From 1e4655aef6bb0925245ddfe2c54db2afb099534c Mon Sep 17 00:00:00 2001 From: Eladash Date: Wed, 9 Sep 2020 13:36:04 +0300 Subject: [PATCH] SPU: Remove STOP 0x0 hack (#8873) --- rpcs3/Emu/Cell/SPUThread.cpp | 38 ------------------------------------ 1 file changed, 38 deletions(-) diff --git a/rpcs3/Emu/Cell/SPUThread.cpp b/rpcs3/Emu/Cell/SPUThread.cpp index f10db1ccde..cd55d636cf 100644 --- a/rpcs3/Emu/Cell/SPUThread.cpp +++ b/rpcs3/Emu/Cell/SPUThread.cpp @@ -3058,44 +3058,6 @@ bool spu_thread::stop_and_signal(u32 code) switch (code) { - case 0x000: - { - spu_log.warning("STOP 0x0"); - - // HACK: find an ILA instruction - for (u32 addr = pc; addr < SPU_LS_SIZE; addr += 4) - { - const u32 instr = _ref(addr); - - if (instr >> 25 == 0x21) - { - pc = addr; - return false; - } - - if (instr > 0x1fffff) - { - break; - } - } - - // HACK: wait for executable code - while (!_ref(pc)) - { - state += cpu_flag::wait; - - if (is_stopped()) - { - return false; - } - - thread_ctrl::wait_for(1000); - } - - check_state(); - return false; - } - case 0x001: { state += cpu_flag::wait;