insx86e2.h

来自「开放源码的编译器open watcom 1.6.0版的源代码」· C头文件 代码 · 共 168 行 · 第 1/2 页

H
168
字号
inspick( mulpd,         "mulpd",        0x0000590f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( orpd,          "orpd",         0x0000560f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( packssdw_2,    "packssdw",     0x00006b0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( packsswb_2,    "packsswb",     0x0000630f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( packuswb_2,    "packuswb",     0x0000670f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddb_2,       "paddb",        0x0000fc0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddd_2,       "paddd",        0x0000fe0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddq_2,       "paddq",        0x0000d40f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddsb_2,      "paddsb",       0x0000ec0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddsw_2,      "paddsw",       0x0000ed0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddusb_2,     "paddusb",      0x0000dc0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddusw_2,     "paddusw",      0x0000dd0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( paddw_2,       "paddw",        0x0000fd0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pand_2,        "pand",         0x0000db0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pandn_2,       "pandn",        0x0000df0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pavgb_2,       "pavgb",        0x0000e00f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pavgw_2,       "pavgw",        0x0000e30f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pcmpeqb_2,     "pcmpeqb",      0x0000740f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pcmpeqd_2,     "pcmpeqd",      0x0000760f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pcmpeqw_2,     "pcmpeqw",      0x0000750f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pcmpgtb_2,     "pcmpgtb",      0x0000640f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pcmpgtd_2,     "pcmpgtd",      0x0000660f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pcmpgtw_2,     "pcmpgtw",      0x0000650f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pextrw_2,      "pextrw",       0x00c0c50f,     0x00c0ffff,     X86RegModRMMixedImm )     // sse2 
inspick( pinsrw00_2,    "pinsrw",       0x0000c40f,     0x00c0ffff,     X86XMMRegModRMMixedImm )  // sse2 
inspick( pinsrw01_2,    "pinsrw",       0x0040c40f,     0x00c0ffff,     X86XMMRegModRMMixedImm )  // sse2 
inspick( pinsrw10_2,    "pinsrw",       0x0080c40f,     0x00c0ffff,     X86XMMRegModRMMixedImm )  // sse2 
inspick( pinsrw11_2,    "pinsrw",       0x00c0c40f,     0x00c0ffff,     X86XMMRegModRMMixedImm )  // sse2 
inspick( pmaddwd_2,     "pmaddwd",      0x0000f50f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pmaxsw_2,      "pmaxsw",       0x0000ee0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pmaxub_2,      "pmaxub",       0x0000de0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pminsw_2,      "pminsw",       0x0000ea0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pminub_2,      "pminub",       0x0000da0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pmovmskb_2,    "pmovmskb",     0x00c0d70f,     0x00c0ffff,     X86RegModRMMixed )        // sse2 
inspick( pmulhuw_2,     "pmulhuw",      0x0000e40f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pmulhw_2,      "pmulhw",       0x0000e50f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pmullw_2,      "pmullw",       0x0000d50f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pmuludq_2,     "pmuludq",      0x0000f40f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( por_2,         "por",          0x0000eb0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psadbw_2,      "psadbw",       0x0000f60f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pshufd,        "pshufd",       0x0000700f,     0x0000ffff,     X86XMMRegModRMImm )       // sse2 
inspick( pslldq,        "pslldq",       0x00f8730f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( pslld_2,       "pslld",        0x00f0720f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( pslld_4,       "pslld",        0x0000f20f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psllq_2,       "psllq",        0x00f0730f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psllq_4,       "psllq",        0x0000f30f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psllw_2,       "psllw",        0x00f0710f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psllw_4,       "psllw",        0x0000f10f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psrad_2,       "psrad",        0x00e0720f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psrad_4,       "psrad",        0x0000e20f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psraw_2,       "psraw",        0x00e0710f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psraw_4,       "psraw",        0x0000e10f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psrldq,        "psrldq",       0x00d8730f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psrld_2,       "psrld",        0x00d0720f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psrld_4,       "psrld",        0x0000d20f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psrlq_2,       "psrlq",        0x00d0730f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psrlq_4,       "psrlq",        0x0000d30f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psrlw_2,       "psrlw",        0x00d0710f,     0x00f8ffff,     X86XMMRegImm )            // sse2 
inspick( psrlw_4,       "psrlw",        0x0000d10f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubb_2,       "psubb",        0x0000f80f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubd_2,       "psubd",        0x0000fa0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubq_2,       "psubq",        0x0000fb0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubsb_2,      "psubsb",       0x0000e80f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubsw_2,      "psubsw",       0x0000e90f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubusb_2,     "psubusb",      0x0000d80f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubusw_2,     "psubusw",      0x0000d90f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( psubw_2,       "psubw",        0x0000f90f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpckhqdq,    "punpckhqdq",   0x00006d0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpckhbw_2,   "punpckhbw",    0x0000680f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpckhdq_2,   "punpckhdq",    0x00006a0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpckhwd_2,   "punpckhwd",    0x0000690f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpcklqdq,    "punpcklqdq",   0x00006c0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpcklbw_2,   "punpcklbw",    0x0000600f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpckldq_2,   "punpckldq",    0x0000620f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( punpcklwd_2,   "punpcklwd",    0x0000610f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( pxor_2,        "pxor",         0x0000ef0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( shufpd,        "shufpd",       0x0000c60f,     0x0000ffff,     X86XMMRegModRMImm )       // sse2 
inspick( sqrtpd,        "sqrtpd",       0x0000510f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( subpd,         "subpd",        0x00005c0f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( ucomisd,       "ucomisd",      0x00002e0f,     0x0000ffff,     X86XMMRegModRM64 )        // sse2 
inspick( unpckhpd,      "unpckhpd",     0x0000150f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( unpcklpd,      "unpcklpd",     0x0000140f,     0x0000ffff,     X86XMMRegModRM )          // sse2 
inspick( xorpd,         "xorpd",        0x0000570f,     0x0000ffff,     X86XMMRegModRM )          // sse2 

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?