Viewing posts from July, 2014
Now it's time for either the hidden state instructions or the scalar -> vector instructions. Since I already have a failed attempt at the latter, let's try with the hidden state.
Today we'll try to make some sense out of the hidden state instructions.
Last time I've said there are three possibilities for the weird vector instructions. Let's figure them out.
Continuing with the vector instruction set, we run into a problem: the results of the python script are very irregular and suggest we're pulling data from an unknown source. In particular, the 0x82 opcode is worrying: regardless of inputs, on first few dozen runs after running hwtest, it spits out some interesting values, then reverts to outputting all-0x80808080. This implies one of three things is in play:
It's time to finally take a look at the vector instructions. Some quick testing reveals that 0x81, 0x82, 0x87-0x8e, 0x90-0x92, 0x94, 0x95, 0x97-0x9f, 0xa1, 0xa2, 0xa4, 0xa5, 0xa7-0xaf, 0xb1-0xb3, 0xb6-0xbe are valid opcodes.