Lines Matching +full:75 +full:- +full:ec

4 # - Intel(R) 64 and IA-32 Architectures Software Developer's Manual Vol.2C
5 # (#326018-047US, June 2013)
8 # Table: table-name
9 # Referrer: escaped-name
10 # AVXcode: avx-code
11 # opcode: mnemonic|GrpXXX [operand1[,operand2...]] [(extra1)[,(extra2)...] [| 2nd-mnemonic ...]
13 # opcode: escape # escaped-name
21 # reg: mnemonic [operand1[,operand2...]] [(extra1)[,(extra2)...] [| 2nd-mnemonic ...]
37 # - (66): the last prefix is 0x66
38 # - (F3): the last prefix is 0xF3
39 # - (F2): the last prefix is 0xF2
40 # - (!F3) : the last prefix is not 0xF3 (including non-last prefix case)
41 # - (66&F2): Both 0x66 and 0xF2 prefixes are specified.
44 # - (!REX2): REX2 is not allowed
45 # - (REX2): REX2 variant e.g. JMPABS
50 # 0x00 - 0x0f
66 0f: escape # 2-byte escape
67 # 0x10 - 0x1f
84 # 0x20 - 0x2f
101 # 0x30 - 0x3f
118 # 0x40 - 0x4f
135 # 0x50 - 0x5f
152 # 0x60 - 0x6f
159 66: Operand-Size (Prefix)
160 67: Address-Size (Prefix)
169 # 0x70 - 0x7f
175 75: JNZ/JNE Jb (!REX2)
186 # 0x80 - 0x8f
203 # 0x90 - 0x9f
220 # 0xa0 - 0xaf
239 # 0xb0 - 0xbf
256 # 0xc0 - 0xcf
273 # 0xd0 - 0xdf
290 # 0xe0 - 0xef
292 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
293 # to 16 bits. In 32-bit mode, 0x66 is accepted by both Intel and AMD.
302 # With 0x66 prefix in 64-bit mode, for AMD CPUs immediate offset
303 # in "near" jumps and calls is 16-bit. For CALL,
304 # push of return address is 16-bit wide, RSP is decremented by 2
307 e9: JMP-near Jz (f64),(!REX2)
308 ea: JMP-far Ap (i64),(!REX2)
309 eb: JMP-short Jb (f64),(!REX2)
310 ec: IN AL,DX (!REX2)
314 # 0xf0 - 0xff
333 Table: 2-byte opcode (0x0f)
334 Referrer: 2-byte escape
336 # 0x0f 0x00-0x0f
355 # 0x0f 0x10-0x1f
359 # Many AVX instructions lack v1 superscript, according to Intel AVX-Prgramming
381 # 0x0f 0x20-0x2f
398 # 0x0f 0x30-0x3f
407 38: escape # 3-byte escape 1
409 3a: escape # 3-byte escape 2
415 # 0x0f 0x40-0x4f
432 # 0x0f 0x50-0x5f
449 # 0x0f 0x60-0x6f
466 # 0x0f 0x70-0x7f
472 75: pcmpeqw Pq,Qq | vpcmpeqw Vx,Hx,Wx (66),(v1)
484 # 0x0f 0x80-0x8f
502 # 0x0f 0x90-0x9f
519 # 0x0f 0xa0-0xaf
536 # 0x0f 0xb0-0xbf
553 # 0x0f 0xc0-0xcf
570 # 0x0f 0xd0-0xdf
587 # 0x0f 0xe0-0xef
600 ec: paddsb Pq,Qq | vpaddsb Vx,Hx,Wx (66),(v1)
604 # 0x0f 0xf0-0xff
623 Table: 3-byte opcode 1 (0x0f 0x38)
624 Referrer: 3-byte escape 1
626 # 0x0f 0x38 0x00-0x0f
643 # 0x0f 0x38 0x10-0x1f
660 # 0x0f 0x38 0x20-0x2f
677 # 0x0f 0x38 0x30-0x3f
694 # 0x0f 0x38 0x40-0x8f
724 # Skip 0x5f-0x61
731 # Skip 0x69-0x6b
733 # Skip 0x6d-0x6f
738 75: vpermi2b/w Vx,Hx,Wx (66),(ev)
761 # 0x0f 0x38 0x90-0xbf (FMA)
806 # 0x0f 0x38 0xc0-0xff
838 ec: CMPLXADD My,Gy,By (66),(v1),(o64)
856 Table: 3-byte opcode 2 (0x0f 0x3a)
857 Referrer: 3-byte escape 2
859 # 0x0f 0x3a 0x00-0xff
1140 ec: VPCOMccUB Vo,Ho,Wo,Ib
1400 0: xstore-rng
1401 1: xcrypt-ecb
1402 2: xcrypt-cbc
1403 4: xcrypt-cfb
1404 5: xcrypt-ofb
1407 # GrpXOP1-4 is shown in AMD APM Vol.3 Appendix A as XOP group #1-4