PPU Analyzer: Revert TRAP detection change

This commit is contained in:
Eladash 2023-09-02 09:01:35 +03:00 committed by Elad Ashkenazi
parent 5e110f2844
commit deacf76ca4
2 changed files with 2 additions and 2 deletions

View File

@ -1397,7 +1397,7 @@ bool ppu_module::analyse(u32 lib_toc, u32 entry, const u32 sec_end, const std::b
}
else if (type & ppu_itype::trap)
{
if (op.bo != 31)
if (op.opcode != ppu_instructions::TRAP())
{
add_block(_ptr.addr());
}

View File

@ -3681,7 +3681,7 @@ extern void ppu_precompile(std::vector<std::string>& dir_queue, std::vector<ppu_
}
// Check ELF filename
if ((entry.name == "EBOOT.BIN" || upper.ends_with(".ELF") || upper.ends_with(".SELF")) && Emu.GetBoot() != dir_queue[i] + entry.name)
if ((upper.ends_with(".ELF") || upper.ends_with(".SELF")) && Emu.GetBoot() != dir_queue[i] + entry.name)
{
// Get full path
file_queue.emplace_back(dir_queue[i] + entry.name, 0);