PPU Analyzer: Revert TRAP detection change

This commit is contained in:
Eladash 2023-09-02 09:01:35 +03:00 committed by Elad Ashkenazi
parent 5e110f2844
commit deacf76ca4
2 changed files with 2 additions and 2 deletions

View file

@ -1397,7 +1397,7 @@ bool ppu_module::analyse(u32 lib_toc, u32 entry, const u32 sec_end, const std::b
} }
else if (type & ppu_itype::trap) else if (type & ppu_itype::trap)
{ {
if (op.bo != 31) if (op.opcode != ppu_instructions::TRAP())
{ {
add_block(_ptr.addr()); add_block(_ptr.addr());
} }

View file

@ -3681,7 +3681,7 @@ extern void ppu_precompile(std::vector<std::string>& dir_queue, std::vector<ppu_
} }
// Check ELF filename // Check ELF filename
if ((entry.name == "EBOOT.BIN" || upper.ends_with(".ELF") || upper.ends_with(".SELF")) && Emu.GetBoot() != dir_queue[i] + entry.name) if ((upper.ends_with(".ELF") || upper.ends_with(".SELF")) && Emu.GetBoot() != dir_queue[i] + entry.name)
{ {
// Get full path // Get full path
file_queue.emplace_back(dir_queue[i] + entry.name, 0); file_queue.emplace_back(dir_queue[i] + entry.name, 0);