[DPDK/core Bug 1378] Coverity defect reported in rte_mempool.h : Out-of-bounds access
bugzilla at dpdk.org
bugzilla at dpdk.org
Thu Feb 8 20:14:53 CET 2024
https://bugs.dpdk.org/show_bug.cgi?id=1378
Bug ID: 1378
Summary: Coverity defect reported in rte_mempool.h :
Out-of-bounds access
Product: DPDK
Version: 22.11
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: Normal
Component: core
Assignee: dev at dpdk.org
Reporter: dmckie at avaya.com
Target Milestone: ---
I have searched unsuccessfully for information on this potential issue reported
by coverity.
Is this a known issue? or a false-positive coverity finding?
Category: Memory - corruptions
file: dpdk/include/rte_mempool.h
static __rte_always_inline void rte_mempool_put(struct rte_mempool *mp, void
*obj)
{
Out-of-bounds access (OVERRUN)
overrun-buffer-val: Overrunning buffer pointed to by &obj of 8 bytes by passing
it to a function which accesses it at byte offset 463.
rte_mempool_put_bulk(mp, &obj, 1);
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mails.dpdk.org/archives/dev/attachments/20240208/1acb115b/attachment.htm>
More information about the dev
mailing list