https://bugs.dpdk.org/show_bug.cgi?id=1378 Bug ID: 1378 Summary: Coverity defect reported in rte_mempool.h : Out-of-bounds access Product: DPDK Version: 22.11 Hardware: x86 OS: Linux Status: UNCONFIRMED Severity: normal Priority: Normal Component: core Assignee: dev@dpdk.org Reporter: dmckie@avaya.com Target Milestone: --- I have searched unsuccessfully for information on this potential issue reported by coverity. Is this a known issue? or a false-positive coverity finding? Category: Memory - corruptions file: dpdk/include/rte_mempool.h static __rte_always_inline void rte_mempool_put(struct rte_mempool *mp, void *obj) { Out-of-bounds access (OVERRUN) overrun-buffer-val: Overrunning buffer pointed to by &obj of 8 bytes by passing it to a function which accesses it at byte offset 463. rte_mempool_put_bulk(mp, &obj, 1); -- You are receiving this mail because: You are the assignee for the bug.