Lines Matching +full:jc +full:- +full:42

4 # - Intel(R) 64 and IA-32 Architectures Software Developer's Manual Vol.2C
5 # (#326018-047US, June 2013)
8 # Table: table-name
9 # Referrer: escaped-name
10 # AVXcode: avx-code
11 # opcode: mnemonic|GrpXXX [operand1[,operand2...]] [(extra1)[,(extra2)...] [| 2nd-mnemonic ...]
13 # opcode: escape # escaped-name
21 # reg: mnemonic [operand1[,operand2...]] [(extra1)[,(extra2)...] [| 2nd-mnemonic ...]
31 # - (66): the last prefix is 0x66
32 # - (F3): the last prefix is 0xF3
33 # - (F2): the last prefix is 0xF2
34 # - (!F3) : the last prefix is not 0xF3 (including non-last prefix case)
35 # - (66&F2): Both 0x66 and 0xF2 prefixes are specified.
40 # 0x00 - 0x0f
56 0f: escape # 2-byte escape
57 # 0x10 - 0x1f
74 # 0x20 - 0x2f
91 # 0x30 - 0x3f
108 # 0x40 - 0x4f
111 42: INC eDX (i64) | REX.X (o64)
125 # 0x50 - 0x5f
142 # 0x60 - 0x6f
149 66: Operand-Size (Prefix)
150 67: Address-Size (Prefix)
159 # 0x70 - 0x7f
162 72: JB/JNAE/JC Jb
176 # 0x80 - 0x8f
193 # 0x90 - 0x9f
210 # 0xa0 - 0xaf
229 # 0xb0 - 0xbf
246 # 0xc0 - 0xcf
263 # 0xd0 - 0xdf
280 # 0xe0 - 0xef
282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
283 # to 16 bits. In 32-bit mode, 0x66 is accepted by both Intel and AMD.
292 # With 0x66 prefix in 64-bit mode, for AMD CPUs immediate offset
293 # in "near" jumps and calls is 16-bit. For CALL,
294 # push of return address is 16-bit wide, RSP is decremented by 2
297 e9: JMP-near Jz (f64)
298 ea: JMP-far Ap (i64)
299 eb: JMP-short Jb (f64)
304 # 0xf0 - 0xff
323 Table: 2-byte opcode (0x0f)
324 Referrer: 2-byte escape
326 # 0x0f 0x00-0x0f
345 # 0x0f 0x10-0x1f
349 # Many AVX instructions lack v1 superscript, according to Intel AVX-Prgramming
371 # 0x0f 0x20-0x2f
388 # 0x0f 0x30-0x3f
397 38: escape # 3-byte escape 1
399 3a: escape # 3-byte escape 2
405 # 0x0f 0x40-0x4f
408 42: CMOVB/C/NAE Gv,Ev | kandnw/q Vk,Hk,Uk | kandnb/d Vk,Hk,Uk (66)
422 # 0x0f 0x50-0x5f
439 # 0x0f 0x60-0x6f
456 # 0x0f 0x70-0x7f
474 # 0x0f 0x80-0x8f
478 82: JB/JC/JNAE Jz (f64)
492 # 0x0f 0x90-0x9f
509 # 0x0f 0xa0-0xaf
526 # 0x0f 0xb0-0xbf
543 # 0x0f 0xc0-0xcf
560 # 0x0f 0xd0-0xdf
577 # 0x0f 0xe0-0xef
594 # 0x0f 0xf0-0xff
613 Table: 3-byte opcode 1 (0x0f 0x38)
614 Referrer: 3-byte escape 1
616 # 0x0f 0x38 0x00-0x0f
633 # 0x0f 0x38 0x10-0x1f
650 # 0x0f 0x38 0x20-0x2f
667 # 0x0f 0x38 0x30-0x3f
684 # 0x0f 0x38 0x40-0x8f
687 42: vgetexpps/d Vx,Wx (66),(ev)
714 # Skip 0x5f-0x61
721 # Skip 0x69-0x6f
749 # 0x0f 0x38 0x90-0xbf (FMA)
792 # 0x0f 0x38 0xc0-0xff
819 Table: 3-byte opcode 2 (0x0f 0x3a)
820 Referrer: 3-byte escape 2
822 # 0x0f 0x3a 0x00-0xff
869 42: vmpsadbw Vx,Hx,Wx,Ib (66),(v1) | vdbpsadbw Vx,Hx,Wx,Ib (66),(evo)
936 42: vgetexpph Vx,Wx (66),(ev)
1184 0: xstore-rng
1185 1: xcrypt-ecb
1186 2: xcrypt-cbc
1187 4: xcrypt-cfb
1188 5: xcrypt-ofb