diff options
author | Dwayne Slater <ds84182@gmail.com> | 2016-02-20 19:03:14 -0500 |
---|---|---|
committer | Dwayne Slater <ds84182@gmail.com> | 2016-02-20 19:03:14 -0500 |
commit | ed8072b48bf6eacb0eea161f87746086401b5c08 (patch) | |
tree | adfc5797bb6158413bf5abb0b5b162acd8f51c75 /src | |
parent | 82fc075ff66eca909b8f59d23f1a380bf0c03ed4 (diff) |
Fix out of bounds array access when loading a component >= 12
Diffstat (limited to 'src')
-rw-r--r-- | src/video_core/command_processor.cpp | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/src/video_core/command_processor.cpp b/src/video_core/command_processor.cpp index 51abeeaba..9d8c86236 100644 --- a/src/video_core/command_processor.cpp +++ b/src/video_core/command_processor.cpp @@ -157,8 +157,11 @@ static void WritePicaReg(u32 id, u32 value, u32 mask) { // TODO: What happens if a loader overwrites a previous one's data? for (unsigned component = 0; component < loader_config.component_count; ++component) { - if (component >= 12) + if (component >= 12) { LOG_ERROR(HW_GPU, "Overflow in the vertex attribute loader %u trying to load component %u", loader, component); + continue; + } + u32 attribute_index = loader_config.GetComponent(component); if (attribute_index < 12) { vertex_attribute_sources[attribute_index] = load_address; |