• Top
    • Documentation
    • Books
    • Boolean-reasoning
    • Projects
    • Debugging
    • Community
    • Std
    • Proof-automation
    • Macro-libraries
    • ACL2
    • Interfacing-tools
    • Hardware-verification
    • Software-verification
      • Kestrel-books
      • X86isa
        • Program-execution
        • Sdm-instruction-set-summary
        • Tlb
        • Running-linux
        • Introduction
        • Asmtest
        • X86isa-build-instructions
        • Publications
        • Contributors
        • Machine
          • X86isa-state
          • Syscalls
          • Cpuid
          • Linear-memory
          • Rflag-specifications
          • Characterizing-undefined-behavior
          • App-view
          • Top-level-memory
          • X86-decoder
          • Physical-memory
          • Decoding-and-spec-utils
          • Instructions
            • Two-byte-opcodes
            • One-byte-opcodes
            • Fp-opcodes
            • Instruction-semantic-functions
            • X86-illegal-instruction
            • Implemented-opcodes
              • Two-byte-opcodes-map
              • One-byte-opcodes-map
              • 0f-38-three-byte-opcodes-map
                • 0f-3a-three-byte-opcodes-map
              • Opcode-maps
              • X86-general-protection
              • X86-device-not-available
              • X86-step-unimplemented
              • Privileged-opcodes
              • Three-byte-opcodes
            • Register-readers-and-writers
            • X86-modes
            • Segmentation
            • Other-non-deterministic-computations
            • Environment
            • Paging
          • Implemented-opcodes
            • Two-byte-opcodes-map
            • One-byte-opcodes-map
            • 0f-38-three-byte-opcodes-map
              • 0f-3a-three-byte-opcodes-map
            • To-do
            • Proof-utilities
            • Peripherals
            • Model-validation
            • Modelcalls
            • Concrete-simulation-examples
            • Utils
            • Debugging-code-proofs
          • Axe
          • Execloader
        • Math
        • Testing-utilities
      • Implemented-opcodes

      0f-38-three-byte-opcodes-map

      List of implemented instructions whose opcode is three bytes long, beginning with 0F_38; includes VEX/EVEX instructions too

      Opcode Mnemonic Other Information Semantic Function
      29 VPCMPEQQ
      :VEX :0F38 :NDS :128 :66 :WIG
      :FEAT :AVX
      x86-vpcmpeqb/vpcmpeqw/vpcmpeqd/vpcmpeqq-vex
      29 VPCMPEQQ
      :VEX :0F38 :NDS :256 :66 :WIG
      :FEAT :AVX2
      x86-vpcmpeqb/vpcmpeqw/vpcmpeqd/vpcmpeqq-vex
      F0 MOVBE
      :PFX :NO-PREFIX
      :FEAT :MOVBE
      x86-movbe-op/en-rm
      F0 MOVBE
      :PFX :66
      :FEAT :MOVBE
      x86-movbe-op/en-rm
      F1 MOVBE
      :PFX :NO-PREFIX
      :FEAT :MOVBE
      x86-movbe-op/en-mr
      F1 MOVBE
      :PFX :66
      :FEAT :MOVBE
      x86-movbe-op/en-mr
      F3 BLSI
      :REG 3
      :VEX :0F38 :NDD :LZ :W0
      :FEAT :BMI1 :AVX
      x86-blsi
      F3 BLSI
      :REG 3
      :VEX :0F38 :NDD :LZ :W1
      :FEAT :BMI1 :AVX
      x86-blsi
      F6 ADCX
      :PFX :66
      :FEAT :ADX
      x86-adcx/adox --
      ((adcx . t))
      F6 ADOX
      :PFX :F3
      :FEAT :ADX
      x86-adcx/adox --
      ((adcx))
      F7 SARX
      :VEX :0F38 :NDS :LZ :F3 :W0
      :FEAT :BMI2 :AVX
      x86-sarx/shlx/shrx
      F7 SARX
      :VEX :0F38 :NDS :LZ :F3 :W1
      :FEAT :BMI2 :AVX
      x86-sarx/shlx/shrx
      F7 SHLX
      :VEX :0F38 :NDS :LZ :66 :W0
      :FEAT :BMI2 :AVX
      x86-sarx/shlx/shrx
      F7 SHLX
      :VEX :0F38 :NDS :LZ :66 :W1
      :FEAT :BMI2 :AVX
      x86-sarx/shlx/shrx
      F7 SHRX
      :VEX :0F38 :NDS :LZ :F2 :W0
      :FEAT :BMI2 :AVX
      x86-sarx/shlx/shrx
      F7 SHRX
      :VEX :0F38 :NDS :LZ :F2 :W1
      :FEAT :BMI2 :AVX
      x86-sarx/shlx/shrx