Hi, Here is a simple minor patch to fix coverity “potential” security issues or at least the alert... You'll found more detail on Tizen downstream bug report : https://bugs.tizen.org/jira/browse/TC-2098 https://bugs.tizen.org/jira/secure/attachment/16184/libva_scan_01072015.pdf There other alerts to be fixed but look like false positives to me (I'll may send other patches to "flag" them if needed) More to come on this bug report Regards
Created attachment 112157 [details] [review] 0001-VPP-Fix-Coverity-alert-on-unitialized-vpp_kernels.patch Here is the patch to review : 0001-VPP-Fix-Coverity-alert-on-unitialized-vpp_kernels.patch
The driver never uses the unitialized variable as sharpening is only enabled on HSW+ . You can ignore it.
Yea I also thought author knews what they are doing but applying this patch will make make static analysis checkers happy FYI. It was applied downstream in tizen project at https://review.tizen.org/gerrit/#/c/33632/ It may be skipped or updated in next version Thanks for support, feel to close this bug if no activity after this message
This issue was fixed in another way on master.
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.