Bug ID 1378
Summary Coverity defect reported in rte_mempool.h : Out-of-bounds access
Product DPDK
Version 22.11
Hardware x86
OS Linux
Status UNCONFIRMED
Severity normal
Priority Normal
Component core
Assignee dev@dpdk.org
Reporter dmckie@avaya.com
Target Milestone ---

I have searched unsuccessfully for information on this potential issue reported
by coverity. 

Is this a known issue? or a false-positive coverity finding?

Category: Memory - corruptions
file: dpdk/include/rte_mempool.h

static __rte_always_inline void rte_mempool_put(struct rte_mempool *mp, void
*obj)
{

Out-of-bounds access (OVERRUN)
overrun-buffer-val: Overrunning buffer pointed to by &obj of 8 bytes by passing
it to a function which accesses it at byte offset 463.
        rte_mempool_put_bulk(mp, &obj, 1);
          


You are receiving this mail because: