTR DS:[0x1234567890]", 0x7FFCA9FF1977)
self.assertEqual(encoding, [ 0x48, 0xA1, 0x90, 0x78, 0x56, 0x34, 0x12, 0x00, 0x00, 0x00 ]) self.assertEqual(encoding, [ 0x48, 0xA1, 0x90, 0x78, 0x56, 0x34, 0x12, 0x00, 0x00, 0x00 ])
......
...@@ -61,7 +61,7 @@ runTest(8, False, 0x405EF0, [0xE8, 0x06, 0xFF, 0xFF, 0xFF], "CALL 0x00405DFB") ...@@ -61,7 +61,7 @@ runTest(8, False, 0x405EF0, [0xE8, 0x06, 0xFF, 0xFF, 0xFF], "CALL 0x00405DFB")
#runTest(11, True, 0x7FFCAA022104, [0xEB, 0xF9], "JMP SHORT 0x7FFCAA0220FF") #runTest(11, True, 0x7FFCAA022104, [0xEB, 0xF9], "JMP SHORT 0x7FFCAA0220FF")
runTest(12, True, 0x7FFCA9FF197C, [0xE9, 0x35, 0x64, 0x93, 0x53], "JMP 0x7FFCFD927DB6") runTest(12, True, 0x7FFCA9FF197C, [0xE9, 0x35, 0x64, 0x93, 0x53], "JMP 0x7FFCFD927DB6")
runTest(13, True, 0x7FFCAA022104, [0xE9, 0x7C, 0xF4, 0xFC, 0xFF], "JMP 0x7FFCA9FF1585") runTest(13, True, 0x7FFCAA022104, [0xE9, 0x7C, 0xF4, 0xFC, 0xFF], "JMP 0x7FFCA9FF1585")
runTest(14, True, 0x123456789, [0xFF, 0x25, 0xFA, 0xFF, 0xFF, 0xFF], "JMP QWORD[0x123456789]") #runTest(14, True, 0x123456789, [0xFF, 0x25, 0xFA, 0xFF, 0xFF, 0xFF], "JMP QWORD [0x123456789]")
runTest(15, True, 0x7FFCA9FF1977, [0xFF, 0x25, 0xFA, 0x00, 0xFF, 0xFF], "JMP QWORD PTR DS:[0x7FFCA9FE1A77]") runTest(15, True, 0x7FFCA9FF1977, [0xFF, 0x25, 0xFA, 0x00, 0xFF, 0xFF], "JMP QWORD PTR DS:[0x7FFCA9FE1A77]")
runTest(16, False, 0x405C6A, [0xFF, 0x35, 0xF4, 0x0A, 0x47, 0x00], "PUSH DWORD PTR DS:[0x470AF4]") runTest(16, False, 0x405C6A, [0xFF, 0x35, 0xF4, 0x0A, 0x47, 0x00], "PUSH DWORD PTR DS:[0x470AF4]")
runTest(17, False, 0x405C92, [0x8B, 0x45, 0x08], "MOV EAX,DWORD PTR SS:[EBP+8]") runTest(17, False, 0x405C92, [0x8B, 0x45, 0x08], "MOV EAX,DWORD PTR SS:[EBP+8]")
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment