I once used this to speed up text search by a few orders of magnitude in the days of MS-DOS. My search went from 30 seconds to scan 3 Megabytes to faster than disks could read it. (<3 seconds)
The IBM 1401 had instructions for reading a punch card, printing a line on the printer, and punching a card. It also had an instruction (Write, Read, and Punch) that did all 3 at once (this machine had no channels/DMA, so this was how you got overlap). I'm told that watching a program run was funny: the machine would sit silent, then all 3 peripherals would spring into action, and then there would be silence.
Picking up on the "three at once" theme, the 1-bit computer I built in the 1980's has an instruction that does three things.
The computer only has one instruction, so I didn't bother to give the instruction a name. But it performs an input, an output and a 2-way branch. I hope this is weird enough to deserve mention in this thread. :)
The project was mentioned at least twice previously on HN:
Do nonexistent CPUs count? Redcode, used in the CoreWars programming game, has a SPL instruction which boils down to "branch both ways". You end up with two execution pointers taking turns. One keeps going as if the SPL is a nop. The other keeps going as if the SPL is an unconditional jump. Of course you're not limited to calling this just the once.
username related - read lots of stuff while doing nothing useful with it :)
other fun x86 ones:
CALL SP
will call whatever code has been pushed on the stack. Unlike PUSH SP, it works the same on 8086 and newer CPUs
RET -2 (16 bit; -4 or -8 for 32/64 bit)
return but leave address on stack
LAR
load access rights; doesn't trap to kernel, so you can use this in ring3 code to scan through segment selectors and find out which are accessible and what type they are. On any x64 Linux, you can switch between 32 and 64 bit modes via far call, and syscalls will work in both modes (though they use different numbers).
HFC - Halt and Catch Fire
edit: thought it was branch and....corrected
https://x86.fr/investigating-the-halt-and-catch-fire-instruc...