aboutsummaryrefslogtreecommitdiff
path: root/engines/sci
diff options
context:
space:
mode:
authorMartin Kiewitz2010-07-12 08:38:30 +0000
committerMartin Kiewitz2010-07-12 08:38:30 +0000
commit4c9ad98dfef2b643d14a6a55615e2a54e5822f70 (patch)
tree76bb902508f1735280d52373480291d6fdba792e /engines/sci
parente3d48dc9c23d7cd090f8ba157710379db5a82b1c (diff)
downloadscummvm-rg350-4c9ad98dfef2b643d14a6a55615e2a54e5822f70.tar.gz
scummvm-rg350-4c9ad98dfef2b643d14a6a55615e2a54e5822f70.tar.bz2
scummvm-rg350-4c9ad98dfef2b643d14a6a55615e2a54e5822f70.zip
SCI: returning 0 when parameter reads go out-of-bounds, onto the stack and hit an uninitialized temp, fixes pq2 .490
svn-id: r50812
Diffstat (limited to 'engines/sci')
-rw-r--r--engines/sci/engine/vm.cpp26
1 files changed, 19 insertions, 7 deletions
diff --git a/engines/sci/engine/vm.cpp b/engines/sci/engine/vm.cpp
index f4f8c07d48..ed839654bc 100644
--- a/engines/sci/engine/vm.cpp
+++ b/engines/sci/engine/vm.cpp
@@ -365,13 +365,25 @@ static const SciWorkaroundEntry uninitializedReadWorkarounds[] = {
static reg_t validate_read_var(reg_t *r, reg_t *stack_base, int type, int max, int index, reg_t default_value) {
if (validate_variable(r, stack_base, type, max, index)) {
- if (type == VAR_TEMP && r[index].segment == 0xffff) {
- // Uninitialized read on a temp
- // We need to find correct replacements for each situation manually
- SciTrackOriginReply originReply;
- r[index] = trackOriginAndFindWorkaround(index, uninitializedReadWorkarounds, &originReply);
- if ((r[index].segment == 0xFFFF) && (r[index].offset == 0xFFFF))
- error("Uninitialized read for temp %d from method %s::%s (script %d, localCall %x)", index, originReply.objectName.c_str(), originReply.methodName.c_str(), originReply.scriptNr, originReply.localCallOffset);
+ if (r[index].segment == 0xffff) {
+ switch (type) {
+ case VAR_TEMP: {
+ // Uninitialized read on a temp
+ // We need to find correct replacements for each situation manually
+ SciTrackOriginReply originReply;
+ r[index] = trackOriginAndFindWorkaround(index, uninitializedReadWorkarounds, &originReply);
+ if ((r[index].segment == 0xFFFF) && (r[index].offset == 0xFFFF))
+ error("Uninitialized read for temp %d from method %s::%s (script %d, localCall %x)", index, originReply.objectName.c_str(), originReply.methodName.c_str(), originReply.scriptNr, originReply.localCallOffset);
+ break;
+ }
+ case VAR_PARAM:
+ // Out-of-bounds read for a parameter that goes onto stack and hits an uninitialized temp
+ // We return 0 currently in that case
+ warning("Read for a parameter goes out-of-bounds, onto the stack and gets uninitialized temp");
+ return NULL_REG;
+ default:
+ break;
+ }
}
return r[index];
} else