Fixed big-endian issue.

Noticed a memory read that isn't big-endian safe. Was somewhat
benign in that it would have simply caused vtable duplication
when constructing a FlatBuffer on a big-endian machine.

Change-Id: I5de3a2bb3ce6912fdd845ed40668719794920cac
This commit is contained in:
Wouter van Oortmerssen 2014-10-22 13:35:24 -07:00
parent 1e4d28bf14
commit d426890b92
1 changed files with 1 additions and 1 deletions

View File

@ -522,7 +522,7 @@ class FlatBufferBuilder {
}
offsetbuf_.clear();
auto vt1 = reinterpret_cast<voffset_t *>(buf_.data());
auto vt1_size = *vt1;
auto vt1_size = ReadScalar<voffset_t>(vt1);
auto vt_use = GetSize();
// See if we already have generated a vtable with this exact same
// layout before. If so, make it point to the old one, remove this one.