Home | History | Annotate | Download | only in s390

Lines Matching full:extract

179   V(ecag, ECAG, 0xEB4C)   /* type = RSY_A EXTRACT CPU ATTRIBUTE  */            \
1053 V(ectg, ECTG, 0xC81) /* type = SSF EXTRACT CPU TIME */ \
1240 V(epar, EPAR, 0xB226) /* type = RRE EXTRACT PRIMARY ASN */ \
1241 V(esar, ESAR, 0xB227) /* type = RRE EXTRACT SECONDARY ASN */ \
1256 V(ereg, EREG, 0xB249) /* type = RRE EXTRACT STACKED REGISTERS (32) */ \
1257 V(esta, ESTA, 0xB24A) /* type = RRE EXTRACT STACKED STATE */ \
1262 V(ear, EAR, 0xB24F) /* type = RRE EXTRACT ACCESS */ \
1274 V(etnd, ETND, 0xB2EC) /* type = RRE EXTRACT TRANSACTION NESTING DEPTH */ \
1350 V(efpc, EFPC, 0xB38C) /* type = RRE EXTRACT FPC */ \
1382 0xB3E5) /* type = RRE EXTRACT BIASED EXPONENT (long DFP to 64) */ \
1384 0xB3E7) /* type = RRE EXTRACT SIGNIFICANCE (long DFP to 64) */ \
1391 0xB3ED) /* type = RRE EXTRACT BIASED EXPONENT (extended DFP to 64) */ \
1393 0xB3EF) /* type = RRE EXTRACT SIGNIFICANCE (extended DFP to 64) */ \
1424 V(eregg, EREGG, 0xB90E) /* type = RRE EXTRACT STACKED REGISTERS (64) */ \
1476 V(epsw, EPSW, 0xB98D) /* type = RRE EXTRACT PSW */ \
1483 V(epair, EPAIR, 0xB99A) /* type = RRE EXTRACT PRIMARY ASN AND INSTANCE */ \
1485 0xB99B) /* type = RRE EXTRACT SECONDARY ASN AND INSTANCE */ \
1486 V(esea, ESEA, 0xB99D) /* type = RRE EXTRACT AND SET EXTENDED AUTHORITY */ \
1874 // Based on the first byte of the opcode, we can determine how to extract
1936 // Extract the Instruction Opcode
1981 // Extract the raw instruction bits
2061 // Extract the full opcode from the instruction.