DPDK patches and discussions
 help / color / mirror / Atom feed
* [DPDK/core Bug 1378] Coverity defect reported in rte_mempool.h : Out-of-bounds access
@ 2024-02-08 19:14 bugzilla
  0 siblings, 0 replies; only message in thread
From: bugzilla @ 2024-02-08 19:14 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 1109 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=1378

            Bug ID: 1378
           Summary: Coverity defect reported in rte_mempool.h :
                    Out-of-bounds access
           Product: DPDK
           Version: 22.11
          Hardware: x86
                OS: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: Normal
         Component: core
          Assignee: dev@dpdk.org
          Reporter: dmckie@avaya.com
  Target Milestone: ---

I have searched unsuccessfully for information on this potential issue reported
by coverity. 

Is this a known issue? or a false-positive coverity finding?

Category: Memory - corruptions
file: dpdk/include/rte_mempool.h

static __rte_always_inline void rte_mempool_put(struct rte_mempool *mp, void
*obj)
{

Out-of-bounds access (OVERRUN)
overrun-buffer-val: Overrunning buffer pointed to by &obj of 8 bytes by passing
it to a function which accesses it at byte offset 463.
        rte_mempool_put_bulk(mp, &obj, 1);

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 2988 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2024-02-08 19:14 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-02-08 19:14 [DPDK/core Bug 1378] Coverity defect reported in rte_mempool.h : Out-of-bounds access bugzilla

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).