mirror of
https://github.com/cc65/cc65.git
synced 2025-04-06 04:41:08 +00:00
Fixed the behavior of the JMP (ind) instruction in sim65 when it runs with the "6502X" CPU type.
The JMP (ind) bug is present in the 6502 which is emulated by both the "6502" and "6502X" emulation targets of sim65; specifically, the OPC_6502_6C handler. In the old code, the bug-exhibiting code was not executed when the target was set to 6502X, which is incorrect. the patch removes the (CPU == CPU_6502) check, which made no sense. The JMP (ind) bug was actually fixed in the 65c02. Indeed, the OPC_65C02_6C opcode handler has code that implements the 'right' behavior.
This commit is contained in:
parent
05a653d3f9
commit
2abd66ea0c
@ -1964,25 +1964,17 @@ static void OPC_6502_6C (void)
|
||||
PC = Regs.PC;
|
||||
Lo = MemReadWord (PC+1);
|
||||
|
||||
if (CPU == CPU_6502)
|
||||
{
|
||||
/* Emulate the 6502 bug */
|
||||
Cycles = 5;
|
||||
Regs.PC = MemReadByte (Lo);
|
||||
Hi = (Lo & 0xFF00) | ((Lo + 1) & 0xFF);
|
||||
Regs.PC |= (MemReadByte (Hi) << 8);
|
||||
/* Emulate the buggy 6502 behavior */
|
||||
Cycles = 5;
|
||||
Regs.PC = MemReadByte (Lo);
|
||||
Hi = (Lo & 0xFF00) | ((Lo + 1) & 0xFF);
|
||||
Regs.PC |= (MemReadByte (Hi) << 8);
|
||||
|
||||
/* Output a warning if the bug is triggered */
|
||||
if (Hi != Lo + 1)
|
||||
{
|
||||
Warning ("6502 indirect jump bug triggered at $%04X, ind addr = $%04X",
|
||||
PC, Lo);
|
||||
}
|
||||
}
|
||||
else
|
||||
/* Output a warning if the bug is triggered */
|
||||
if (Hi != Lo + 1)
|
||||
{
|
||||
Cycles = 6;
|
||||
Regs.PC = MemReadWord(Lo);
|
||||
Warning ("6502 indirect jump bug triggered at $%04X, ind addr = $%04X",
|
||||
PC, Lo);
|
||||
}
|
||||
|
||||
ParaVirtHooks (&Regs);
|
||||
|
Loading…
x
Reference in New Issue
Block a user