Open montekki opened 10 years ago
How to differentiate to segmented x86 addressing?
look at the binary's arch?
i would prefer to be arch-independent, if a human can understand the disasm, a parser should too..
On 11 Mar 2014, at 08:27, Fedor Sakharov notifications@github.com wrote:
look at the binary's arch?
— Reply to this email directly or view it on GitHub.
ping @montekki can you send a pr for that? checking for arch can be a dirty but working solution, so having this done with a couple of tests would be good for me
also we can differentiate if the number starts with # instead of just 0x and if it contains :
anyone?
Can we have test-case or something to reproduce this 0xXXX:16 syntax ?
from me?
On 19 Feb 2017, at 19:49, Maijin notifications@github.com wrote:
Can we have test-case or something to reproduce this 0xXXX:16 syntax ?
Whoever got something to reproduce
Without a test case this issue is quite difficult to handle/understand/fix.
if a hexadecimal address has a suffix (say, "0xbeef:16") it won't be substituted with symbol name: