Home | History | Annotate | Download | only in s390

Lines Matching full:extract

422   EAR = 0xB24F,       // Extract Access
423 ECAG = 0xEB4C, // Extract Cache Attribute
424 ECTG = 0xC81, // Extract Cpu Time
427 EEDTR = 0xB3E5, // Extract Biased Exponent (long DFP to 64)
428 EEXTR = 0xB3ED, // Extract Biased Exponent (extended DFP to 64)
429 EFPC = 0xB38C, // Extract Fpc
430 EPSW = 0xB98D, // Extract Psw
431 ESDTR = 0xB3E7, // Extract Significance (long DFP)
432 ESXTR = 0xB3EF, // Extract Significance (extended DFP)
433 ETND = 0xB2EC, // Extract Transaction Nesting Depth
1074 // Based on the first byte of the opcode, we can determine how to extract
1136 // Extract the Instruction Opcode
1181 // Extract the raw instruction bits
1261 // Extract the full opcode from the instruction.