Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/dpdk-20.11~rc3/app/pdump/main.c
Examining data/dpdk-20.11~rc3/app/proc-info/main.c
Examining data/dpdk-20.11~rc3/app/test-acl/main.c
Examining data/dpdk-20.11~rc3/app/test-bbdev/main.c
Examining data/dpdk-20.11~rc3/app/test-bbdev/main.h
Examining data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c
Examining data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_perf.c
Examining data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c
Examining data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.h
Examining data/dpdk-20.11~rc3/app/test-cmdline/cmdline_test.c
Examining data/dpdk-20.11~rc3/app/test-cmdline/cmdline_test.h
Examining data/dpdk-20.11~rc3/app/test-cmdline/commands.c
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf.h
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options.h
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options_parse.c
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_common.c
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_common.h
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_cyclecount.c
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_cyclecount.h
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_throughput.c
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_throughput.h
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_verify.c
Examining data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_verify.h
Examining data/dpdk-20.11~rc3/app/test-compress-perf/main.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_common.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_common.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_latency.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_latency.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_pmd_cyclecount.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_pmd_cyclecount.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_throughput.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_throughput.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_verify.c
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_verify.h
Examining data/dpdk-20.11~rc3/app/test-crypto-perf/main.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/evt_common.h
Examining data/dpdk-20.11~rc3/app/test-eventdev/evt_main.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/evt_options.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/evt_options.h
Examining data/dpdk-20.11~rc3/app/test-eventdev/evt_test.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/evt_test.h
Examining data/dpdk-20.11~rc3/app/test-eventdev/parser.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/parser.h
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_order_atq.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_order_common.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_order_common.h
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_order_queue.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_perf_atq.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_perf_common.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_perf_common.h
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_perf_queue.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_atq.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_common.c
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_common.h
Examining data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_queue.c
Examining data/dpdk-20.11~rc3/app/test-fib/main.c
Examining data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c
Examining data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.h
Examining data/dpdk-20.11~rc3/app/test-flow-perf/config.h
Examining data/dpdk-20.11~rc3/app/test-flow-perf/flow_gen.c
Examining data/dpdk-20.11~rc3/app/test-flow-perf/flow_gen.h
Examining data/dpdk-20.11~rc3/app/test-flow-perf/items_gen.c
Examining data/dpdk-20.11~rc3/app/test-flow-perf/items_gen.h
Examining data/dpdk-20.11~rc3/app/test-flow-perf/main.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/config.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/init.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/main.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/main.h
Examining data/dpdk-20.11~rc3/app/test-pipeline/pipeline_acl.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/pipeline_hash.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/pipeline_lpm.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/pipeline_lpm_ipv6.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/pipeline_stub.c
Examining data/dpdk-20.11~rc3/app/test-pipeline/runtime.c
Examining data/dpdk-20.11~rc3/app/test-pmd/5tswap.c
Examining data/dpdk-20.11~rc3/app/test-pmd/bpf_cmd.c
Examining data/dpdk-20.11~rc3/app/test-pmd/bpf_cmd.h
Examining data/dpdk-20.11~rc3/app/test-pmd/cmdline.c
Examining data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c
Examining data/dpdk-20.11~rc3/app/test-pmd/cmdline_mtr.c
Examining data/dpdk-20.11~rc3/app/test-pmd/cmdline_mtr.h
Examining data/dpdk-20.11~rc3/app/test-pmd/cmdline_tm.c
Examining data/dpdk-20.11~rc3/app/test-pmd/cmdline_tm.h
Examining data/dpdk-20.11~rc3/app/test-pmd/config.c
Examining data/dpdk-20.11~rc3/app/test-pmd/csumonly.c
Examining data/dpdk-20.11~rc3/app/test-pmd/flowgen.c
Examining data/dpdk-20.11~rc3/app/test-pmd/icmpecho.c
Examining data/dpdk-20.11~rc3/app/test-pmd/ieee1588fwd.c
Examining data/dpdk-20.11~rc3/app/test-pmd/iofwd.c
Examining data/dpdk-20.11~rc3/app/test-pmd/macfwd.c
Examining data/dpdk-20.11~rc3/app/test-pmd/macswap.c
Examining data/dpdk-20.11~rc3/app/test-pmd/macswap.h
Examining data/dpdk-20.11~rc3/app/test-pmd/macswap_common.h
Examining data/dpdk-20.11~rc3/app/test-pmd/macswap_neon.h
Examining data/dpdk-20.11~rc3/app/test-pmd/macswap_sse.h
Examining data/dpdk-20.11~rc3/app/test-pmd/noisy_vnf.c
Examining data/dpdk-20.11~rc3/app/test-pmd/parameters.c
Examining data/dpdk-20.11~rc3/app/test-pmd/rxonly.c
Examining data/dpdk-20.11~rc3/app/test-pmd/testpmd.c
Examining data/dpdk-20.11~rc3/app/test-pmd/testpmd.h
Examining data/dpdk-20.11~rc3/app/test-pmd/txonly.c
Examining data/dpdk-20.11~rc3/app/test-pmd/util.c
Examining data/dpdk-20.11~rc3/app/test-regex/main.c
Examining data/dpdk-20.11~rc3/app/test-sad/main.c
Examining data/dpdk-20.11~rc3/app/test/commands.c
Examining data/dpdk-20.11~rc3/app/test/packet_burst_generator.c
Examining data/dpdk-20.11~rc3/app/test/packet_burst_generator.h
Examining data/dpdk-20.11~rc3/app/test/process.h
Examining data/dpdk-20.11~rc3/app/test/resource.c
Examining data/dpdk-20.11~rc3/app/test/resource.h
Examining data/dpdk-20.11~rc3/app/test/sample_packet_forward.c
Examining data/dpdk-20.11~rc3/app/test/sample_packet_forward.h
Examining data/dpdk-20.11~rc3/app/test/test.c
Examining data/dpdk-20.11~rc3/app/test/test.h
Examining data/dpdk-20.11~rc3/app/test/test_acl.c
Examining data/dpdk-20.11~rc3/app/test/test_acl.h
Examining data/dpdk-20.11~rc3/app/test/test_alarm.c
Examining data/dpdk-20.11~rc3/app/test/test_atomic.c
Examining data/dpdk-20.11~rc3/app/test/test_barrier.c
Examining data/dpdk-20.11~rc3/app/test/test_bitmap.c
Examining data/dpdk-20.11~rc3/app/test/test_bitops.c
Examining data/dpdk-20.11~rc3/app/test/test_bitratestats.c
Examining data/dpdk-20.11~rc3/app/test/test_bpf.c
Examining data/dpdk-20.11~rc3/app/test/test_byteorder.c
Examining data/dpdk-20.11~rc3/app/test/test_cfgfile.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline.h
Examining data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline_etheraddr.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline_ipaddr.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline_lib.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline_num.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline_portlist.c
Examining data/dpdk-20.11~rc3/app/test/test_cmdline_string.c
Examining data/dpdk-20.11~rc3/app/test/test_common.c
Examining data/dpdk-20.11~rc3/app/test/test_compressdev.c
Examining data/dpdk-20.11~rc3/app/test/test_compressdev_test_buffer.h
Examining data/dpdk-20.11~rc3/app/test/test_cpuflags.c
Examining data/dpdk-20.11~rc3/app/test/test_crc.c
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev.c
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_aead_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_aes_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_asym.c
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_asym_util.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_blockcipher.c
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_blockcipher.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_des_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_dh_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_dsa_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_ecdsa_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_ecpm_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_hash_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_hmac_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_kasumi_hash_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_kasumi_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_mixed_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_mod_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_rsa_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_security_docsis_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_security_pdcp.c
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_security_pdcp_sdap_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_security_pdcp_test_func.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_security_pdcp_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_snow3g_hash_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_snow3g_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cryptodev_zuc_test_vectors.h
Examining data/dpdk-20.11~rc3/app/test/test_cycles.c
Examining data/dpdk-20.11~rc3/app/test/test_debug.c
Examining data/dpdk-20.11~rc3/app/test/test_distributor.c
Examining data/dpdk-20.11~rc3/app/test/test_distributor_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_eal_flags.c
Examining data/dpdk-20.11~rc3/app/test/test_eal_fs.c
Examining data/dpdk-20.11~rc3/app/test/test_efd.c
Examining data/dpdk-20.11~rc3/app/test/test_efd_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_errno.c
Examining data/dpdk-20.11~rc3/app/test/test_ethdev_link.c
Examining data/dpdk-20.11~rc3/app/test/test_event_crypto_adapter.c
Examining data/dpdk-20.11~rc3/app/test/test_event_eth_rx_adapter.c
Examining data/dpdk-20.11~rc3/app/test/test_event_eth_tx_adapter.c
Examining data/dpdk-20.11~rc3/app/test/test_event_ring.c
Examining data/dpdk-20.11~rc3/app/test/test_event_timer_adapter.c
Examining data/dpdk-20.11~rc3/app/test/test_eventdev.c
Examining data/dpdk-20.11~rc3/app/test/test_external_mem.c
Examining data/dpdk-20.11~rc3/app/test/test_fbarray.c
Examining data/dpdk-20.11~rc3/app/test/test_fib.c
Examining data/dpdk-20.11~rc3/app/test/test_fib6.c
Examining data/dpdk-20.11~rc3/app/test/test_fib6_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_fib_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_flow_classify.c
Examining data/dpdk-20.11~rc3/app/test/test_flow_classify.h
Examining data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c
Examining data/dpdk-20.11~rc3/app/test/test_graph.c
Examining data/dpdk-20.11~rc3/app/test/test_graph_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_hash.c
Examining data/dpdk-20.11~rc3/app/test/test_hash_functions.c
Examining data/dpdk-20.11~rc3/app/test/test_hash_multiwriter.c
Examining data/dpdk-20.11~rc3/app/test/test_hash_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_hash_readwrite.c
Examining data/dpdk-20.11~rc3/app/test/test_hash_readwrite_lf_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_interrupts.c
Examining data/dpdk-20.11~rc3/app/test/test_ipfrag.c
Examining data/dpdk-20.11~rc3/app/test/test_ipsec.c
Examining data/dpdk-20.11~rc3/app/test/test_ipsec_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_ipsec_sad.c
Examining data/dpdk-20.11~rc3/app/test/test_kni.c
Examining data/dpdk-20.11~rc3/app/test/test_kvargs.c
Examining data/dpdk-20.11~rc3/app/test/test_latencystats.c
Examining data/dpdk-20.11~rc3/app/test/test_lcores.c
Examining data/dpdk-20.11~rc3/app/test/test_link_bonding.c
Examining data/dpdk-20.11~rc3/app/test/test_link_bonding_mode4.c
Examining data/dpdk-20.11~rc3/app/test/test_link_bonding_rssconf.c
Examining data/dpdk-20.11~rc3/app/test/test_logs.c
Examining data/dpdk-20.11~rc3/app/test/test_lpm.c
Examining data/dpdk-20.11~rc3/app/test/test_lpm6.c
Examining data/dpdk-20.11~rc3/app/test/test_lpm6_data.h
Examining data/dpdk-20.11~rc3/app/test/test_lpm6_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_lpm_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_malloc.c
Examining data/dpdk-20.11~rc3/app/test/test_mbuf.c
Examining data/dpdk-20.11~rc3/app/test/test_mcslock.c
Examining data/dpdk-20.11~rc3/app/test/test_member.c
Examining data/dpdk-20.11~rc3/app/test/test_member_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_memcpy.c
Examining data/dpdk-20.11~rc3/app/test/test_memcpy_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_memory.c
Examining data/dpdk-20.11~rc3/app/test/test_mempool.c
Examining data/dpdk-20.11~rc3/app/test/test_mempool_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_memzone.c
Examining data/dpdk-20.11~rc3/app/test/test_meter.c
Examining data/dpdk-20.11~rc3/app/test/test_metrics.c
Examining data/dpdk-20.11~rc3/app/test/test_mp_secondary.c
Examining data/dpdk-20.11~rc3/app/test/test_pdump.c
Examining data/dpdk-20.11~rc3/app/test/test_pdump.h
Examining data/dpdk-20.11~rc3/app/test/test_per_lcore.c
Examining data/dpdk-20.11~rc3/app/test/test_pmd_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_pmd_ring.c
Examining data/dpdk-20.11~rc3/app/test/test_pmd_ring_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_power.c
Examining data/dpdk-20.11~rc3/app/test/test_power_cpufreq.c
Examining data/dpdk-20.11~rc3/app/test/test_power_kvm_vm.c
Examining data/dpdk-20.11~rc3/app/test/test_prefetch.c
Examining data/dpdk-20.11~rc3/app/test/test_rand_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_rawdev.c
Examining data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c
Examining data/dpdk-20.11~rc3/app/test/test_rcu_qsbr_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_reciprocal_division.c
Examining data/dpdk-20.11~rc3/app/test/test_reciprocal_division_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_red.c
Examining data/dpdk-20.11~rc3/app/test/test_reorder.c
Examining data/dpdk-20.11~rc3/app/test/test_resource.c
Examining data/dpdk-20.11~rc3/app/test/test_rib.c
Examining data/dpdk-20.11~rc3/app/test/test_rib6.c
Examining data/dpdk-20.11~rc3/app/test/test_ring.c
Examining data/dpdk-20.11~rc3/app/test/test_ring.h
Examining data/dpdk-20.11~rc3/app/test/test_ring_hts_stress.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_mpmc_stress.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_mt_peek_stress.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_mt_peek_stress_zc.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_rts_stress.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_st_peek_stress.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_st_peek_stress_zc.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_stress.c
Examining data/dpdk-20.11~rc3/app/test/test_ring_stress.h
Examining data/dpdk-20.11~rc3/app/test/test_ring_stress_impl.h
Examining data/dpdk-20.11~rc3/app/test/test_rwlock.c
Examining data/dpdk-20.11~rc3/app/test/test_sched.c
Examining data/dpdk-20.11~rc3/app/test/test_security.c
Examining data/dpdk-20.11~rc3/app/test/test_service_cores.c
Examining data/dpdk-20.11~rc3/app/test/test_spinlock.c
Examining data/dpdk-20.11~rc3/app/test/test_stack.c
Examining data/dpdk-20.11~rc3/app/test/test_stack_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_string_fns.c
Examining data/dpdk-20.11~rc3/app/test/test_table.c
Examining data/dpdk-20.11~rc3/app/test/test_table.h
Examining data/dpdk-20.11~rc3/app/test/test_table_acl.c
Examining data/dpdk-20.11~rc3/app/test/test_table_acl.h
Examining data/dpdk-20.11~rc3/app/test/test_table_combined.c
Examining data/dpdk-20.11~rc3/app/test/test_table_combined.h
Examining data/dpdk-20.11~rc3/app/test/test_table_pipeline.c
Examining data/dpdk-20.11~rc3/app/test/test_table_pipeline.h
Examining data/dpdk-20.11~rc3/app/test/test_table_ports.c
Examining data/dpdk-20.11~rc3/app/test/test_table_ports.h
Examining data/dpdk-20.11~rc3/app/test/test_table_tables.c
Examining data/dpdk-20.11~rc3/app/test/test_table_tables.h
Examining data/dpdk-20.11~rc3/app/test/test_tailq.c
Examining data/dpdk-20.11~rc3/app/test/test_telemetry_data.c
Examining data/dpdk-20.11~rc3/app/test/test_telemetry_json.c
Examining data/dpdk-20.11~rc3/app/test/test_thash.c
Examining data/dpdk-20.11~rc3/app/test/test_ticketlock.c
Examining data/dpdk-20.11~rc3/app/test/test_timer.c
Examining data/dpdk-20.11~rc3/app/test/test_timer_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_timer_racecond.c
Examining data/dpdk-20.11~rc3/app/test/test_timer_secondary.c
Examining data/dpdk-20.11~rc3/app/test/test_trace.c
Examining data/dpdk-20.11~rc3/app/test/test_trace.h
Examining data/dpdk-20.11~rc3/app/test/test_trace_perf.c
Examining data/dpdk-20.11~rc3/app/test/test_trace_register.c
Examining data/dpdk-20.11~rc3/app/test/test_version.c
Examining data/dpdk-20.11~rc3/app/test/test_xmmt_ops.h
Examining data/dpdk-20.11~rc3/app/test/virtual_pmd.c
Examining data/dpdk-20.11~rc3/app/test/virtual_pmd.h
Examining data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c
Examining data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.h
Examining data/dpdk-20.11~rc3/config/rte_compatibility_defines.h
Examining data/dpdk-20.11~rc3/config/rte_config.h
Examining data/dpdk-20.11~rc3/drivers/baseband/acc100/acc100_pf_enum.h
Examining data/dpdk-20.11~rc3/drivers/baseband/acc100/acc100_vf_enum.h
Examining data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_cfg.h
Examining data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c
Examining data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.h
Examining data/dpdk-20.11~rc3/drivers/baseband/fpga_5gnr_fec/fpga_5gnr_fec.h
Examining data/dpdk-20.11~rc3/drivers/baseband/fpga_5gnr_fec/rte_fpga_5gnr_fec.c
Examining data/dpdk-20.11~rc3/drivers/baseband/fpga_5gnr_fec/rte_pmd_fpga_5gnr_fec.h
Examining data/dpdk-20.11~rc3/drivers/baseband/fpga_lte_fec/fpga_lte_fec.c
Examining data/dpdk-20.11~rc3/drivers/baseband/fpga_lte_fec/fpga_lte_fec.h
Examining data/dpdk-20.11~rc3/drivers/baseband/null/bbdev_null.c
Examining data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/fman/fman.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/fman/fman_hw.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/fman/netcfg_layer.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman_driver.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman_priv.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/dpaa_alloc.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/dpaa_sys.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/dpaa_sys.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/process.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman_driver.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman_priv.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/dpaa_bits.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/dpaa_rbtree.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fman.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fsl_bman.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fsl_fman.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fsl_fman_crc64.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fsl_qman.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fsl_usd.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/netcfg.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/include/process.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/rte_dpaa_bus.h
Examining data/dpdk-20.11~rc3/drivers/bus/dpaa/rte_dpaa_logs.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_logs.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_vfio.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_vfio.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/dpbp.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/dpci.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/dpcon.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/dpdmai.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/dpio.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/dpmng.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpbp.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpbp_cmd.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpci.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpci_cmd.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpcon.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpcon_cmd.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpdmai.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpdmai_cmd.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpio.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpio_cmd.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpmng.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpmng_cmd.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_dpopr.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_mc_cmd.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/fsl_mc_sys.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/mc/mc_sys.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpbp.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpci.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_pvt.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/include/compat.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/include/fsl_qbman_base.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/include/fsl_qbman_debug.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/include/fsl_qbman_portal.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_debug.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_sys.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_sys_decl.h
Examining data/dpdk-20.11~rc3/drivers/bus/fslmc/rte_fslmc.h
Examining data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_bus.c
Examining data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_common.c
Examining data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_common.h
Examining data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_logs.h
Examining data/dpdk-20.11~rc3/drivers/bus/ifpga/rte_bus_ifpga.h
Examining data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_init.h
Examining data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/pci_common.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/pci_common_uio.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/pci_params.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/private.h
Examining data/dpdk-20.11~rc3/drivers/bus/pci/rte_bus_pci.h
Examining data/dpdk-20.11~rc3/drivers/bus/pci/windows/pci.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/windows/pci_netuio.c
Examining data/dpdk-20.11~rc3/drivers/bus/pci/windows/pci_netuio.h
Examining data/dpdk-20.11~rc3/drivers/bus/vdev/rte_bus_vdev.h
Examining data/dpdk-20.11~rc3/drivers/bus/vdev/vdev.c
Examining data/dpdk-20.11~rc3/drivers/bus/vdev/vdev_logs.h
Examining data/dpdk-20.11~rc3/drivers/bus/vdev/vdev_params.c
Examining data/dpdk-20.11~rc3/drivers/bus/vdev/vdev_private.h
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/private.h
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/rte_bus_vmbus.h
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/rte_vmbus_reg.h
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_bufring.c
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_channel.c
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_common.c
Examining data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_common_uio.c
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_common.h
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_fpm_tables.c
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_hw_types.h
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_mcode_defines.h
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_pmd_logs.h
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_pmd_ops_helper.c
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_pmd_ops_helper.h
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h
Examining data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib.c
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/compat.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/desc.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/desc/algo.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/desc/common.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/desc/ipsec.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/desc/pdcp.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/desc/sdap.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/fifo_load_store_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/header_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/jump_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/key_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/load_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/math_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/move_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/nfifo_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/operation_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/protocol_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/sec_run_time_asm.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/seq_in_out_ptr_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/signature_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/caamflib/rta/store_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/compat.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_list.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.c
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/dpaax_iova_table.c
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/dpaax_iova_table.h
Examining data/dpdk-20.11~rc3/drivers/common/dpaax/dpaax_logs.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_adminq.c
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_adminq.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_adminq_cmd.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_alloc.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_common.c
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_devids.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_impl.c
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_osdep.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_prototype.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_register.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_status.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/iavf_type.h
Examining data/dpdk-20.11~rc3/drivers/common/iavf/virtchnl.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_verbs.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_mp.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_mp.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_mr.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_mr.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_pci.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_pci.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_utils.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_devx_cmds.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_devx_cmds.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_malloc.c
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_malloc.h
Examining data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_prm.h
Examining data/dpdk-20.11~rc3/drivers/common/mvep/mvep_common.c
Examining data/dpdk-20.11~rc3/drivers/common/mvep/rte_mvep_common.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx/octeontx_mbox.c
Examining data/dpdk-20.11~rc3/drivers/common/octeontx/octeontx_mbox.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_nix.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_npa.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_npc.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_ree.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_rvu.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_sdp.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_sso.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_ssow.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/hw/otx2_tim.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_common.c
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_common.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_dev.c
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_dev.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_io_arm64.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_io_generic.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_irq.c
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_irq.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_mbox.c
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_mbox.h
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_sec_idev.c
Examining data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_sec_idev.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/adf_transport_access_macros.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/icp_qat_fw.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/icp_qat_fw_comp.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/icp_qat_fw_la.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/icp_qat_fw_mmp_ids.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/icp_qat_fw_pke.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/icp_qat_hw.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_adf/qat_pke_functionality_arrays.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_common.c
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_common.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_device.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_logs.c
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_logs.h
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_qp.c
Examining data/dpdk-20.11~rc3/drivers/common/qat/qat_qp.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_ev.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_evb.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_firmware_ids.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_impl.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_intr.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_mac.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_mcdi.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_nic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_nvram.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_phy.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_proxy.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_rx.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_signed_image_layout.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_tlv_layout.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_tx.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_vpd.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_annote.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_bootcfg.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_check.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_crc32.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_ev.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_evb.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_filter.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_hash.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_impl.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_intr.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_lic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mac.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mcdi.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mcdi.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mon.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nvram.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_pci.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_phy.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_phy_ids.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_port.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_proxy.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_regs.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_regs_ef10.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_regs_ef100.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_regs_mcdi.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_regs_mcdi_aoe.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_regs_mcdi_strs.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_regs_pci.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_rx.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_sram.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_tunnel.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_tx.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_types.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_vpd.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/hunt_impl.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/hunt_nic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/mcdi_mon.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/mcdi_mon.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/medford2_impl.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/medford2_nic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/medford_impl.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/medford_nic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_ev.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_impl.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_intr.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_nic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_pci.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_rx.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_tunnel.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_tx.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_flash.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_impl.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_mac.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_mcdi.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_nic.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_nvram.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_phy.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_sram.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_vpd.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/efsys.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/sfc_efx.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/sfc_efx_debug.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/sfc_efx_log.h
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/sfc_efx_mcdi.c
Examining data/dpdk-20.11~rc3/drivers/common/sfc_efx/sfc_efx_mcdi.h
Examining data/dpdk-20.11~rc3/drivers/compress/isal/isal_compress_pmd.c
Examining data/dpdk-20.11~rc3/drivers/compress/isal/isal_compress_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/compress/isal/isal_compress_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/compress/octeontx/include/zip_regs.h
Examining data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip.c
Examining data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip.h
Examining data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip_pmd.c
Examining data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp.c
Examining data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp.h
Examining data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c
Examining data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.h
Examining data/dpdk-20.11~rc3/drivers/compress/zlib/zlib_pmd.c
Examining data/dpdk-20.11~rc3/drivers/compress/zlib/zlib_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/compress/zlib/zlib_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_ops.h
Examining data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/aesni_mb_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/armv8/armv8_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/armv8/rte_armv8_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/armv8/rte_armv8_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_dev_msg.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_hw_defs.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_logs.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_logs.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_qp.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_qp.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_capabilities.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_defs.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_pmd.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_req.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_session.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_session.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_vfio.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_vfio.h
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs4_rm.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs5_rm.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs_rm_common.c
Examining data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs_rm_common.h
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_capabilities.c
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_config.h
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_desc.h
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_hw.c
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_hw_specific.h
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_log.h
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_pvt.h
Examining data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.c
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.h
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.h
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.h
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/ccp/rte_ccp_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_event.h
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_logs.h
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/mc/dpseci.c
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/mc/fsl_dpseci.h
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/mc/fsl_dpseci_cmd.h
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.h
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec_event.h
Examining data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec_log.h
Examining data/dpdk-20.11~rc3/drivers/crypto/kasumi/kasumi_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/kasumi/rte_kasumi_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/kasumi/rte_kasumi_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/mvsam/mrvl_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_compat.h
Examining data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_csr.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_device.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_device.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_hal.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_hal.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_logs.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_logs.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_qp.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_qp.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_capabilities.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_ctx.h
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_reqmgr.c
Examining data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_reqmgr.h
Examining data/dpdk-20.11~rc3/drivers/crypto/null/null_crypto_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/null/null_crypto_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/null/null_crypto_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_capabilities.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_hw_access.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_hw_access.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_mbox.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_mbox.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_capabilities.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_hw_access.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_hw_access.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_mbox.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_mbox.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops_helper.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_qp.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_anti_replay.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_fp.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_po.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_po_ops.h
Examining data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_security.h
Examining data/dpdk-20.11~rc3/drivers/crypto/openssl/compat.h
Examining data/dpdk-20.11~rc3/drivers/crypto/openssl/openssl_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym.c
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym.h
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym_pmd.h
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym.c
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym.h
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_hw_dp.c
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_pmd.h
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c
Examining data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.h
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/rte_cryptodev_scheduler.c
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/rte_cryptodev_scheduler.h
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/rte_cryptodev_scheduler_operations.h
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_failover.c
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_multicore.c
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pkt_size_distr.c
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_roundrobin.c
Examining data/dpdk-20.11~rc3/drivers/crypto/snow3g/rte_snow3g_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/snow3g/rte_snow3g_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/snow3g/snow3g_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_crypto_algs.h
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_crypto_capabilities.h
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.h
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_logs.h
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_pci.c
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_pci.h
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_ring.h
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtqueue.c
Examining data/dpdk-20.11~rc3/drivers/crypto/virtio/virtqueue.h
Examining data/dpdk-20.11~rc3/drivers/crypto/zuc/rte_zuc_pmd.c
Examining data/dpdk-20.11~rc3/drivers/crypto/zuc/rte_zuc_pmd_ops.c
Examining data/dpdk-20.11~rc3/drivers/crypto/zuc/zuc_pmd_private.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_iface.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_iface.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_inline_fns.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_log.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_priv.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_selftest.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_user.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/dlb_xstats.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_hw_types.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_osdep.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_osdep_bitmap.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_osdep_list.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_osdep_types.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_regs.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_resource.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/base/dlb_resource.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/dlb_main.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/dlb_main.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb/pf/dlb_pf.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/rte_pmd_dlb.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb/rte_pmd_dlb.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_iface.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_iface.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_inline_fns.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_log.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_priv.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_selftest.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_user.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2_xstats.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_hw_types.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_mbox.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_osdep.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_osdep_bitmap.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_osdep_list.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_osdep_types.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_regs.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_resource.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/base/dlb2_resource.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/dlb2_main.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/dlb2_main.h
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/pf/dlb2_pf.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/rte_pmd_dlb2.c
Examining data/dpdk-20.11~rc3/drivers/event/dlb2/rte_pmd_dlb2.h
Examining data/dpdk-20.11~rc3/drivers/event/dpaa/dpaa_eventdev.c
Examining data/dpdk-20.11~rc3/drivers/event/dpaa/dpaa_eventdev.h
Examining data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_eventdev.c
Examining data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_eventdev.h
Examining data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_eventdev_logs.h
Examining data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_eventdev_selftest.c
Examining data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_hw_dpcon.c
Examining data/dpdk-20.11~rc3/drivers/event/dsw/dsw_evdev.c
Examining data/dpdk-20.11~rc3/drivers/event/dsw/dsw_evdev.h
Examining data/dpdk-20.11~rc3/drivers/event/dsw/dsw_event.c
Examining data/dpdk-20.11~rc3/drivers/event/dsw/dsw_sort.h
Examining data/dpdk-20.11~rc3/drivers/event/dsw/dsw_xstats.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/ssovf_evdev.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/ssovf_evdev.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/ssovf_evdev_selftest.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/ssovf_probe.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/ssovf_worker.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/ssovf_worker.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/timvf_evdev.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/timvf_evdev.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/timvf_probe.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/timvf_worker.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx/timvf_worker.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_adptr.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_crypto_adptr.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_crypto_adptr_dp.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_irq.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_selftest.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_stats.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_tim_evdev.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_tim_evdev.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_tim_worker.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_tim_worker.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_worker.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_worker.h
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_worker_dual.c
Examining data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_worker_dual.h
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.h
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev_init.c
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev_xstats.c
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_log.h
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.h
Examining data/dpdk-20.11~rc3/drivers/event/opdl/opdl_test.c
Examining data/dpdk-20.11~rc3/drivers/event/skeleton/skeleton_eventdev.c
Examining data/dpdk-20.11~rc3/drivers/event/skeleton/skeleton_eventdev.h
Examining data/dpdk-20.11~rc3/drivers/event/sw/event_ring.h
Examining data/dpdk-20.11~rc3/drivers/event/sw/iq_chunk.h
Examining data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c
Examining data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.h
Examining data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_log.h
Examining data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_scheduler.c
Examining data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_selftest.c
Examining data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_worker.c
Examining data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_xstats.c
Examining data/dpdk-20.11~rc3/drivers/mempool/bucket/rte_mempool_bucket.c
Examining data/dpdk-20.11~rc3/drivers/mempool/dpaa/dpaa_mempool.c
Examining data/dpdk-20.11~rc3/drivers/mempool/dpaa/dpaa_mempool.h
Examining data/dpdk-20.11~rc3/drivers/mempool/dpaa2/dpaa2_hw_mempool.c
Examining data/dpdk-20.11~rc3/drivers/mempool/dpaa2/dpaa2_hw_mempool.h
Examining data/dpdk-20.11~rc3/drivers/mempool/dpaa2/dpaa2_hw_mempool_logs.h
Examining data/dpdk-20.11~rc3/drivers/mempool/dpaa2/rte_dpaa2_mempool.h
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx/octeontx_fpavf.c
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx/octeontx_fpavf.h
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx/octeontx_pool_logs.h
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx/rte_mempool_octeontx.c
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool.c
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool.h
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool_debug.c
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool_irq.c
Examining data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool_ops.c
Examining data/dpdk-20.11~rc3/drivers/mempool/ring/rte_mempool_ring.c
Examining data/dpdk-20.11~rc3/drivers/mempool/stack/rte_mempool_stack.c
Examining data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c
Examining data/dpdk-20.11~rc3/drivers/net/af_xdp/af_xdp_deps.h
Examining data/dpdk-20.11~rc3/drivers/net/af_xdp/compat.h
Examining data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ddm.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ddm.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev_rx.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev_tx.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev_tx.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_ext.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_global.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_mpu.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_mpu.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_pktchkr.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_pktchkr.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_pktdir.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_pktdir.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_pktgen.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_pktgen.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_rqp.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_rqp.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_udm.c
Examining data/dpdk-20.11~rc3/drivers/net/ark/ark_udm.h
Examining data/dpdk-20.11~rc3/drivers/net/ark/rte_pmd_ark.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_common.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_hw_regs.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_hw_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/atl_types.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_b0.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_b0.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_b0_internal.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_llh.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_llh.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_llh_internal.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_utils.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_utils.h
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_utils_fw2x.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/rte_pmd_atlantic.c
Examining data/dpdk-20.11~rc3/drivers/net/atlantic/rte_pmd_atlantic.h
Examining data/dpdk-20.11~rc3/drivers/net/avp/avp_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/avp/avp_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_common.h
Examining data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_fifo.h
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_common.h
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_dev.c
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_i2c.c
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_mdio.c
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy.h
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx_vec_sse.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_osal.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_stats.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_stats.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_vfpf.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_vfpf.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_fw_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_hsi.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_init.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_init_ops.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_mfw_req.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_reg.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_sp.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_sp.h
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/elink.c
Examining data/dpdk-20.11~rc3/drivers/net/bnx2x/elink.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_cpr.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_cpr.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_filter.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_irq.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_irq.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_nvm_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_reps.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_reps.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ring.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ring.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxq.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxq.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxr.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxr.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxtx_vec_common.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxtx_vec_neon.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxtx_vec_sse.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_stats.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_stats.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_txq.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_txq.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_txr.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_txr.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_util.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_util.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_vnic.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_vnic.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/cfa_p40_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/cfa_p40_tbl.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_p4.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_p4.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/rte_pmd_bnxt.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/rte_pmd_bnxt.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/bitalloc.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/bitalloc.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/cfa_resource_types.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/hwrm_tf.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/ll.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/ll.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/lookup3.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/rand.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/rand.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/stack.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/stack.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_common.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_core.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_core.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_device.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_device.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_device_p4.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_device_p4.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_device_p45.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_em.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_em_common.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_em_common.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_em_host.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_em_internal.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_ext_flow_handle.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_global_cfg.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_global_cfg.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_hash.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_hash.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_identifier.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_identifier.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_if_tbl.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_if_tbl.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_msg.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_msg.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_msg_common.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_project.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_resources.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_rm.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_rm.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_session.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_session.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_identifier.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_identifier.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tbl.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tbl.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tcam.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tcam.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_tbl.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_tbl.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_tcam.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_tcam.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_util.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_util.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tfp.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tfp.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/bnxt_tf_common.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/bnxt_ulp.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/bnxt_ulp.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/bnxt_ulp_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_def_rules.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_fc_mgr.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_fc_mgr.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_flow_db.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_flow_db.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_mapper.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_mapper.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_mark_mgr.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_mark_mgr.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_matcher.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_matcher.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_port_db.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_port_db.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_act.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_class.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_enum.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_field.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_stingray_act.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_stingray_class.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_tbl.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_tbl.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_wh_plus_act.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_db_wh_plus_class.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_field_db.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_template_struct.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.h
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_utils.c
Examining data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_utils.h
Examining data/dpdk-20.11~rc3/drivers/net/bonding/eth_bond_8023ad_private.h
Examining data/dpdk-20.11~rc3/drivers/net/bonding/eth_bond_private.h
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond.h
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.h
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_alb.c
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_alb.h
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_api.c
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_args.c
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/adapter.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/common.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_chip_type.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_msg.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_pci_id_tbl.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_regs_values.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_tcb.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4fw_interface.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4vf_hw.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4vf_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/clip_tbl.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/clip_tbl.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_compat.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_filter.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_ofld.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_pfvf.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbevf_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbevf_main.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/l2t.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/l2t.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/mps_tcam.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/mps_tcam.h
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/sge.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/smt.c
Examining data/dpdk-20.11~rc3/drivers/net/cxgbe/smt.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/dpaa_integration.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_ext.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_pcd_ext.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_port_ext.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_vsp.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_vsp_ext.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/ncsw_ext.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/net_ext.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa/rte_pmd_dpaa.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/base/dpaa2_hw_dpni.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/base/dpaa2_hw_dpni_annot.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_mux.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_pmd_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ptp.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_sparser.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_sparser.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/dpdmux.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/dpkg.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/dpni.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/dprtc.c
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_dpdmux.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_dpdmux_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_dpkg.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_dpni.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_dpni_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_dprtc.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_dprtc_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/mc/fsl_net.h
Examining data/dpdk-20.11~rc3/drivers/net/dpaa2/rte_pmd_dpaa2.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_80003es2lan.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_80003es2lan.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82540.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82541.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82541.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82542.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82543.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82543.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82571.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82571.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_api.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_api.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_base.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_base.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_defines.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_i210.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_i210.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_manage.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_manage.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mbx.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mbx.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_osdep.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/e1000_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/e1000_logs.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/e1000_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/em_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/em_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/igb_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/igb_pf.c
Examining data/dpdk-20.11~rc3/drivers/net/e1000/igb_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_defs/ena_admin_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_defs/ena_common_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_defs/ena_eth_io_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_defs/ena_gen_info.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_defs/ena_includes.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_defs/ena_regs_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_eth_com.c
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_eth_com.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_plat.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/base/ena_plat_dpdk.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/ena_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/ena/ena_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/ena_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/ena/ena_platform.h
Examining data/dpdk-20.11~rc3/drivers/net/enetc/base/enetc_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/enetc/enetc.h
Examining data/dpdk-20.11~rc3/drivers/net/enetc/enetc_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/enetc/enetc_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/enetc/enetc_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/cq_desc.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/cq_enet_desc.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/rq_enet_desc.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_cq.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_cq.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_devcmd.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_enet.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_flowman.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_intr.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_intr.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_nic.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_resource.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_rq.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_rq.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_rss.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_stats.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_wq.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_wq.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/base/wq_enet_desc.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_clsf.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_compat.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_main.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_res.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_res.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_rxtx_common.h
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_rxtx_vec_avx2.c
Examining data/dpdk-20.11~rc3/drivers/net/enic/enic_vf_representor.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_eal.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_ether.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_intr.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_ops.c
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_private.h
Examining data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_api.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_api.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_common.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_common.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_mbx.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_mbx.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_pf.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_pf.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_tlv.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_tlv.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_type.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_vf.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k_rxtx_vec.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_compat.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_csr.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_api_cmd.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_api_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_cfg.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_cfg.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_cmdq.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_cmdq.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_eqs.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_eqs.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwif.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwif.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mbox.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mbox.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mgmt.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mgmt.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_nicio.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_nicio.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_wq.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_wq.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_rx.h
Examining data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_tx.c
Examining data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_tx.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_cmd.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_dcb.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_dcb.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_intr.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_intr.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_mbx.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_mbx.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_mp.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_mp.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_regs.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rss.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rss.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx_vec.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx_vec.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx_vec_neon.h
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx_vec_sve.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_stats.c
Examining data/dpdk-20.11~rc3/drivers/net/hns3/hns3_stats.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_adminq.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_adminq.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_adminq_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_alloc.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_common.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_dcb.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_dcb.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_devids.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_diag.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_diag.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_hmc.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_hmc.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_lan_hmc.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_lan_hmc.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_nvm.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_prototype.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_register.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_status.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_type.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/base/virtchnl.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_fdir.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_pf.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_pf.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_altivec.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_avx2.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_common.h
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_neon.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_sse.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_tm.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/i40e_vf_representor.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c
Examining data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.h
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf.h
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_fdir.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_generic_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_generic_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_hash.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_log.h
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx2.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx512.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_common.h
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_sse.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/iavf_vchnl.c
Examining data/dpdk-20.11~rc3/drivers/net/iavf/rte_pmd_iavf.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_acl.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_acl.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_acl_ctrl.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_adminq_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_alloc.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_bitops.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_controlq.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_controlq.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_dcb.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_dcb.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_devids.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_fdir.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_fdir.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_type.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_hw_autogen.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_lan_tx_rx.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_nvm.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_nvm.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_protocol_type.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_sbq_cmd.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_sched.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_sched.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_status.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_switch.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_switch.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/base/ice_type.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_acl_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_fdir_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_generic_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_generic_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_hash.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx2.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx512.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_common.h
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_sse.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/ice_switch_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/ice/rte_pmd_ice.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_82571.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_82575.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_api.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_api.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_base.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_base.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_defines.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_i225.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_i225.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_ich8lan.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_manage.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_manage.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_osdep.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/base/igc_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_filter.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_logs.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c
Examining data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_dev.c
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_dev.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_lif.c
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_lif.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_mac_api.c
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_mac_api.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_main.c
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_rx_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_rx_filter.h
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/ionic/ionic_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_rawdev_api.h
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c
Examining data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_tm.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82598.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82598.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_api.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_api.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_dcb.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_dcb.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_dcb_82598.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_dcb_82598.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_dcb_82599.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_dcb_82599.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_hv_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_hv_vf.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_mbx.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_mbx.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_type.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_vf.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x540.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x540.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x550.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x550.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_82599_bypass.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_bypass.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_bypass.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_bypass_api.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_bypass_defines.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_fdir.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ipsec.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ipsec.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_pf.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_common.h
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_neon.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_tm.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_vf_representor.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/rte_pmd_ixgbe.c
Examining data/dpdk-20.11~rc3/drivers/net/ixgbe/rte_pmd_ixgbe.h
Examining data/dpdk-20.11~rc3/drivers/net/kni/rte_eth_kni.c
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/base/lio_23xx_reg.h
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/base/lio_23xx_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/base/lio_23xx_vf.h
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/base/lio_hw_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/base/lio_mbox.c
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/base/lio_mbox.h
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/lio_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/lio_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/lio_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/liquidio/lio_struct.h
Examining data/dpdk-20.11~rc3/drivers/net/memif/memif.h
Examining data/dpdk-20.11~rc3/drivers/net/memif/memif_socket.c
Examining data/dpdk-20.11~rc3/drivers/net/memif/memif_socket.h
Examining data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c
Examining data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_glue.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_glue.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_intr.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_mp.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_mr.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_mr.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_prm.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_rxq.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_txq.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_utils.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_utils.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_flow_os.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_mp_os.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_socket.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_verbs.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_verbs.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_vlan_os.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_devx.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_devx.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_age.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_meter.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_mac.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_mr.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_mr.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rss.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxmode.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxq.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx_vec.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx_vec.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx_vec_altivec.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx_vec_neon.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx_vec_sse.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_stats.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_trigger.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_txpp.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_txq.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_utils.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_utils.h
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_vlan.c
Examining data/dpdk-20.11~rc3/drivers/net/mlx5/rte_pmd_mlx5.h
Examining data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_mtr.c
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_mtr.h
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.h
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_tm.c
Examining data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_tm.h
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_nvs.c
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_nvs.h
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.c
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.h
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_var.h
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/hn_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/ndis.h
Examining data/dpdk-20.11~rc3/drivers/net/netvsc/rndis.h
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb.h
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_rx.h
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_rxmode.c
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_rxmode.h
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_stats.c
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_stats.h
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_tx.c
Examining data/dpdk-20.11~rc3/drivers/net/nfb/nfb_tx.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net_ctrl.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net_pmd.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp-common/nfp_cppat.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp-common/nfp_platform.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp-common/nfp_resid.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp6000/nfp6000.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp6000/nfp_xpb.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cppcore.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_crc.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_crc.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_hwinfo.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_hwinfo.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_mip.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_mip.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_mutex.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_nffw.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_nffw.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_nsp.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_nsp.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_nsp_cmds.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_nsp_eth.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_resource.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_resource.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_rtsym.c
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_rtsym.h
Examining data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_target.h
Examining data/dpdk-20.11~rc3/drivers/net/null/rte_eth_null.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_bgx.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_bgx.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_io.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_pki_var.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_pkivf.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_pkivf.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_pkovf.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_pkovf.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev_ops.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_debug.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_devargs.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_irq.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_ops.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec_tx.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_ctrl.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_parse.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_utils.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_link.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_lookup.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_mac.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_mcast.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ptp.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_rss.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_rx.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_stats.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_tm.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_tm.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_tx.c
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_tx.h
Examining data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_vlan.c
Examining data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/bmu.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/class_csr.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/emac_mtip.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/gpi.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/hif.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/hif_nocpy.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/tmu_csr.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/cbus/util_csr.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/base/pfe.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_eth.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hal.c
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif.c
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif_lib.c
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif_lib.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/pfe/pfe_mod.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/common_hsi.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_chain.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_cxt.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_cxt.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_cxt_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_dcbx.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_dcbx.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_dcbx_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_dev.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_dev_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_gtt_reg_addr.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_gtt_values.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hsi_common.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hsi_debug_tools.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hsi_eth.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hsi_func_common.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hsi_init_func.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hsi_init_tool.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hw.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hw_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_init_fw_funcs.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_init_fw_funcs.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_init_ops.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_init_ops.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_int.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_int.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_int_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_iov_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_iro.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_iro_values.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_l2.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_l2.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_l2_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_mcp.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_mcp.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_mcp_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_mng_tlv.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_proto_if.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_rt_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_sp_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_sp_commands.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_sp_commands.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_spq.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_spq.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_sriov.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_sriov.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_status.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_utils.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_vf.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_vf.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_vf_api.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_vfpf_if.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/eth_common.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/mcp_public.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/nvm_cfg.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/base/reg_addr.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_if.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_main.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_regs.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_sriov.c
Examining data/dpdk-20.11~rc3/drivers/net/qede/qede_sriov.h
Examining data/dpdk-20.11~rc3/drivers/net/ring/rte_eth_ring.c
Examining data/dpdk-20.11~rc3/drivers/net/ring/rte_eth_ring.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_debug.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_dp.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_dp.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_dp_rx.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_dp_tx.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef10.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef100.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef100_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef100_tx.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef10_essb_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef10_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef10_rx_ev.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ef10_tx.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ev.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ev.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_filter.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_filter.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_intr.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_kvargs.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_kvargs.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_log.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_mae.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_mae.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_mcdi.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_port.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_rx.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_rx.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_sriov.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_sriov.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_switch.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_switch.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_tso.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_tso.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_tweak.h
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_tx.c
Examining data/dpdk-20.11~rc3/drivers/net/sfc/sfc_tx.h
Examining data/dpdk-20.11~rc3/drivers/net/softnic/conn.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/conn.h
Examining data/dpdk-20.11~rc3/drivers/net/softnic/parser.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/parser.h
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic.h
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_action.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cryptodev.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_link.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_mempool.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_meter.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_swq.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tap.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c
Examining data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c
Examining data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c
Examining data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.h
Examining data/dpdk-20.11~rc3/drivers/net/szedata2/szedata2_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c
Examining data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_bpf.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_bpf_api.c
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_bpf_insns.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_bpf_program.c
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_intr.c
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_log.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_netlink.c
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_netlink.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_rss.h
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_tcmsgs.c
Examining data/dpdk-20.11~rc3/drivers/net/tap/tap_tcmsgs.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_bsvf.c
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_bsvf.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_hw.c
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_hw_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_mbox.c
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_mbox.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_plat.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_struct.h
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_svf.c
Examining data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_svf.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_dcb.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_dcb.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_dcb_hw.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_dcb_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_devids.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_dummy.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_eeprom.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_eeprom.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_hw.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_hw.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_mbx.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_mbx.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_mng.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_mng.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_phy.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_phy.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_regs.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_status.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_type.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/rte_pmd_txgbe.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_pf.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_ptypes.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_ptypes.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_regs_group.h
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c
Examining data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.c
Examining data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_pci.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_pci.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ring.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_packed_avx.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple_altivec.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple_neon.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple_sse.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel_tap.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel_tap.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_user.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_vdpa.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/virtio_user_dev.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/virtio_user_dev.h
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtqueue.c
Examining data/dpdk-20.11~rc3/drivers/net/virtio/virtqueue.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/base/upt1_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/base/vmware_pack_begin.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/base/vmware_pack_end.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/base/vmxnet3_defs.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/base/vmxnet3_osdep.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_logs.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ring.h
Examining data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_rxtx.c
Examining data/dpdk-20.11~rc3/drivers/raw/dpaa2_cmdif/dpaa2_cmdif.c
Examining data/dpdk-20.11~rc3/drivers/raw/dpaa2_cmdif/dpaa2_cmdif_logs.h
Examining data/dpdk-20.11~rc3/drivers/raw/dpaa2_cmdif/rte_pmd_dpaa2_cmdif.h
Examining data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.c
Examining data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.h
Examining data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma_logs.h
Examining data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/rte_pmd_dpaa2_qdma.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_api.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_api.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_compat.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_defines.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_enumerate.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_enumerate.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_feature_dev.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_feature_dev.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme_dperf.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme_error.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme_iperf.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme_pr.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_hw.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_port.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_port_error.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_at24_eeprom.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_at24_eeprom.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_debug.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_debug.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_eth_group.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_eth_group.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_i2c.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_i2c.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_ifpga_hw_api.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_ifpga_hw_api.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_intel_max10.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_intel_max10.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_osdep.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi_transaction.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/osdep_raw/osdep_generic.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/base/osdep_rte/osdep_generic.h
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c
Examining data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.h
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_pci.c
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_vdev.c
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_common.c
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_private.h
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev.c
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev_test.c
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_spec.h
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/rte_ioat_rawdev.h
Examining data/dpdk-20.11~rc3/drivers/raw/ioat/rte_ioat_rawdev_fns.h
Examining data/dpdk-20.11~rc3/drivers/raw/ntb/ntb.c
Examining data/dpdk-20.11~rc3/drivers/raw/ntb/ntb.h
Examining data/dpdk-20.11~rc3/drivers/raw/ntb/ntb_hw_intel.c
Examining data/dpdk-20.11~rc3/drivers/raw/ntb/ntb_hw_intel.h
Examining data/dpdk-20.11~rc3/drivers/raw/ntb/rte_pmd_ntb.h
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_msg.c
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_rawdev.c
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_rawdev.h
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_test.c
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_enqdeq.c
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_enqdeq.h
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_rawdev.c
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_rawdev.h
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_test.c
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_vf.c
Examining data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_vf.h
Examining data/dpdk-20.11~rc3/drivers/raw/skeleton/skeleton_rawdev.c
Examining data/dpdk-20.11~rc3/drivers/raw/skeleton/skeleton_rawdev.h
Examining data/dpdk-20.11~rc3/drivers/raw/skeleton/skeleton_rawdev_test.c
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex.c
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex.h
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex_control.c
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex_devx.c
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex_fastpath.c
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex_utils.h
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_rxp.c
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_rxp.h
Examining data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_rxp_csrs.h
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.h
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev_compiler.c
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev_compiler.h
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev_hw_access.c
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev_hw_access.h
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev_mbox.c
Examining data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev_mbox.h
Examining data/dpdk-20.11~rc3/drivers/vdpa/ifc/base/ifcvf.c
Examining data/dpdk-20.11~rc3/drivers/vdpa/ifc/base/ifcvf.h
Examining data/dpdk-20.11~rc3/drivers/vdpa/ifc/base/ifcvf_osdep.h
Examining data/dpdk-20.11~rc3/drivers/vdpa/ifc/ifcvf_vdpa.c
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.c
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.h
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_event.c
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_lm.c
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_mem.c
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_steer.c
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_utils.h
Examining data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_virtq.c
Examining data/dpdk-20.11~rc3/examples/bbdev_app/main.c
Examining data/dpdk-20.11~rc3/examples/bond/main.c
Examining data/dpdk-20.11~rc3/examples/bond/main.h
Examining data/dpdk-20.11~rc3/examples/bpf/dummy.c
Examining data/dpdk-20.11~rc3/examples/bpf/t1.c
Examining data/dpdk-20.11~rc3/examples/bpf/t2.c
Examining data/dpdk-20.11~rc3/examples/bpf/t3.c
Examining data/dpdk-20.11~rc3/examples/cmdline/commands.c
Examining data/dpdk-20.11~rc3/examples/cmdline/commands.h
Examining data/dpdk-20.11~rc3/examples/cmdline/main.c
Examining data/dpdk-20.11~rc3/examples/cmdline/parse_obj_list.c
Examining data/dpdk-20.11~rc3/examples/cmdline/parse_obj_list.h
Examining data/dpdk-20.11~rc3/examples/distributor/main.c
Examining data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.c
Examining data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.h
Examining data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/main.c
Examining data/dpdk-20.11~rc3/examples/ethtool/lib/rte_ethtool.c
Examining data/dpdk-20.11~rc3/examples/ethtool/lib/rte_ethtool.h
Examining data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c
Examining data/dpdk-20.11~rc3/examples/eventdev_pipeline/pipeline_common.h
Examining data/dpdk-20.11~rc3/examples/eventdev_pipeline/pipeline_worker_generic.c
Examining data/dpdk-20.11~rc3/examples/eventdev_pipeline/pipeline_worker_tx.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.h
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.h
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_aes.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_ccm.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_cmac.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_gcm.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_hmac.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_sha.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_xts.c
Examining data/dpdk-20.11~rc3/examples/fips_validation/main.c
Examining data/dpdk-20.11~rc3/examples/flow_classify/flow_classify.c
Examining data/dpdk-20.11~rc3/examples/flow_filtering/flow_blocks.c
Examining data/dpdk-20.11~rc3/examples/flow_filtering/main.c
Examining data/dpdk-20.11~rc3/examples/helloworld/main.c
Examining data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c
Examining data/dpdk-20.11~rc3/examples/ip_fragmentation/main.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/action.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/action.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/cli.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/common.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/conn.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/cryptodev.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/cryptodev.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/kni.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/kni.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/link.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/link.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/main.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/mempool.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/mempool.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/parser.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/parser.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/swq.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/swq.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/tap.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/tap.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/thread.h
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/tmgr.c
Examining data/dpdk-20.11~rc3/examples/ip_pipeline/tmgr.h
Examining data/dpdk-20.11~rc3/examples/ip_reassembly/main.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/esp.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/esp.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/flow.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/flow.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipip.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec_process.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec_worker.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec_worker.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/rt.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/sad.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/sad.h
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/sp4.c
Examining data/dpdk-20.11~rc3/examples/ipsec-secgw/sp6.c
Examining data/dpdk-20.11~rc3/examples/ipv4_multicast/main.c
Examining data/dpdk-20.11~rc3/examples/kni/main.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-cat/cat.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-cat/cat.h
Examining data/dpdk-20.11~rc3/examples/l2fwd-cat/l2fwd-cat.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_common.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_common.h
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_event.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_event.h
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_event_generic.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_event_internal_port.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_poll.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_poll.h
Examining data/dpdk-20.11~rc3/examples/l2fwd-event/main.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-keepalive/ka-agent/main.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-keepalive/main.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-keepalive/shm.c
Examining data/dpdk-20.11~rc3/examples/l2fwd-keepalive/shm.h
Examining data/dpdk-20.11~rc3/examples/l2fwd/main.c
Examining data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c
Examining data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c
Examining data/dpdk-20.11~rc3/examples/l3fwd-power/main.c
Examining data/dpdk-20.11~rc3/examples/l3fwd-power/main.h
Examining data/dpdk-20.11~rc3/examples/l3fwd-power/perf_core.c
Examining data/dpdk-20.11~rc3/examples/l3fwd-power/perf_core.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_altivec.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_common.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_em.c
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_em.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_em_hlm.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_em_hlm_neon.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_em_hlm_sse.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_em_sequential.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_event.c
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_event.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_event_generic.c
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_event_internal_port.c
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_lpm.c
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_lpm.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_lpm_altivec.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_lpm_neon.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_lpm_sse.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_neon.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_sse.h
Examining data/dpdk-20.11~rc3/examples/l3fwd/main.c
Examining data/dpdk-20.11~rc3/examples/link_status_interrupt/main.c
Examining data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_client/client.c
Examining data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/args.c
Examining data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/args.h
Examining data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/init.c
Examining data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/init.h
Examining data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/main.c
Examining data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/shared/common.h
Examining data/dpdk-20.11~rc3/examples/multi_process/hotplug_mp/commands.c
Examining data/dpdk-20.11~rc3/examples/multi_process/hotplug_mp/commands.h
Examining data/dpdk-20.11~rc3/examples/multi_process/hotplug_mp/main.c
Examining data/dpdk-20.11~rc3/examples/multi_process/simple_mp/main.c
Examining data/dpdk-20.11~rc3/examples/multi_process/simple_mp/mp_commands.c
Examining data/dpdk-20.11~rc3/examples/multi_process/simple_mp/mp_commands.h
Examining data/dpdk-20.11~rc3/examples/multi_process/symmetric_mp/main.c
Examining data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c
Examining data/dpdk-20.11~rc3/examples/packet_ordering/main.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/arch/arm64/ctx.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/arch/arm64/ctx.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/arch/arm64/stack.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/arch/x86/ctx.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/arch/x86/ctx.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/arch/x86/stack.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_api.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_cond.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_cond.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_diag.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_diag.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_diag_api.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_int.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_mutex.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_mutex.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_objcache.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_pool.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_queue.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_sched.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_sched.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_timer.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_tls.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_tls.h
Examining data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/pthread_shim/main.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/pthread_shim/pthread_shim.c
Examining data/dpdk-20.11~rc3/examples/performance-thread/pthread_shim/pthread_shim.h
Examining data/dpdk-20.11~rc3/examples/pipeline/cli.c
Examining data/dpdk-20.11~rc3/examples/pipeline/cli.h
Examining data/dpdk-20.11~rc3/examples/pipeline/conn.c
Examining data/dpdk-20.11~rc3/examples/pipeline/conn.h
Examining data/dpdk-20.11~rc3/examples/pipeline/main.c
Examining data/dpdk-20.11~rc3/examples/pipeline/obj.c
Examining data/dpdk-20.11~rc3/examples/pipeline/obj.h
Examining data/dpdk-20.11~rc3/examples/pipeline/thread.c
Examining data/dpdk-20.11~rc3/examples/pipeline/thread.h
Examining data/dpdk-20.11~rc3/examples/ptpclient/ptpclient.c
Examining data/dpdk-20.11~rc3/examples/qos_meter/main.c
Examining data/dpdk-20.11~rc3/examples/qos_meter/main.h
Examining data/dpdk-20.11~rc3/examples/qos_meter/rte_policer.c
Examining data/dpdk-20.11~rc3/examples/qos_meter/rte_policer.h
Examining data/dpdk-20.11~rc3/examples/qos_sched/app_thread.c
Examining data/dpdk-20.11~rc3/examples/qos_sched/args.c
Examining data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c
Examining data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.h
Examining data/dpdk-20.11~rc3/examples/qos_sched/cmdline.c
Examining data/dpdk-20.11~rc3/examples/qos_sched/init.c
Examining data/dpdk-20.11~rc3/examples/qos_sched/main.c
Examining data/dpdk-20.11~rc3/examples/qos_sched/main.h
Examining data/dpdk-20.11~rc3/examples/qos_sched/stats.c
Examining data/dpdk-20.11~rc3/examples/rxtx_callbacks/main.c
Examining data/dpdk-20.11~rc3/examples/server_node_efd/node/node.c
Examining data/dpdk-20.11~rc3/examples/server_node_efd/server/args.c
Examining data/dpdk-20.11~rc3/examples/server_node_efd/server/args.h
Examining data/dpdk-20.11~rc3/examples/server_node_efd/server/init.c
Examining data/dpdk-20.11~rc3/examples/server_node_efd/server/init.h
Examining data/dpdk-20.11~rc3/examples/server_node_efd/server/main.c
Examining data/dpdk-20.11~rc3/examples/server_node_efd/shared/common.h
Examining data/dpdk-20.11~rc3/examples/service_cores/main.c
Examining data/dpdk-20.11~rc3/examples/skeleton/basicfwd.c
Examining data/dpdk-20.11~rc3/examples/timer/main.c
Examining data/dpdk-20.11~rc3/examples/vdpa/main.c
Examining data/dpdk-20.11~rc3/examples/vhost/ioat.c
Examining data/dpdk-20.11~rc3/examples/vhost/ioat.h
Examining data/dpdk-20.11~rc3/examples/vhost/main.c
Examining data/dpdk-20.11~rc3/examples/vhost/main.h
Examining data/dpdk-20.11~rc3/examples/vhost/virtio_net.c
Examining data/dpdk-20.11~rc3/examples/vhost_blk/blk.c
Examining data/dpdk-20.11~rc3/examples/vhost_blk/blk_spec.h
Examining data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.c
Examining data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.h
Examining data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk_compat.c
Examining data/dpdk-20.11~rc3/examples/vhost_crypto/main.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.h
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.h
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/guest_cli/main.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/guest_cli/parse.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/guest_cli/parse.h
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/guest_cli/vm_power_cli_guest.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/guest_cli/vm_power_cli_guest.h
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/main.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor.h
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_nop.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_x86.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/parse.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/parse.h
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/power_manager.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/power_manager.h
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/vm_power_cli.c
Examining data/dpdk-20.11~rc3/examples/vm_power_manager/vm_power_cli.h
Examining data/dpdk-20.11~rc3/examples/vmdq/main.c
Examining data/dpdk-20.11~rc3/examples/vmdq_dcb/main.c
Examining data/dpdk-20.11~rc3/kernel/freebsd/contigmem/contigmem.c
Examining data/dpdk-20.11~rc3/kernel/freebsd/nic_uio/nic_uio.c
Examining data/dpdk-20.11~rc3/kernel/linux/kni/compat.h
Examining data/dpdk-20.11~rc3/kernel/linux/kni/kni_dev.h
Examining data/dpdk-20.11~rc3/kernel/linux/kni/kni_fifo.h
Examining data/dpdk-20.11~rc3/kernel/linux/kni/kni_misc.c
Examining data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_bld.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_gen.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_altivec.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_altivec.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_avx2.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_avx2.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_avx512.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_avx512_common.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_avx512x16.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_avx512x8.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_neon.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_neon.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_scalar.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_sse.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_run_sse.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/acl_vect.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/rte_acl.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/rte_acl.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/rte_acl_osdep.h
Examining data/dpdk-20.11~rc3/lib/librte_acl/tb_mem.c
Examining data/dpdk-20.11~rc3/lib/librte_acl/tb_mem.h
Examining data/dpdk-20.11~rc3/lib/librte_bbdev/rte_bbdev.c
Examining data/dpdk-20.11~rc3/lib/librte_bbdev/rte_bbdev.h
Examining data/dpdk-20.11~rc3/lib/librte_bbdev/rte_bbdev_op.h
Examining data/dpdk-20.11~rc3/lib/librte_bbdev/rte_bbdev_pmd.h
Examining data/dpdk-20.11~rc3/lib/librte_bitratestats/rte_bitrate.c
Examining data/dpdk-20.11~rc3/lib/librte_bitratestats/rte_bitrate.h
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_def.h
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_exec.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_impl.h
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_jit_arm64.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_jit_x86.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_load.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_load_elf.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_pkt.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/bpf_validate.c
Examining data/dpdk-20.11~rc3/lib/librte_bpf/rte_bpf.h
Examining data/dpdk-20.11~rc3/lib/librte_bpf/rte_bpf_ethdev.h
Examining data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c
Examining data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_os_unix.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_os_windows.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_etheraddr.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_etheraddr.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_ipaddr.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_ipaddr.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_num.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_num.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_portlist.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_portlist.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_private.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_socket.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_socket.h
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_vt100.c
Examining data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_vt100.h
Examining data/dpdk-20.11~rc3/lib/librte_compressdev/rte_comp.c
Examining data/dpdk-20.11~rc3/lib/librte_compressdev/rte_comp.h
Examining data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev.c
Examining data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev.h
Examining data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev_internal.h
Examining data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev_pmd.c
Examining data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev_pmd.h
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/cryptodev_trace_points.c
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_crypto.h
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_crypto_asym.h
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_crypto_sym.h
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev.c
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev.h
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev_pmd.c
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev_pmd.h
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev_trace.h
Examining data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev_trace_fp.h
Examining data/dpdk-20.11~rc3/lib/librte_distributor/distributor_private.h
Examining data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor.c
Examining data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor.h
Examining data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor_match_generic.c
Examining data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor_match_sse.c
Examining data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor_single.c
Examining data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor_single.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_atomic.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_atomic_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_atomic_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_byteorder.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_cpuflags.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_cpuflags_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_cpuflags_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_cycles.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_cycles_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_cycles_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_io.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_io_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_mcslock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_pause.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_pause_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_pause_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_power_intrinsics.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_prefetch.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_prefetch_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_prefetch_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_rwlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_spinlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_ticketlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_vect.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/rte_cpuflags.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/rte_cycles.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/arm/rte_hypervisor.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_bus.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_class.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_config.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_cpuflags.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_debug.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_dev.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_devargs.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_dynmem.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_errno.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_fbarray.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_hexdump.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_hypervisor.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_launch.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_lcore.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_log.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_mcfg.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memalloc.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memory.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memzone.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_string_fns.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_tailqs.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_thread.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_timer.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_ctf.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_points.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_uuid.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_filesystem.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_hugepages.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_internal_cfg.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_memalloc.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_memcfg.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_options.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_private.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_thread.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/eal_trace.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_elem.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_elem.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_heap.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_heap.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_mp.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_mp.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/rte_keepalive.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/rte_malloc.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/rte_random.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/rte_reciprocal.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/common/rte_service.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_alarm.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_alarm_private.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_cpuflags.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_debug.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_dev.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_hugepage_info.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_interrupts.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_lcore.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_memalloc.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_memory.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_thread.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_timer.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/freebsd/include/rte_os.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_atomic.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_byteorder.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_cpuflags.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_cycles.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_io.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_mcslock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_memcpy.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_pause.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_power_intrinsics.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_prefetch.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_rwlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_spinlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_ticketlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/generic/rte_vect.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_alarm.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_bitmap.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_bitops.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_branch_prediction.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_bus.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_class.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_common.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_compat.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_debug.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_dev.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_devargs.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_eal.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_eal_interrupts.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_eal_memconfig.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_eal_paging.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_eal_trace.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_errno.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_fbarray.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_function_versioning.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_hexdump.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_hypervisor.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_interrupts.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_keepalive.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_launch.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_lcore.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_log.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_malloc.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_memory.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_memzone.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_pci_dev_feature_defs.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_pci_dev_features.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_per_lcore.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_random.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_reciprocal.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_service.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_service_component.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_string_fns.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_tailq.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_test.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_time.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_trace.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_trace_point.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_trace_point_register.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_uuid.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_version.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/include/rte_vfio.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_alarm.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_cpuflags.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_debug.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_dev.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_log.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_thread.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_timer.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio_mp_sync.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/linux/include/rte_os.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_altivec.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_atomic.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_byteorder.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_cpuflags.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_cycles.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_io.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_mcslock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_memcpy.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_pause.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_power_intrinsics.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_prefetch.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_rwlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_spinlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_ticketlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_vect.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/rte_cpuflags.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/rte_cycles.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/ppc/rte_hypervisor.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/unix/eal_file.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/unix/eal_unix_memory.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/unix/eal_unix_timer.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_alarm.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_debug.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_file.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_hugepages.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_interrupts.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_lcore.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_log.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_memalloc.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_memory.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_mp.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_thread.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_timer.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_windows.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/fnmatch.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/getopt.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/arpa/inet.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/dirent.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/fnmatch.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/getopt.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/netinet/in.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/netinet/ip.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/pthread.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/regex.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/rte_os.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/rte_virt2phys.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/rte_windows.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/sched.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/sys/queue.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/sys/socket.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/windows/include/unistd.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_atomic.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_atomic_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_atomic_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_byteorder.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_byteorder_32.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_byteorder_64.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_cpuflags.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_cycles.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_io.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_mcslock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_memcpy.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_pause.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_power_intrinsics.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_prefetch.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_rtm.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_rwlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_spinlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_ticketlock.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/include/rte_vect.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_cpuflags.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_cpuid.h
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_cycles.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_hypervisor.c
Examining data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_spinlock.c
Examining data/dpdk-20.11~rc3/lib/librte_efd/rte_efd.c
Examining data/dpdk-20.11~rc3/lib/librte_efd/rte_efd.h
Examining data/dpdk-20.11~rc3/lib/librte_efd/rte_efd_arm64.h
Examining data/dpdk-20.11~rc3/lib/librte_efd/rte_efd_x86.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/ethdev_private.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/ethdev_private.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/ethdev_profile.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/ethdev_profile.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/ethdev_trace_points.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_class_eth.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_dev_info.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_eth_ctrl.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev_core.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev_driver.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev_pci.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev_trace.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev_trace_fp.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev_vdev.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_flow.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_flow.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_flow_driver.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_mtr.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_mtr.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_mtr_driver.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_tm.c
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_tm.h
Examining data/dpdk-20.11~rc3/lib/librte_ethdev/rte_tm_driver.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/eventdev_trace_points.c
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_crypto_adapter.c
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_crypto_adapter.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_rx_adapter.c
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_rx_adapter.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_tx_adapter.c
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_tx_adapter.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_ring.c
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_ring.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter_pmd.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev_pmd.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev_pmd_pci.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev_pmd_vdev.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev_trace.h
Examining data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev_trace_fp.h
Examining data/dpdk-20.11~rc3/lib/librte_fib/dir24_8.c
Examining data/dpdk-20.11~rc3/lib/librte_fib/dir24_8.h
Examining data/dpdk-20.11~rc3/lib/librte_fib/dir24_8_avx512.c
Examining data/dpdk-20.11~rc3/lib/librte_fib/dir24_8_avx512.h
Examining data/dpdk-20.11~rc3/lib/librte_fib/rte_fib.c
Examining data/dpdk-20.11~rc3/lib/librte_fib/rte_fib.h
Examining data/dpdk-20.11~rc3/lib/librte_fib/rte_fib6.c
Examining data/dpdk-20.11~rc3/lib/librte_fib/rte_fib6.h
Examining data/dpdk-20.11~rc3/lib/librte_fib/trie.c
Examining data/dpdk-20.11~rc3/lib/librte_fib/trie.h
Examining data/dpdk-20.11~rc3/lib/librte_fib/trie_avx512.c
Examining data/dpdk-20.11~rc3/lib/librte_fib/trie_avx512.h
Examining data/dpdk-20.11~rc3/lib/librte_flow_classify/rte_flow_classify.c
Examining data/dpdk-20.11~rc3/lib/librte_flow_classify/rte_flow_classify.h
Examining data/dpdk-20.11~rc3/lib/librte_flow_classify/rte_flow_classify_parse.c
Examining data/dpdk-20.11~rc3/lib/librte_flow_classify/rte_flow_classify_parse.h
Examining data/dpdk-20.11~rc3/lib/librte_graph/graph.c
Examining data/dpdk-20.11~rc3/lib/librte_graph/graph_debug.c
Examining data/dpdk-20.11~rc3/lib/librte_graph/graph_ops.c
Examining data/dpdk-20.11~rc3/lib/librte_graph/graph_populate.c
Examining data/dpdk-20.11~rc3/lib/librte_graph/graph_private.h
Examining data/dpdk-20.11~rc3/lib/librte_graph/graph_stats.c
Examining data/dpdk-20.11~rc3/lib/librte_graph/node.c
Examining data/dpdk-20.11~rc3/lib/librte_graph/rte_graph.h
Examining data/dpdk-20.11~rc3/lib/librte_graph/rte_graph_worker.h
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_tcp4.c
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_tcp4.h
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_udp4.c
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_udp4.h
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_vxlan_tcp4.c
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_vxlan_tcp4.h
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_vxlan_udp4.c
Examining data/dpdk-20.11~rc3/lib/librte_gro/gro_vxlan_udp4.h
Examining data/dpdk-20.11~rc3/lib/librte_gro/rte_gro.c
Examining data/dpdk-20.11~rc3/lib/librte_gro/rte_gro.h
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_common.c
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_common.h
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_tcp4.c
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_tcp4.h
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_tunnel_tcp4.c
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_tunnel_tcp4.h
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_udp4.c
Examining data/dpdk-20.11~rc3/lib/librte_gso/gso_udp4.h
Examining data/dpdk-20.11~rc3/lib/librte_gso/rte_gso.c
Examining data/dpdk-20.11~rc3/lib/librte_gso/rte_gso.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_cmp_arm64.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_cmp_x86.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_crc_arm64.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.c
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_fbk_hash.c
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_fbk_hash.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_hash.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_hash_crc.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_jhash.h
Examining data/dpdk-20.11~rc3/lib/librte_hash/rte_thash.h
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/ip_frag_common.h
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/ip_frag_internal.c
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/rte_ip_frag.h
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/rte_ip_frag_common.c
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/rte_ipv4_fragmentation.c
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/rte_ipv4_reassembly.c
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/rte_ipv6_fragmentation.c
Examining data/dpdk-20.11~rc3/lib/librte_ip_frag/rte_ipv6_reassembly.c
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/crypto.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/esp_inb.c
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/esp_outb.c
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/iph.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sqn.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/misc.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/pad.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/rte_ipsec.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/rte_ipsec_group.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/rte_ipsec_sa.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/rte_ipsec_sad.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/sa.c
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/sa.h
Examining data/dpdk-20.11~rc3/lib/librte_ipsec/ses.c
Examining data/dpdk-20.11~rc3/lib/librte_jobstats/rte_jobstats.c
Examining data/dpdk-20.11~rc3/lib/librte_jobstats/rte_jobstats.h
Examining data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c
Examining data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.h
Examining data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_common.h
Examining data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_fifo.h
Examining data/dpdk-20.11~rc3/lib/librte_kvargs/rte_kvargs.c
Examining data/dpdk-20.11~rc3/lib/librte_kvargs/rte_kvargs.h
Examining data/dpdk-20.11~rc3/lib/librte_latencystats/rte_latencystats.c
Examining data/dpdk-20.11~rc3/lib/librte_latencystats/rte_latencystats.h
Examining data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm.c
Examining data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm.h
Examining data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm6.c
Examining data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm6.h
Examining data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm_altivec.h
Examining data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm_neon.h
Examining data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm_sse.h
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf.c
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf.h
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_core.h
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_dyn.c
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_dyn.h
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_pool_ops.c
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_pool_ops.h
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_ptype.c
Examining data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_ptype.h
Examining data/dpdk-20.11~rc3/lib/librte_member/rte_member.c
Examining data/dpdk-20.11~rc3/lib/librte_member/rte_member.h
Examining data/dpdk-20.11~rc3/lib/librte_member/rte_member_ht.c
Examining data/dpdk-20.11~rc3/lib/librte_member/rte_member_ht.h
Examining data/dpdk-20.11~rc3/lib/librte_member/rte_member_vbf.c
Examining data/dpdk-20.11~rc3/lib/librte_member/rte_member_vbf.h
Examining data/dpdk-20.11~rc3/lib/librte_member/rte_member_x86.h
Examining data/dpdk-20.11~rc3/lib/librte_mempool/mempool_trace_points.c
Examining data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.c
Examining data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.h
Examining data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool_ops.c
Examining data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool_ops_default.c
Examining data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool_trace.h
Examining data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool_trace_fp.h
Examining data/dpdk-20.11~rc3/lib/librte_meter/rte_meter.c
Examining data/dpdk-20.11~rc3/lib/librte_meter/rte_meter.h
Examining data/dpdk-20.11~rc3/lib/librte_metrics/rte_metrics.c
Examining data/dpdk-20.11~rc3/lib/librte_metrics/rte_metrics.h
Examining data/dpdk-20.11~rc3/lib/librte_metrics/rte_metrics_telemetry.c
Examining data/dpdk-20.11~rc3/lib/librte_metrics/rte_metrics_telemetry.h
Examining data/dpdk-20.11~rc3/lib/librte_net/net_crc.h
Examining data/dpdk-20.11~rc3/lib/librte_net/net_crc_avx512.c
Examining data/dpdk-20.11~rc3/lib/librte_net/net_crc_neon.c
Examining data/dpdk-20.11~rc3/lib/librte_net/net_crc_sse.c
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_arp.c
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_arp.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_ecpri.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_esp.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_ether.c
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_ether.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_geneve.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_gre.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_gtp.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_higig.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_icmp.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_ip.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_mpls.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_net.c
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_net.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_net_crc.c
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_net_crc.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_sctp.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_tcp.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_udp.h
Examining data/dpdk-20.11~rc3/lib/librte_net/rte_vxlan.h
Examining data/dpdk-20.11~rc3/lib/librte_node/ethdev_ctrl.c
Examining data/dpdk-20.11~rc3/lib/librte_node/ethdev_rx.c
Examining data/dpdk-20.11~rc3/lib/librte_node/ethdev_rx_priv.h
Examining data/dpdk-20.11~rc3/lib/librte_node/ethdev_tx.c
Examining data/dpdk-20.11~rc3/lib/librte_node/ethdev_tx_priv.h
Examining data/dpdk-20.11~rc3/lib/librte_node/ip4_lookup.c
Examining data/dpdk-20.11~rc3/lib/librte_node/ip4_lookup_neon.h
Examining data/dpdk-20.11~rc3/lib/librte_node/ip4_lookup_sse.h
Examining data/dpdk-20.11~rc3/lib/librte_node/ip4_rewrite.c
Examining data/dpdk-20.11~rc3/lib/librte_node/ip4_rewrite_priv.h
Examining data/dpdk-20.11~rc3/lib/librte_node/log.c
Examining data/dpdk-20.11~rc3/lib/librte_node/node_private.h
Examining data/dpdk-20.11~rc3/lib/librte_node/null.c
Examining data/dpdk-20.11~rc3/lib/librte_node/pkt_cls.c
Examining data/dpdk-20.11~rc3/lib/librte_node/pkt_cls_priv.h
Examining data/dpdk-20.11~rc3/lib/librte_node/pkt_drop.c
Examining data/dpdk-20.11~rc3/lib/librte_node/rte_node_eth_api.h
Examining data/dpdk-20.11~rc3/lib/librte_node/rte_node_ip4_api.h
Examining data/dpdk-20.11~rc3/lib/librte_pci/rte_pci.c
Examining data/dpdk-20.11~rc3/lib/librte_pci/rte_pci.h
Examining data/dpdk-20.11~rc3/lib/librte_pdump/rte_pdump.c
Examining data/dpdk-20.11~rc3/lib/librte_pdump/rte_pdump.h
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.c
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.h
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_port_in_action.c
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_port_in_action.h
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.h
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_extern.h
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.h
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c
Examining data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_ethdev.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_ethdev.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_eventdev.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_eventdev.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_fd.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_fd.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_kni.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_kni.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_ras.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_ras.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_ring.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_ring.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_sched.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_sched.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_source_sink.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_source_sink.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_sym_crypto.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_port_sym_crypto.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_ethdev.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_ethdev.h
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_source_sink.c
Examining data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_source_sink.h
Examining data/dpdk-20.11~rc3/lib/librte_power/channel_commands.h
Examining data/dpdk-20.11~rc3/lib/librte_power/guest_channel.c
Examining data/dpdk-20.11~rc3/lib/librte_power/guest_channel.h
Examining data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c
Examining data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.h
Examining data/dpdk-20.11~rc3/lib/librte_power/power_common.c
Examining data/dpdk-20.11~rc3/lib/librte_power/power_common.h
Examining data/dpdk-20.11~rc3/lib/librte_power/power_kvm_vm.c
Examining data/dpdk-20.11~rc3/lib/librte_power/power_kvm_vm.h
Examining data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c
Examining data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.h
Examining data/dpdk-20.11~rc3/lib/librte_power/rte_power.c
Examining data/dpdk-20.11~rc3/lib/librte_power/rte_power.h
Examining data/dpdk-20.11~rc3/lib/librte_power/rte_power_empty_poll.c
Examining data/dpdk-20.11~rc3/lib/librte_power/rte_power_empty_poll.h
Examining data/dpdk-20.11~rc3/lib/librte_rawdev/rte_rawdev.c
Examining data/dpdk-20.11~rc3/lib/librte_rawdev/rte_rawdev.h
Examining data/dpdk-20.11~rc3/lib/librte_rawdev/rte_rawdev_pmd.h
Examining data/dpdk-20.11~rc3/lib/librte_rcu/rcu_qsbr_pvt.h
Examining data/dpdk-20.11~rc3/lib/librte_rcu/rte_rcu_qsbr.c
Examining data/dpdk-20.11~rc3/lib/librte_rcu/rte_rcu_qsbr.h
Examining data/dpdk-20.11~rc3/lib/librte_regexdev/rte_regexdev.c
Examining data/dpdk-20.11~rc3/lib/librte_regexdev/rte_regexdev.h
Examining data/dpdk-20.11~rc3/lib/librte_regexdev/rte_regexdev_core.h
Examining data/dpdk-20.11~rc3/lib/librte_regexdev/rte_regexdev_driver.h
Examining data/dpdk-20.11~rc3/lib/librte_reorder/rte_reorder.c
Examining data/dpdk-20.11~rc3/lib/librte_reorder/rte_reorder.h
Examining data/dpdk-20.11~rc3/lib/librte_rib/rte_rib.c
Examining data/dpdk-20.11~rc3/lib/librte_rib/rte_rib.h
Examining data/dpdk-20.11~rc3/lib/librte_rib/rte_rib6.c
Examining data/dpdk-20.11~rc3/lib/librte_rib/rte_rib6.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring.c
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_c11_mem.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_core.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_generic.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_hts.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_hts_c11_mem.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_peek.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_peek_c11_mem.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_peek_zc.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_rts.h
Examining data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_rts_c11_mem.h
Examining data/dpdk-20.11~rc3/lib/librte_sched/rte_approx.c
Examining data/dpdk-20.11~rc3/lib/librte_sched/rte_approx.h
Examining data/dpdk-20.11~rc3/lib/librte_sched/rte_red.c
Examining data/dpdk-20.11~rc3/lib/librte_sched/rte_red.h
Examining data/dpdk-20.11~rc3/lib/librte_sched/rte_sched.c
Examining data/dpdk-20.11~rc3/lib/librte_sched/rte_sched.h
Examining data/dpdk-20.11~rc3/lib/librte_sched/rte_sched_common.h
Examining data/dpdk-20.11~rc3/lib/librte_security/rte_security.c
Examining data/dpdk-20.11~rc3/lib/librte_security/rte_security.h
Examining data/dpdk-20.11~rc3/lib/librte_security/rte_security_driver.h
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack.c
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack.h
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack_lf.c
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack_lf.h
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack_lf_c11.h
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack_lf_generic.h
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack_lf_stubs.h
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack_std.c
Examining data/dpdk-20.11~rc3/lib/librte_stack/rte_stack_std.h
Examining data/dpdk-20.11~rc3/lib/librte_stack/stack_pvt.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_lru.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_lru_arm64.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_lru_x86.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_swx_table.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_swx_table_em.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_swx_table_em.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_array.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_array.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_cuckoo.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_cuckoo.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_ext.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_func.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_func_arm64.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_lru.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm_ipv6.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm_ipv6.h
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_stub.c
Examining data/dpdk-20.11~rc3/lib/librte_table/rte_table_stub.h
Examining data/dpdk-20.11~rc3/lib/librte_telemetry/rte_telemetry.h
Examining data/dpdk-20.11~rc3/lib/librte_telemetry/rte_telemetry_legacy.h
Examining data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c
Examining data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_data.c
Examining data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_data.h
Examining data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_json.h
Examining data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c
Examining data/dpdk-20.11~rc3/lib/librte_timer/rte_timer.c
Examining data/dpdk-20.11~rc3/lib/librte_timer/rte_timer.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/fd_man.c
Examining data/dpdk-20.11~rc3/lib/librte_vhost/fd_man.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/iotlb.c
Examining data/dpdk-20.11~rc3/lib/librte_vhost/iotlb.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/rte_vdpa.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/rte_vdpa_dev.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/rte_vhost.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/rte_vhost_async.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/rte_vhost_crypto.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/socket.c
Examining data/dpdk-20.11~rc3/lib/librte_vhost/vdpa.c
Examining data/dpdk-20.11~rc3/lib/librte_vhost/vhost.c
Examining data/dpdk-20.11~rc3/lib/librte_vhost/vhost.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/vhost_crypto.c
Examining data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c
Examining data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/virtio_crypto.h
Examining data/dpdk-20.11~rc3/lib/librte_vhost/virtio_net.c

FINAL RESULTS:

data/dpdk-20.11~rc3/app/test/process.h:161:6:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	if (readlink(path, buf, sizeof(buf)) == -1)
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:40:6:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	if (readlink(proc_path, filename, sizeof(filename)) < 0) {
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:44:10:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	count = readlink(filename, path, PATH_MAX);
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:984:4:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
			strncat(args, line, ARK_MAX_ARG_LEN);
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:335:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	ret = readlink(in, buf, size);
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:232:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	ret = readlink(path, link, (sizeof(link)-1));
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1306:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	ret = readlink(linkname, filename, sizeof(filename));
data/dpdk-20.11~rc3/app/pdump/main.c:645:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(mempool_name, SIZE, MP_NAME, i);
data/dpdk-20.11~rc3/app/pdump/main.c:666:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(ring_name, SIZE, RX_RING, i);
data/dpdk-20.11~rc3/app/pdump/main.c:677:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(ring_name, SIZE, TX_RING, i);
data/dpdk-20.11~rc3/app/pdump/main.c:688:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_name, sizeof(vdev_name),
data/dpdk-20.11~rc3/app/pdump/main.c:691:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/pdump/main.c:693:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/pdump/main.c:718:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(vdev_name, sizeof(vdev_name),
data/dpdk-20.11~rc3/app/pdump/main.c:721:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/pdump/main.c:723:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/pdump/main.c:749:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(ring_name, SIZE, RX_RING, i);
data/dpdk-20.11~rc3/app/pdump/main.c:758:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_name, sizeof(vdev_name),
data/dpdk-20.11~rc3/app/pdump/main.c:761:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/pdump/main.c:763:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/pdump/main.c:786:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(ring_name, SIZE, TX_RING, i);
data/dpdk-20.11~rc3/app/pdump/main.c:795:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_name, sizeof(vdev_name),
data/dpdk-20.11~rc3/app/pdump/main.c:798:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/pdump/main.c:800:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(vdev_args, sizeof(vdev_args),
data/dpdk-20.11~rc3/app/test-acl/main.c:346:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(fh, fmt, ##args);            \
data/dpdk-20.11~rc3/app/test-acl/main.c:947:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout,
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c:791:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(name_tmp, "%s%i", "name_", num_devs);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c:798:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(name_tmp, "%s%i", "name_", num_devs);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c:807:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(name_tmp, "%s%i", "name_", num_devs);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c:828:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(name_tmp, "%s", "invalid_name");
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1389:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(entry, line);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1412:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(&entry[strlen(entry)], line);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:496:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(opts->test_file, F_OK) != -1)
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_latency.c:332:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("\n#     Number of bursts: %"PRIu64,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_latency.c:338:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("\n#  enqueued\t%12"PRIu64"\t%10"PRIu64"\t"
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_latency.c:341:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("\n#  dequeued\t%12"PRIu64"\t%10"PRIu64"\t"
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_latency.c:344:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("\n#    cycles\t%12"PRIu64"\t%10"PRIu64"\t"
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_pmd_cyclecount.c:454:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(PRETTY_HDR_FMT, "lcore id", "Buf Size",
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_pmd_cyclecount.c:460:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(PRETTY_LINE_FMT, state.ctx->lcore_id,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_pmd_cyclecount.c:470:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(CSV_HDR_FMT, "# lcore id", "Buf Size",
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_pmd_cyclecount.c:476:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(CSV_LINE_FMT, state.ctx->lcore_id,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:509:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(entry, line);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:527:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(&entry[strlen(entry)], line);
data/dpdk-20.11~rc3/app/test-eventdev/evt_common.h:19:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, CLRED"error: %s() "fmt CLNRM "\n", __func__, ## args)
data/dpdk-20.11~rc3/app/test-eventdev/evt_common.h:22:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout, CLYEL""fmt CLNRM "\n", ## args)
data/dpdk-20.11~rc3/app/test-eventdev/test_order_common.c:305:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(CLGRN"\r%"PRId64""CLNRM, remaining);
data/dpdk-20.11~rc3/app/test-eventdev/test_perf_common.c:19:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("Worker %d packets: "CLGRN"%"PRIx64" "CLNRM"percentage:"
data/dpdk-20.11~rc3/app/test-eventdev/test_perf_common.c:315:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(CLGRN"\r%.3f mpps avg %.3f mpps [avg fwd latency %.3f us] "CLNRM,
data/dpdk-20.11~rc3/app/test-eventdev/test_perf_common.c:319:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(CLGRN"\r%.3f mpps avg %.3f mpps"CLNRM,
data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_common.c:96:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(CLGRN"\r%.3f mpps avg %.3f mpps"CLNRM,
data/dpdk-20.11~rc3/app/test-fib/main.c:574:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(f, NIPQUAD_FMT"\n", NIPQUAD(tbl4[i]));
data/dpdk-20.11~rc3/app/test-fib/main.c:577:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(f, NIPQUAD6_FMT"\n", NIPQUAD6(&tbl6[i * 16]));
data/dpdk-20.11~rc3/app/test-fib/main.c:617:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout,
data/dpdk-20.11~rc3/app/test-fib/main.c:815:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(f, NIPQUAD_FMT"/%d %"PRIu64"\n", NIPQUAD(rt[i].addr),
data/dpdk-20.11~rc3/app/test-fib/main.c:1020:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(f, NIPQUAD6_FMT"/%d %"PRIu64"\n", NIPQUAD6(rt[i].addr),
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1073:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		off += sprintf(buf + off, "%s,", p[i]);
data/dpdk-20.11~rc3/app/test-pipeline/config.c:50:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(usage);
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:14705:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
					printf(first_pctype ?
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:16155:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dynf_names[flag], desc_flag.name);
data/dpdk-20.11~rc3/app/test-pmd/config.c:1589:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(" id=%" PRIu64, flt->tunnel.tun_id);
data/dpdk-20.11~rc3/app/test-pmd/noisy_vnf.c:255:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(name, NOISY_STRSIZE, NOISY_RING, pi);
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:933:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = snprintf(mz_name, sizeof(mz_name),
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:1790:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("  RX-packets: %-14"PRIu64" TX-packets: %-14"PRIu64
data/dpdk-20.11~rc3/app/test-pmd/testpmd.h:667:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(mp_name, name_size,
data/dpdk-20.11~rc3/app/test-pmd/testpmd.h:670:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(mp_name, name_size,
data/dpdk-20.11~rc3/app/test-sad/main.c:136:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout,
data/dpdk-20.11~rc3/app/test/process.h:118:7:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (execv(path, argv_cpy) < 0) {
data/dpdk-20.11~rc3/app/test/test_cmdline_ipaddr.c:271:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(NIPQUAD_FMT " prefixlen=%u\n",
data/dpdk-20.11~rc3/app/test/test_cmdline_ipaddr.c:277:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(NIP6_FMT " prefixlen=%u\n",
data/dpdk-20.11~rc3/app/test/test_common.c:18:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	{printf(x "() test failed!\n");\
data/dpdk-20.11~rc3/app/test/test_common.c:29:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	{printf(#x "() test failed!\n");\
data/dpdk-20.11~rc3/app/test/test_common.c:108:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	{printf(x "() test failed: %u %u\n", i, p);\
data/dpdk-20.11~rc3/app/test/test_common.c:111:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	{printf(x "() test failed: %"PRIu64" %"PRIu64"\n", j, q);\
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:725:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(temp_str, vdev_args);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:737:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(temp_str, vdev_args);
data/dpdk-20.11~rc3/app/test/test_cryptodev_security_pdcp.c:182:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(#func"-PASS\n");			\
data/dpdk-20.11~rc3/app/test/test_efd_perf.c:369:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("%-18"PRIu64, cycles[i][j]);
data/dpdk-20.11~rc3/app/test/test_errno.c:60:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(expected_libc_retval, sizeof(expected_libc_retval),
data/dpdk-20.11~rc3/app/test/test_errno.c:72:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(expected_libc_retval, sizeof(expected_libc_retval),
data/dpdk-20.11~rc3/app/test/test_hash_perf.c:631:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
					printf("%-18"PRIu64, cycles[i][j][with_hash][with_data]);
data/dpdk-20.11~rc3/app/test/test_kni.c:139:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(IFCONFIG TEST_KNI_PORT" up") == -1) {
data/dpdk-20.11~rc3/app/test/test_kni.c:176:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(IFCONFIG TEST_KNI_PORT" down") == -1)
data/dpdk-20.11~rc3/app/test/test_kni.c:223:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(IFCONFIG TEST_KNI_PORT" up") == -1)
data/dpdk-20.11~rc3/app/test/test_kni.c:225:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(IFCONFIG TEST_KNI_PORT" mtu 1400") == -1)
data/dpdk-20.11~rc3/app/test/test_kni.c:227:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(IFCONFIG TEST_KNI_PORT" down") == -1)
data/dpdk-20.11~rc3/app/test/test_kni.c:397:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(IFCONFIG TEST_KNI_PORT " mtu" TEST_KNI_MTU_STR)
data/dpdk-20.11~rc3/app/test/test_kni.c:402:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(IFCONFIG TEST_KNI_PORT " mtu" TEST_KNI_MTU_STR)
data/dpdk-20.11~rc3/app/test/test_kni.c:453:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(conf.name, sizeof(conf.name), TEST_KNI_PORT);
data/dpdk-20.11~rc3/app/test/test_link_bonding_mode4.c:409:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			retval = snprintf(name, RTE_DIM(name), SLAVE_RX_QUEUE_FMT, i);
data/dpdk-20.11~rc3/app/test/test_link_bonding_mode4.c:418:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			retval = snprintf(name, RTE_DIM(name), SLAVE_TX_QUEUE_FMT, i);
data/dpdk-20.11~rc3/app/test/test_link_bonding_mode4.c:427:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			retval = snprintf(name, RTE_DIM(name), SLAVE_DEV_NAME_FMT, i);
data/dpdk-20.11~rc3/app/test/test_link_bonding_mode4.c:518:64:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	rte_ether_addr_copy(&parnter_system, &lacp->actor.port_params.system);
data/dpdk-20.11~rc3/app/test/test_link_bonding_rssconf.c:532:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(name, sizeof(name), SLAVE_DEV_NAME_FMT, port_id);
data/dpdk-20.11~rc3/app/test/test_member_perf.c:585:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf("%-18"PRIu64, cycles[j][i][k]);
data/dpdk-20.11~rc3/app/test/test_memzone.c:903:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(name, sizeof(name), TEST_MEMZONE_NAME("tempzone%u"),
data/dpdk-20.11~rc3/app/test/test_meter.c:18:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(format, ##__VA_ARGS__);\
data/dpdk-20.11~rc3/app/test/test_meter.c:24:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(format, ##__VA_ARGS__);\
data/dpdk-20.11~rc3/app/test/test_power_cpufreq.c:53:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	if (snprintf(fullpath, sizeof(fullpath),
data/dpdk-20.11~rc3/app/test/test_service_cores.c:151:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), DUMMY_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:186:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), DUMMY_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:216:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), DUMMY_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:231:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), DUMMY_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:263:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), DUMMY_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:352:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), DUMMY_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:636:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), MT_SAFE_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:777:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, sizeof(service.name), MT_SAFE_SERVICE_NAME);
data/dpdk-20.11~rc3/app/test/test_string_fns.c:17:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, __VA_ARGS__); \
data/dpdk-20.11~rc3/app/test/test_tailq.c:20:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(__VA_ARGS__); \
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:310:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmpsymname, "__%s%s", drv->name, opt_tags[i].suffix);
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:318:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmpsymname, "__%s_pci_tbl_export", drv->name);
data/dpdk-20.11~rc3/drivers/baseband/null/bbdev_null.c:107:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(ring_name, RTE_RING_NAMESIZE, RTE_STR(DRIVER_NAME) "%u:%u",
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:300:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE, RTE_STR(DRIVER_NAME)"_enc_o%u:%u",
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:321:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE,
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:342:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE, RTE_STR(DRIVER_NAME)"_ag%u:%u",
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:362:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE, RTE_STR(DRIVER_NAME)"_cb%u:%u",
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:382:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE,
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:403:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE,
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:424:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE,
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:445:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, RTE_RING_NAMESIZE, RTE_STR(DRIVER_NAME)"%u:%u",
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman.c:96:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(portal->irqname, MAX_IRQNAME, IRQNAME, c->cpu);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/process.c:317:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(args.if_name, if_name);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/process.c:387:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(args.if_name, if_name);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/process.c:402:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(args.if_name, if_name);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/process.c:431:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(args.if_name, if_name);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/process.c:458:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(args.if_name, if_name);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman.c:586:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(portal->irqname, MAX_IRQNAME, IRQNAME, c->cpu);
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:421:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(out_name, sep);
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:434:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(out_name, sep);
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:454:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ((access(DPAA_DEV_PATH1, F_OK) != 0) &&
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:455:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    (access(DPAA_DEV_PATH2, F_OK) != 0)) {
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:713:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ((access(DPAA_DEV_PATH1, F_OK) != 0) &&
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:714:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    (access(DPAA_DEV_PATH2, F_OK) != 0)) {
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c:295:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(addr, sep);
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c:324:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fslmc_dirpath, "%s/%s", SYSFS_FSL_MC_DEVICES, fslmc_container);
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:161:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	ret = system(command);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/include/compat.h:40:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(fmt, ##args); \
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/include/compat.h:62:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define pr_debug(fmt, args...)	printf(fmt, ##args)
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:124:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(devname, O_RDWR) < 0) {
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:202:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(maps[map_idx].path, devname);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:280:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(filename, F_OK) &&
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:287:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(filename, F_OK) &&
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:296:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(filename, F_OK) != -1) {
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:526:6:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (fscanf(fp, "%" PRIx64, &vtd_cap_reg) != 1) {
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:698:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pci_id, sizeof(pci_id), PCI_PRI_FMT,
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:145:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(dirname, sizeof(dirname),
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:361:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(maps[map_idx].path, devname);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:717:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pci_addr, sizeof(pci_addr), PCI_PRI_FMT,
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:866:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pci_addr, sizeof(pci_addr), PCI_PRI_FMT,
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:977:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pci_addr, sizeof(pci_addr), PCI_PRI_FMT,
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:1034:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pci_addr, sizeof(pci_addr), PCI_PRI_FMT,
data/dpdk-20.11~rc3/drivers/bus/pci/pci_common.c:369:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(f, PCI_PRI_FMT, dev->addr.domain, dev->addr.bus,
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:125:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(dirname, sizeof(dirname),
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:289:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(filename, R_OK) == 0) {
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:351:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return access(ring_path, R_OK|W_OK) == 0;
data/dpdk-20.11~rc3/drivers/common/dpaax/compat.h:78:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(fmt, ##args); \
data/dpdk-20.11~rc3/drivers/common/dpaax/compat.h:95:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define pr_debug(fmt, args...)	printf(fmt, ##args)
data/dpdk-20.11~rc3/drivers/common/iavf/iavf_impl.c:28:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(z_name, sizeof(z_name), "iavf_dma_%"PRIu64, rte_rand());
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:211:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		r = fscanf(file, (dev_type ? "%x" : "%u"), &dev_port);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:320:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			ret = snprintf(name, sizeof(name), "%.*s%s" MLX5_GLUE,
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.c:222:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
mlx5_glue_reg_mr(struct ibv_pd *pd, void *addr, size_t length, int access)
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.c:224:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return ibv_reg_mr(pd, addr, length, access);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.c:1006:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			uint32_t access)
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.c:1009:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return mlx5dv_devx_umem_reg(context, addr, size, access);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.c:1014:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	(void)access;
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.h:184:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				 size_t length, int access);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_glue.h:305:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
						  uint32_t access);
data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common.h:111:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int mkstr_size_##name = snprintf(NULL, 0, "" __VA_ARGS__); \
data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common.h:114:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, sizeof(name), "" __VA_ARGS__)
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:124:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fsdev->dirname, dirpath);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:125:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fsdev->name, devname);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:250:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(top_dirpath, "%s", SYSFS_BCM_PLTFORM_DEVICES);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:142:13:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
				*algo = EVP_des_cbc();
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:471:27:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
		sess->cipher.evp_algo = EVP_des_cbc();
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:498:27:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
		sess->cipher.evp_algo = EVP_des_cbc();
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:502:48:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
		if (EVP_EncryptInit_ex(sess->cipher.bpi_ctx, EVP_des_ecb(),
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:88:10:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
		algo = EVP_des_ecb();
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_multicore.c:347:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(r_name, sizeof(r_name), MC_SCHED_ENQ_RING_NAME_PREFIX
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_multicore.c:361:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(r_name, sizeof(r_name), MC_SCHED_DEQ_RING_NAME_PREFIX
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_xstats.c:200:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(xstats_name, sizeof(xstats_name),
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_xstats.c:206:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(xstats_name, sizeof(xstats_name),
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_xstats.c:239:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ctx->names[ctx->count].name, xstats_name);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev_xstats.c:90:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[j].name,
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:669:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(f, zp_percent < 10 ? "\t\t0:%.02f%% " : "\t\t0:%.0f%% ",
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:742:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(f, "\t  Port %d: Pkts: %"PRIu64, port,
data/dpdk-20.11~rc3/drivers/mempool/bucket/rte_mempool_bucket.c:423:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	rc = snprintf(rg_name, sizeof(rg_name), RTE_MEMPOOL_MZ_FORMAT ".a%u",
data/dpdk-20.11~rc3/drivers/mempool/bucket/rte_mempool_bucket.c:501:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	rc = snprintf(rg_name, sizeof(rg_name),
data/dpdk-20.11~rc3/drivers/mempool/bucket/rte_mempool_bucket.c:515:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	rc = snprintf(rg_name, sizeof(rg_name),
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool.c:333:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, OTX2_NPA_DEV_NAME_LEN,
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool_debug.c:7:28:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define npa_dump(fmt, ...) fprintf(stderr, fmt "\n", ##__VA_ARGS__)
data/dpdk-20.11~rc3/drivers/mempool/ring/rte_mempool_ring.c:85:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(rg_name, sizeof(rg_name),
data/dpdk-20.11~rc3/drivers/mempool/stack/rte_mempool_stack.c:16:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(name, sizeof(name),
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:1368:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(value, F_OK) != 0) {
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_ethdev.c:1071:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[i].name, xstats_names_copy[ids[i]].name);
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:147:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(mz_name, sizeof(mz_name), "bnx2x%d_%s_%" PRIx64, SC_ABS_FUNC(sc), msg,
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:150:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(mz_name, sizeof(mz_name), "bnx2x%d_%s_%" PRIx64, sc->pcie_device, msg,
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_ethdev.c:637:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(sc->devinfo.name, NAME_SIZE, PCI_SHORT_PRI_FMT ":dpdk-port-%u",
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:595:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(type, "bnxt_rx_fc_in_" PCI_PRI_FMT, pdev->addr.domain,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:604:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(type, "bnxt_rx_fc_out_" PCI_PRI_FMT, pdev->addr.domain,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:613:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(type, "bnxt_tx_fc_in_" PCI_PRI_FMT, pdev->addr.domain,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:622:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(type, "bnxt_tx_fc_out_" PCI_PRI_FMT, pdev->addr.domain,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:1140:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(type, "bnxt_hwrm_" PCI_PRI_FMT,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:1175:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(type, "bnxt_hwrm_short_" PCI_PRI_FMT,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:2654:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(type, "bnxt_hwrm_" PCI_PRI_FMT, pdev->addr.domain,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:57:30:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	addr = l->actor.port_params.system.addr_bytes;
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:61:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	addr = l->partner.port_params.system.addr_bytes;
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:325:39:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			rte_is_same_ether_addr(&agg->actor.system,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:326:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			&lacp->partner.port_params.system) &&
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:607:34:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	rte_ether_addr_copy(&agg->actor.system,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:608:35:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			&hdr->lacpdu.actor.port_params.system);
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:717:41:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			rte_is_same_ether_addr(&agg->partner.system,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:718:21:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
					&port->partner.system) == 1
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:720:42:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			rte_is_zero_ether_addr(&port->partner.system) != 1 &&
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:813:52:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (rte_is_zero_ether_addr(&partner->port_params.system) ||
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:814:49:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			rte_is_same_ether_addr(&partner->port_params.system,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:872:44:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (!rte_is_same_ether_addr(&port->actor.system, &slave_addr)) {
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:873:50:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			rte_ether_addr_copy(&slave_addr, &port->actor.system);
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:1157:57:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (rte_is_same_ether_addr(&slave_addr, &slave->actor.system))
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:1160:50:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		rte_ether_addr_copy(&slave_addr, &slave->actor.system);
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.h:68:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	struct rte_ether_addr system;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:733:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(bufp, "BASE-%s",
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:829:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[i].name, xstats_names_copy[ids[i]].name);
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:2163:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access("/tmp/fmc.bin", F_OK) == -1) {
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_flow.c:932:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(fm_log, F_OK) != -1) {
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_rxtx.c:62:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DISPLAY_PRINT printf
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:54:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(dev_name, "%s%s%d", "/dev/", DEV_FM_NAME, id);
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:128:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(dev_name, "%s%s%u-pcd", "/dev/", DEV_FM_NAME,
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:355:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dev_name, "%s%s%u-port-oh%d", "/dev/", DEV_FM_NAME,
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:360:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dev_name, "%s%s%u-port-rx%d", "/dev/", DEV_FM_NAME,
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:365:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dev_name, "%s%s%u-port-rx%d", "/dev/", DEV_FM_NAME,
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:370:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dev_name, "%s%s%u-port-tx%d", "/dev/", DEV_FM_NAME,
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:375:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dev_name, "%s%s%u-port-tx%d", "/dev/", DEV_FM_NAME,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c:1760:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[i].name, xstats_names_copy[ids[i]].name);
data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c:1921:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(xstats_names[i].name,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_plat_dpdk.h:182:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(z_name, sizeof(z_name),		\
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_plat_dpdk.h:220:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(z_name, sizeof(z_name),		\
data/dpdk-20.11~rc3/drivers/net/ena/ena_ethdev.c:2675:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[count].name,
data/dpdk-20.11~rc3/drivers/net/ena/ena_ethdev.c:2679:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[count].name,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1384:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ip4, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1388:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ip4, "%s ", "ip4(x)");
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1391:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ip6, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1395:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ip6, "%s ", "ip6(x)");
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1398:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(udp, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1402:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(udp, "%s ", "udp(x)");
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1405:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tcp, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1409:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tcp, "%s ", "tcp(x)");
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1412:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tcpudp, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1416:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tcpudp, "%s ", "tcpudp(x)");
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1419:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ip4csum, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1423:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ip4csum, "%s ", "ip4csum(x)");
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1426:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(l4csum, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1430:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(l4csum, "%s ", "l4csum(x)");
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1433:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ipfrag, "%s ",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1437:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ipfrag, "%s ", "ipfrag(x)");
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe.c:206:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(priv->my_owner.name, sizeof(priv->my_owner.name),
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:112:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	fp = popen(sdev->cmdline, "r");
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_cmd.c:54:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(z_name, sizeof(z_name), "hns3_dma_%" PRIu64, rte_rand());
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_common.c:3528:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				enum i40e_aq_resource_access_type access,
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_common.c:3542:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	cmd_resp->access_type = CPU_TO_LE16(access);
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_nvm.c:59:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				       enum i40e_aq_resource_access_type access)
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_nvm.c:70:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	ret_code = i40e_aq_request_resource(hw, I40E_NVM_RESOURCE_ID, access,
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_nvm.c:81:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			   access, time_left, ret_code, hw->aq.asq_last_status);
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_nvm.c:91:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
							access, 0, &time_left,
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_prototype.h:221:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				enum i40e_aq_resource_access_type access,
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_prototype.h:453:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				      enum i40e_aq_resource_access_type access);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:4569:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(z_name, sizeof(z_name), "i40e_dma_%"PRIu64, rte_rand());
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:12115:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(name, proto[n].name);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c:1505:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	       enum ice_aq_res_access_type access, u8 sdp_number, u32 *timeout,
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c:1519:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	cmd_resp->access_type = CPU_TO_LE16(access);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c:1604:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		enum ice_aq_res_access_type access, u32 timeout)
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c:1613:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	status = ice_aq_req_res(hw, res, access, 0, &time_left, NULL);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c:1624:76:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		ice_debug(hw, ICE_DBG_RES, "resource %d acquire type %d failed.\n", res, access);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c:1631:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		status = ice_aq_req_res(hw, res, access, 0, &time_left, NULL);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.h:40:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		enum ice_aq_res_access_type access, u32 timeout);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.c:705:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			    enum ice_aq_res_access_type access)
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.c:711:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	status = ice_acquire_res(hw, ICE_GLOBAL_CFG_LOCK_RES_ID, access,
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.c:739:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ice_acquire_change_lock(struct ice_hw *hw, enum ice_aq_res_access_type access)
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.c:743:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return ice_acquire_res(hw, ICE_CHANGE_LOCK_RES_ID, access,
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.h:25:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ice_acquire_change_lock(struct ice_hw *hw, enum ice_aq_res_access_type access);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_nvm.c:189:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ice_acquire_nvm(struct ice_hw *hw, enum ice_aq_res_access_type access)
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_nvm.c:196:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return ice_acquire_res(hw, ICE_NVM_RES_ID, access, ICE_NVM_TIMEOUT);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_nvm.h:88:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ice_acquire_nvm(struct ice_hw *hw, enum ice_aq_res_access_type access);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_osdep.h:162:22:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define ice_snprintf snprintf
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_osdep.h:254:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(z_name, sizeof(z_name), "ice_dma_%"PRIu64, rte_rand());
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:273:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pkg_name, ICE_MAX_PKG_FILENAME_SIZE,
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:276:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(pkg_name, 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:279:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pkg_name, ICE_MAX_PKG_FILENAME_SIZE,
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:282:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(pkg_name, 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:288:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(pkg_name, 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:293:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(pkg_name, 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1782:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(strcat(pkg_file, opt_ddp_filename), 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1782:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	if (!access(strcat(pkg_file, opt_ddp_filename), 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1787:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(strcat(pkg_file, opt_ddp_filename), 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1787:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	if (!access(strcat(pkg_file, opt_ddp_filename), 0))
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1792:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(pkg_file, 0))
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.c:783:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[i].name, xstats_names_copy[ids[i]].name);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:3493:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(xstats_names[i].name,
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:1240:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			ret = snprintf(name, sizeof(name), "%.*s%s" MLX4_GLUE,
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c:110:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		r = fscanf(file, (dev_type ? "%x" : "%u"), &dev_port);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_glue.c:186:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
mlx4_glue_reg_mr(struct ibv_pd *pd, void *addr, size_t length, int access)
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_glue.c:188:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return ibv_reg_mr(pd, addr, length, access);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_glue.h:70:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				 size_t length, int access);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_utils.h:83:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int mkstr_size_##name = snprintf(NULL, 0, "" __VA_ARGS__); \
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_utils.h:86:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, sizeof(name), "" __VA_ARGS__)
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:1859:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(names[i], dynf_names[i]);
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:497:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(req.ifr_name, dev->data->name);
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:831:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(req.ifr_name, name);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:953:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(req.ifr_name, dev->data->name);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:2856:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(req.ifr_name, name);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_tm.c:45:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(req.ifr_name, dev->data->name);
data/dpdk-20.11~rc3/drivers/net/nfb/nfb_ethdev.c:445:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(internals->nfb_dev, PATH_MAX,
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:696:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(lockfile, home_path);
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:1309:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(octtx_name, "%s_%d", name, port);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_debug.c:7:28:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define nix_dump(fmt, ...) fprintf(stderr, fmt "\n", ##__VA_ARGS__)
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:833:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(ring_name, sizeof(ring_name), "PCAP_RING%" PRIu16,
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.h:410:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINT(format, ...) printf
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.h:429:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(name, pattern, ##__VA_ARGS__)
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.h:431:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buf, size, format, ##__VA_ARGS__)
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.h:433:34:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define OSAL_STRCPY(dst, string) strcpy(dst, string)
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1017:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dump_buf, str);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2443:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(buf + strlen(buf), name);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2445:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(buf, name);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2475:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buf + strlen(buf), mem_group);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2477:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buf, mem_group);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6051:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6056:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6151:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6159:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6195:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6561:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		    sprintf(qed_get_buf_ptr(parsed_buf, *parsed_results_bytes),
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6727:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(vf_str, "%s", "N/A");
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6740:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6854:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(parsed_wr_data,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6872:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(parsed_wr_data,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6885:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	*results_offset += sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:7010:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:7092:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2538:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(edev->name, NAME_SIZE, PCI_SHORT_PRI_FMT ":dpdk-port-%u",
data/dpdk-20.11~rc3/drivers/net/qede/qede_main.c:135:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(qede_fw_file, QEDE_DEFAULT_FIRMWARE);
data/dpdk-20.11~rc3/drivers/net/qede/qede_main.c:137:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(qede_fw_file, fw);
data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ethdev.c:61:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(fw_version, fw_size,
data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ethdev.c:72:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret_extra = snprintf(fw_version + dpcpu_fw_ids_offset,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:63:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:70:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "buffer");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:75:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "buffer_size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:80:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pool");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:85:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pool_size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:90:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cache");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:95:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cache_size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:101:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:124:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:135:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:139:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "dev or port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:145:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:166:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:173:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:178:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:184:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:211:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:216:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "shaper");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:221:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:226:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:231:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "profile_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:236:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rate");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:241:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tb_rate");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:246:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:251:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tb_size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:256:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "adj");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:261:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "packet_length_adjust");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:271:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:294:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:299:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "shared");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:304:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "shaper");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:309:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:314:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "shared_shaper_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:319:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:324:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "shaper_profile_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:337:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:370:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:375:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "node");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:380:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:385:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "node_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:390:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "parent");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:398:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "parent_node_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:404:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "priority");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:409:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "priority");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:414:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "weight");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:419:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "weight");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:430:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "tmgr node");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:438:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "shaper_profile_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:451:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "tmgr node");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:456:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared_shaper_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:471:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "tmgr node");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:476:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_sp_priorities");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:485:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:502:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:920:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:925:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "hierarchy-default");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:930:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "spp");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:935:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_subports_per_port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:940:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pps");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:945:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_pipes_per_subport");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:952:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "shaper");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:957:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:962:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:967:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:972:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "subport");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:977:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "subport profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:982:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipe");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:987:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipe_profile_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:992:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc0");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:997:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc0 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1002:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc1");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1007:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc1 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1012:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc2");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1017:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc2 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1022:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc3");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1027:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc3 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1032:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc4");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1037:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc4 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1042:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc5");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1047:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc5 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1052:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc6");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1057:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc6 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1062:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc7");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1067:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc7 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1072:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc8");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1077:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc8 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1082:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc9");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1087:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc9 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1092:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc10");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1097:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc10 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1102:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc11");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1107:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc11 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1112:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc12");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1117:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc12 profile id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1124:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "shared");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1129:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "shaper");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1134:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc0");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1143:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc0");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1151:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc1");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1160:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc1");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1168:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc2");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1177:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc2");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1185:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc3");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1194:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc3");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1202:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc4");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1211:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc4");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1219:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc5");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1228:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc5");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1236:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc6");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1245:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc6");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1253:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc7");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1262:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc7");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1270:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc8");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1279:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc8");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1287:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc9");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1296:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc9");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1304:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc10");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1313:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc10");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1321:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc11");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1330:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc11");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1338:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc12");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1347:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "shared shaper tc12");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1357:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "weight");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1362:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "queue");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1372:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "weight queue");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1381:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1401:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1406:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "hierarchy");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1411:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "commit");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1421:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1440:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1448:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1467:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1475:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1497:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1507:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1512:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1518:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1524:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1530:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1536:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1543:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1549:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1574:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1579:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1584:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "action");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1589:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1602:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "port in action profile filter");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1611:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "match or mismatch");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1616:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1622:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1627:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1635:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1640:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "key");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1648:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_value");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1653:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1659:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1672:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1678:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1684:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1689:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1696:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1701:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1708:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1717:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1723:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1765:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1770:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "action");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1775:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1786:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "ipv4 or ipv6");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1791:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1797:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "ip_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1802:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "fwd");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1812:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "table action profile balance");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1817:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1823:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1828:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1835:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1840:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "outoffset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1846:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "out_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1857:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1867:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1873:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1879:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_tc");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1884:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1901:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1913:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1919:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "spp");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1925:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1931:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pps");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1937:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1951:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1968:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1974:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1981:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1991:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:1997:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2007:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2019:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "encap");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2030:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2040:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2046:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "proto");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2055:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2067:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2077:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2083:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2092:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2104:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2119:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size,	MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2152:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2159:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2168:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2182:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2188:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2210:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2217:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "period");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2223:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "timer_period_ms");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2228:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset_port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2234:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "offset_port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2240:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2272:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2279:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2284:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2289:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "bsz");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2294:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "burst_size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2302:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2312:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rxq");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2318:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2325:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2337:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2349:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2359:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2367:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2374:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "mtu");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2381:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2389:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2397:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2405:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2412:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2420:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2430:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2440:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2447:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "action");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2466:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2475:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2504:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2511:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2516:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "out");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2521:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "bsz");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2526:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "burst_size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2532:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2542:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "txq");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2548:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "queue_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2553:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2563:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2573:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2583:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2595:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2603:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pkts");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2609:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "max_n_pkts");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2615:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2625:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2632:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "queue_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2637:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2644:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "queue_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2648:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2654:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2698:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2705:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2710:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2717:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2729:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2735:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2741:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2747:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2753:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_rules");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2760:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2768:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2774:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2779:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2785:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_keys");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2794:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2806:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2812:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "key");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2820:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2825:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2832:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2837:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2843:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2848:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "buckets");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2854:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_buckets");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2859:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2865:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_keys");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2872:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2884:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2890:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2896:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2901:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2907:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_rules");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2917:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2924:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "action");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2935:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2941:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2961:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2968:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2973:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2978:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2983:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2988:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:2997:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3025:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3032:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3037:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3042:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3047:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3052:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3059:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "clear");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3072:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3076:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_PIPELINE_PORT_IN_STATS,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3097:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3104:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3109:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3114:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3119:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "enable");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3125:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3145:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3152:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3157:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3162:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3167:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "disable");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3173:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3200:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3207:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3212:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "out");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3217:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3222:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3227:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3234:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "clear");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3247:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3251:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_PIPELINE_PORT_OUT_STATS,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3282:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3289:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3294:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3299:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3304:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3311:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "clear");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3324:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3328:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_PIPELINE_TABLE_STATS,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3404:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3410:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3417:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "priority");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3423:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "priority");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3433:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3439:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3449:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3455:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3460:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3467:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "sa_depth");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3473:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "da_depth");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3478:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "sp0");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3483:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "sp1");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3488:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "dp0");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3493:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "dp1");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3498:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "proto");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3509:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3516:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "pos");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3525:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3535:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3542:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "key");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3557:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3563:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3568:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3573:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sp");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3578:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "dp");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3583:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3605:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3611:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3616:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3621:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sp");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3626:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "dp");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3631:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3651:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3657:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3673:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3679:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3695:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3702:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3709:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3720:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3726:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3738:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3750:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3757:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3763:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "depth");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3770:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4880:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4894:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4908:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4922:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4936:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4950:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4964:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4978:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4992:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5006:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5020:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5034:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5043:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "action");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5070:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5077:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5082:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5087:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5092:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5119:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5130:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5161:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5168:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5173:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5178:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5183:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5188:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "match");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5193:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "default");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5198:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "action");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5203:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "fwd");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5211:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5220:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5225:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5233:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5242:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5247:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5254:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5265:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5301:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5308:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5313:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5318:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5323:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5328:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "bulk");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5336:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_rules");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5347:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_OUT_OF_MEMORY);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5365:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_FILE_ERR, file_name, line_number);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5372:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_FILE_NOT_ENOUGH, file_name);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5388:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5418:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5425:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5430:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5435:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5440:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "delete");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5457:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5466:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5488:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5495:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5500:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5505:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5510:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "delete");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5515:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "match");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5520:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "default");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5528:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5543:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_CMD_UNIMPLEM, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5564:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5571:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5576:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5581:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "meter");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5586:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5591:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "meter_profile_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5596:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5602:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5610:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cir");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5615:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cir");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5620:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cbs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5625:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cbs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5630:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "ebs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5635:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "ebs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5640:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5647:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cir");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5652:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cir");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5657:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pir");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5662:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "pir");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5666:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cbs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5671:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cbs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5676:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pbs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5681:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "pbs");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5685:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5695:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5716:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5723:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5728:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5733:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "meter");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5738:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5743:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "meter_profile_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5748:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "delete");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5757:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5772:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_CMD_UNIMPLEM, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5886:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5893:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5898:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5903:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "dscp");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5911:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_FILE_ERR, file_name, line_number);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5921:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5936:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_CMD_UNIMPLEM, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5954:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5959:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "thread_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5964:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipeline");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5971:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "enable");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5977:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, "thread pipeline enable");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5997:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6002:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "thread_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6007:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipeline");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6014:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "disable");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6020:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6045:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6050:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "map");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6055:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "group");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6060:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "group_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6069:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "ingress | egress");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6074:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipeline");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6081:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6086:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6096:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6114:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_TOO_MANY, "");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6404:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_CMD_UNKNOWN, tokens[0]);
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1461:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		ret = fscanf(fd, "%8" SCNx32 ":%2" SCNx8 ":%2" SCNx8 ".%" SCNx8,
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1511:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, PATH_MAX, SZEDATA2_DEV_PATH_FMT, szedata2_index);
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1639:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(sze_dev_path, PATH_MAX, SZEDATA2_DEV_PATH_FMT, szedata2_index);
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1771:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, RTE_ETH_NAME_MAX_LEN, "%s"
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1922:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(name, RTE_ETH_NAME_MAX_LEN, "%s"
data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_plat.h:20:27:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define nicvf_log(s, ...) fprintf(stderr, s, ##__VA_ARGS__)
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:119:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(path, sizeof(path), temp, iface->if_name);
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:129:8:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	ret = fscanf(f, NETVSC_CLASS_ID "%n", &len);
data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.c:1441:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(internal->iface_name, iface_name);
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_debug.h:9:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define opae_log(fmt, args...) printf(fmt, ## args)
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev_test.c:31:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret += vfprintf(stderr, format, ap);
data/dpdk-20.11~rc3/examples/bond/main.c:105:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINT_MAC(addr)		printf("%02"PRIx8":%02"PRIx8":%02"PRIx8 \
data/dpdk-20.11~rc3/examples/bond/main.c:473:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buf, size, NIPQUAD_FMT,
data/dpdk-20.11~rc3/examples/cmdline/commands.c:78:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(ip_str, sizeof(ip_str), NIPQUAD_FMT,
data/dpdk-20.11~rc3/examples/cmdline/commands.c:81:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(ip_str, sizeof(ip_str), NIP6_FMT,
data/dpdk-20.11~rc3/examples/cmdline/commands.c:148:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(ip_str, sizeof(ip_str), NIPQUAD_FMT,
data/dpdk-20.11~rc3/examples/cmdline/commands.c:151:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(ip_str, sizeof(ip_str), NIP6_FMT,
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:113:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\nStatistics for port %u ------------------------------"
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:135:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\n\t %s: %*"PRIu64,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:72:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:79:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "buffer");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:84:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "buffer_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:89:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pool");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:94:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pool_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:99:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cache");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:104:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cache_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:109:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cpu");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:114:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cpu_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:120:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:147:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:158:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:162:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "dev or port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:167:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rxq");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:172:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_queues");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:176:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "queue_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:183:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "txq");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:188:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_queues");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:193:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "queue_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:198:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "promiscuous");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:207:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "on or off");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:217:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rss");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:226:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:238:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:311:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:333:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:357:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:364:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:369:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:374:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cpu");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:379:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cpu_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:385:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:408:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:413:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tb_rate");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:418:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tb_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:425:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "tc_rate");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:430:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc_period");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:436:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:461:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:466:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tb_rate");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:471:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tb_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:477:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "tc_rate");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:482:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc_period");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:487:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "tc_ov_weight");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:493:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "wrr_weights");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:499:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:524:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:531:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rate");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:536:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "rate");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:541:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "spp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:546:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_subports_per_port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:551:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "spp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:556:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_pipes_per_subport");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:561:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "fo");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:566:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "frame_overhead");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:571:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mtu");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:576:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "mtu");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:581:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cpu");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:586:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cpu_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:592:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:612:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:619:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "subport_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:624:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "subport_profile_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:630:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:652:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:659:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "subport_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:664:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipe");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:669:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "from");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:674:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipe_id_first");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:679:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "to");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:684:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipe_id_last");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:689:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:694:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipe_profile_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:701:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:720:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:728:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:751:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:758:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "link");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:765:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mempool");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:773:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "thread");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:778:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "thread_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:788:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:810:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:820:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:825:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:831:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:837:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:843:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:849:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:855:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size,	MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:861:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:885:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:890:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:895:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "action");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:900:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:912:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "port in action profile filter");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:921:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "match or mismatch");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:926:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:931:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:936:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:943:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:948:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "key");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:955:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_value");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:960:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:965:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:977:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:983:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:988:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:993:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:999:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1004:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1010:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1019:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1025:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1067:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1072:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "action");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1077:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1088:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "ipv4 or ipv6");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1093:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1098:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "ip_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1103:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "fwd");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1112:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "table action profile balance");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1117:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1122:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1127:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1133:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1138:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "outoffset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1143:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "out_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1153:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1163:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1169:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "tc");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1174:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_tc");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1179:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1196:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1207:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1213:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "spp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1219:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1225:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pps");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1231:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1244:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1261:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1267:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1274:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1284:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1290:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1300:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1311:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "encap");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1321:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1331:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1337:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "proto");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1346:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1357:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1367:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1373:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1382:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1393:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1408:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size,	MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1428:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1435:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1444:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1468:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1474:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1496:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1503:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "period");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1508:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "timer_period_ms");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1513:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset_port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1518:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "offset_port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1523:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cpu");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1528:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cpu_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1534:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1564:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1571:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1576:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1581:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "bsz");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1586:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "burst_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1594:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1604:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rxq");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1609:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1616:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1628:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1640:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1650:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1658:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1664:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "mtu");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1671:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1683:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1693:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1701:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1709:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1715:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1723:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1732:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1742:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1749:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "action");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1767:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1774:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1803:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1810:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1815:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "out");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1820:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "bsz");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1825:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "burst_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1831:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1841:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "txq");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1846:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "queue_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1851:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1861:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1871:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1881:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1891:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1905:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1913:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pkts");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1918:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "max_n_pkts");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1925:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1935:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1942:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "queue_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1947:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1954:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "queue_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1958:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:1964:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2006:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2013:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2018:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2025:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2037:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2043:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2049:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2055:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2061:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_rules");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2068:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2076:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2082:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2087:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2093:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_keys");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2102:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2114:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2120:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "key");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2128:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2133:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2140:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_mask");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2146:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2152:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2157:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "buckets");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2163:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_buckets");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2168:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2174:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_keys");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2181:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2193:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2199:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2205:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "key_offset");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2210:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "size");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2216:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "n_rules");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2226:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2233:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, "action");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2243:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2249:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2268:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2275:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2280:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2285:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2290:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2295:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2303:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2329:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2336:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2341:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2346:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2351:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2356:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2363:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "clear");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2375:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2379:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_PIPELINE_PORT_IN_STATS,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2400:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2407:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2412:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2417:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2422:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "enable");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2428:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2448:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2455:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2460:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2465:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2470:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "disable");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2476:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2502:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2509:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2514:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "out");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2519:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2524:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2529:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2536:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "clear");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2548:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2552:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_PIPELINE_PORT_OUT_STATS,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2582:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2589:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2594:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2599:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2604:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2611:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "clear");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2623:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2627:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_PIPELINE_TABLE_STATS,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2703:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2709:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2716:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "priority");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2722:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "priority");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2732:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2738:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2748:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2754:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2759:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2766:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "sa_depth");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2772:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "da_depth");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2777:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "sp0");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2782:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "sp1");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2787:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "dp0");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2792:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "dp1");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2797:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "proto");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2808:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2815:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "pos");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2824:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2834:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2841:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "key");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2856:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2862:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2867:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2872:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2877:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "dp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2882:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2904:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2910:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sa");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2915:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "da");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2920:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "sp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2925:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID, "dp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2930:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2950:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2956:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2972:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2978:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2994:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3001:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3008:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3019:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3025:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3037:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3049:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3056:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3062:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "depth");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3069:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4173:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4187:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4201:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4215:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4229:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4243:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4257:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4271:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4285:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4299:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4312:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4326:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4336:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "action");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4362:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4369:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4374:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4379:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4384:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4411:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4417:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4449:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4456:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4461:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4466:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4471:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4476:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4481:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "default");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4486:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "action");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4491:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "fwd");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4499:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4508:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4513:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4521:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4530:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4535:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4542:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4551:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4584:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4591:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4596:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4601:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4606:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4611:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "bulk");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4626:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_FILE_ERR, file_name, line_number);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4637:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4663:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4670:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4675:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4680:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4685:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "delete");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4702:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4710:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4732:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4739:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4744:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4749:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4754:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "delete");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4759:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4764:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "default");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4771:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4860:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(f, m->match.acl.ip_version ? "ipv4 " : "ipv6 ");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4899:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(f, m->match.lpm.ip_version ? "ipv4 " : "ipv6 ");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5151:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5158:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5163:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5168:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5173:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "show");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5178:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "file");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5186:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5208:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5215:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5220:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5225:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5230:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5235:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5252:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5268:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5279:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5318:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5325:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5330:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5335:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "meter");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5340:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5345:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "meter_profile_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5350:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "add");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5356:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5364:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cir");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5369:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cir");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5374:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cbs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5379:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cbs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5384:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "ebs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5389:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "ebs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5394:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5401:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cir");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5406:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cir");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5411:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pir");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5416:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "pir");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5420:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cbs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5425:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "cbs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5430:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pbs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5435:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "pbs");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5439:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5448:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5469:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5476:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5481:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5486:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "meter");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5491:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "profile");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5496:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "meter_profile_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5501:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "delete");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5509:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5532:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5539:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5544:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5549:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5554:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5559:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "meter");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5576:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5592:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5603:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5721:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5728:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5733:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5738:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "dscp");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5746:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_FILE_ERR, file_name, line_number);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5755:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5778:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5785:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5790:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5795:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5800:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5805:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "ttl");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5822:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5838:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5849:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5875:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5882:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5887:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5892:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5897:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5902:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "time");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5911:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5927:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5937:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5959:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5964:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "thread_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5969:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipeline");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5976:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "enable");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5982:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, "thread pipeline enable");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6002:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6007:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "thread_id");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6012:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipeline");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6019:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "disable");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6025:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL,
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6377:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_TOO_MANY, "");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6689:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_CMD_UNKNOWN, tokens[0]);
data/dpdk-20.11~rc3/examples/ip_pipeline/main.c:137:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(usage, app_name);
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1261:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1288:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1291:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1306:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1340:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1343:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1359:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1389:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:344:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\nAggregate statistics ==============================="
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:496:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(str + strlen(str), oneline);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:507:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(str + strlen(str), oneline);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.h:21:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf((st)->parse_msg, fmt "\n",			\
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:290:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\nStatistics for port %u ------------------------------"
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:309:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\nStatistics for cryptodev %"PRIu64
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:323:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\nAggregate statistics ==============================="
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:443:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\nStatistics for port %u ------------------------------"
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:470:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("\nRx adapter[%d] statistics===================="
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:495:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("\nTx adapter[%d] statistics===================="
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:505:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\nAggregate lcore statistics ========================="
data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c:212:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\n----------------"
data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c:248:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\n\nJob %" PRIu32 ": %-20s "
data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c:265:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\n\nJob %" PRIu32 ": %-20s "
data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c:303:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\nStatistics for port %u ------------------------------"
data/dpdk-20.11~rc3/examples/l2fwd-keepalive/main.c:142:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\nStatistics for port %u ------------------------------"
data/dpdk-20.11~rc3/examples/l2fwd-keepalive/main.c:155:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\nAggregate statistics ==============================="
data/dpdk-20.11~rc3/examples/l2fwd/main.c:138:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\nStatistics for port %u ------------------------------"
data/dpdk-20.11~rc3/examples/l2fwd/main.c:151:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\nAggregate statistics ==============================="
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1139:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = snprintf(buf + n, sz - n,
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1180:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(OPTION_RULE_IPV4": %s\n", parm_config.rule_ipv4_name);
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1181:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(OPTION_RULE_IPV6": %s\n", parm_config.rule_ipv6_name);
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1182:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(OPTION_ALG": %s\n", str_acl_alg(parm_config.alg));
data/dpdk-20.11~rc3/examples/link_status_interrupt/main.c:134:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("\nStatistics for port %u ------------------------------"
data/dpdk-20.11~rc3/examples/link_status_interrupt/main.c:157:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("\nAggregate statistics ==============================="
data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/shared/common.h:52:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buffer, sizeof(buffer), MP_CLIENT_RXQ_NAME, id);
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_diag.c:140:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(DIAG_CACHE_STATS_FORMAT,
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_diag.c:160:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(DIAG_QUEUE_STATS_FORMAT,
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_diag.c:182:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(DIAG_CACHE_STATS_FORMAT,
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_diag.c:207:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(DIAG_SCHED_STATS_FORMAT,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:173:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:180:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "buffer");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:185:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "buffer_size");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:190:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pool");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:195:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pool_size");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:200:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cache");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:205:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cache_size");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:210:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "cpu");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:215:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "cpu_id");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:221:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:249:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:260:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:264:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "dev or port");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:269:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rxq");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:274:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_queues");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:278:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "queue_size");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:285:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "txq");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:290:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "n_queues");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:295:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "queue_size");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:300:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "promiscuous");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:309:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "on or off");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:319:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rss");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:328:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:340:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:417:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:439:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:462:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:469:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "numa_node");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:497:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:503:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:508:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:513:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "in");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:518:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:529:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:536:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:543:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rxq");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:548:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:554:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "bsz");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:559:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:575:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:582:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:597:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:607:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:629:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:635:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:640:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "port");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:645:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "out");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:650:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "port_id");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:661:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_MISMATCH,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:668:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:675:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "txq");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:680:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:686:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_NOT_FOUND, "bsz");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:691:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(out, out_size, MSG_ARG_INVALID,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:715:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:725:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:747:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:753:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:813:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:820:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipeline_name");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:825:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:832:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "update");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:876:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_OUT_OF_MEMORY);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:892:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_FILE_ERR,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:922:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_FILE_ERR,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:951:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(out, out_size, MSG_FILE_ERR,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1013:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1019:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipeline_name");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1024:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "stats");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1086:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1091:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "thread_id");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1096:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipeline");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1103:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipeline_name");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1108:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "enable");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1114:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL, "thread pipeline enable");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1135:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1140:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "thread_id");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1145:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "pipeline");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1152:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_INVALID, "pipeline_name");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1157:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_NOT_FOUND, "disable");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1163:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_CMD_FAIL,
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1279:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(out, out_size, MSG_ARG_TOO_MANY, "");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1368:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(out, out_size, MSG_CMD_UNKNOWN, tokens[0]);
data/dpdk-20.11~rc3/examples/pipeline/main.c:124:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(usage, app_name);
data/dpdk-20.11~rc3/examples/qos_sched/args.c:75:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(usage, prgname, APP_INTERACTIVE_DEFAULT, app_main_core,
data/dpdk-20.11~rc3/examples/qos_sched/args.c:116:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		len = snprintf(path, sizeof(path), SYS_CPU_DIR, i);
data/dpdk-20.11~rc3/examples/qos_sched/args.c:120:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path, F_OK) == 0)
data/dpdk-20.11~rc3/examples/rxtx_callbacks/main.c:309:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(usage, argv[0]);
data/dpdk-20.11~rc3/examples/server_node_efd/shared/common.h:64:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buffer, sizeof(buffer), MP_NODE_RXQ_NAME, id);
data/dpdk-20.11~rc3/examples/vdpa/main.c:170:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(socket_path, F_OK) != -1 && !client_mode) {
data/dpdk-20.11~rc3/examples/vhost/main.c:637:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(dma_type, optarg);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:531:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(socket_path, F_OK) < 0) {
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_os_windows.c:202:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vfprintf(file, format, op);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse.c:21:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug_printf printf
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_num.c:20:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug_printf(args...) printf(args)
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.c:211:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(dstbuf, size, ANYSTRINGS_HELP);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.c:213:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(dstbuf, size, CHOICESTRING_HELP);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.c:215:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(dstbuf, size, FIXEDSTRING_HELP);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.c:217:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(dstbuf, size, ANYSTRING_HELP);
data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor.c:752:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, sizeof(mz_name), RTE_DISTRIB_PREFIX"%s", name);
data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor_single.c:402:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, sizeof(mz_name), RTE_DISTRIB_PREFIX"%s", name);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_devargs.c:244:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(NULL, 0, format, ap);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_devargs.c:254:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(dev, len + 1, format, ap);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_log.c:452:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vfprintf(f, format, ap);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memory.c:217:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, sizeof(name), MEMSEG_LIST_FMT, page_sz >> 10, socket_id,
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:545:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(peer_name, sizeof(peer_name),
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:228:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pattern, "%s*", val);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_filesystem.h:61:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buffer, buflen, FBARRAY_NAME_FMT, rte_eal_get_runtime_dir(),
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_filesystem.h:95:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buffer, buflen, HUGEFILE_FMT, hugedir,
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_common.h:145:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format(printf, format_index, first_arg)))
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c:30:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int len = snprintf(path, sizeof(path), SYS_CPU_DIR
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c:34:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path, F_OK) != 0)
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c:57:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path, F_OK) == 0)
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c:70:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int len = snprintf(path, sizeof(path), SYS_CPU_DIR "/%s", lcore_id, CORE_ID_FILE);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:276:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(filename, sizeof(filename),
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:288:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(filename, sizeof(filename),
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:310:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mp_req.name, EAL_VFIO_MP);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:646:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mp_req.name, EAL_VFIO_MP);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1136:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mp_req.name, EAL_VFIO_MP);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1269:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mp_req.name, EAL_VFIO_MP);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio_mp_sync.c:102:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(reply.name, EAL_VFIO_MP);
data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_lcore.c:46:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, va);
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/rte_os.h:63:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	size = vsnprintf(NULL, 0, format, arg);
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/rte_os.h:74:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(*buffer, size, format, arg);
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:814:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(name, tmp);
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_crypto_adapter.c:255:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(adapter->mem_name, mem_name);
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_rx_adapter.c:1970:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(rx_adapter->mem_name, mem_name);
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:169:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	n = snprintf(mz_name, sizeof(mz_name), DATA_MZ_NAME_FORMAT, adapter_id);
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:318:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(name, DATA_MZ_NAME_MAX_LEN, DATA_MZ_NAME_FORMAT, adapter_id);
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:801:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(swtim_name, SWTIM_NAMESIZE, "swtim_%"PRIu8,
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:820:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(pool_name, SWTIM_NAMESIZE, "swtim_pool_%"PRIu8,
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:865:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(service.name, RTE_SERVICE_NAME_MAX,
data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c:277:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(sad_name, RTE_IPSEC_SAD_NAMESIZE, SAD_FORMAT, name);
data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c:393:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(sad_name, RTE_IPSEC_SAD_NAMESIZE, SAD_FORMAT, name);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:147:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, RTE_MEMZONE_NAMESIZE, KNI_TX_Q_MZ_NAME_FMT, kni->name);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:152:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, RTE_MEMZONE_NAMESIZE, KNI_RX_Q_MZ_NAME_FMT, kni->name);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:157:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, RTE_MEMZONE_NAMESIZE, KNI_ALLOC_Q_MZ_NAME_FMT, kni->name);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:162:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, RTE_MEMZONE_NAMESIZE, KNI_FREE_Q_MZ_NAME_FMT, kni->name);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:167:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, RTE_MEMZONE_NAMESIZE, KNI_REQ_Q_MZ_NAME_FMT, kni->name);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:172:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, RTE_MEMZONE_NAMESIZE, KNI_RESP_Q_MZ_NAME_FMT, kni->name);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:177:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(mz_name, RTE_MEMZONE_NAMESIZE, KNI_SYNC_ADDR_MZ_NAME_FMT, kni->name);
data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_pool_ops.c:29:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(mz->addr, ops_name);
data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_pool_ops.c:71:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mz->addr, ops_name);
data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.c:549:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = snprintf(mz_name, sizeof(mz_name),
data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.c:855:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf(mz_name, sizeof(mz_name), RTE_MEMPOOL_MZ_FORMAT, name);
data/dpdk-20.11~rc3/lib/librte_pci/rte_pci.c:112:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	RTE_VERIFY(snprintf(output, size, PCI_PRI_FMT,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:43:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE(...) printf(__VA_ARGS__)
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1082:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(st->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1087:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dst->name, src->name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1188:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(elem->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1350:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(elem->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1626:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(elem->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1664:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(type_member->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1706:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(obj->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1916:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:2098:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(h->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4640:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4659:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4682:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4704:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4722:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4742:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4766:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4792:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4846:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4900:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:4957:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(data->jmp_label, tokens[1]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:5335:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(data->label, tokens[0]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:6232:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(a->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:6376:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(elem->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:6532:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(t->name, name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:6534:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(t->args, args);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:7043:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(action->name, a->name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:7065:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(action_arg->name, arg->name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:7085:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(table->name, t->name);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:7086:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(table->args, t->args);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:459:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer, tokens[i]);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:1023:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer, tokens[i]);
data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_ethdev.c:26:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE(...) printf(__VA_ARGS__)
data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_source_sink.c:29:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE(...) printf(__VA_ARGS__)
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:145:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_SYSFILE_GOVERNOR,
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:201:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_SYSFILE_AVAIL_FREQ,
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:269:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_SYSFILE_SETSPEED,
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:385:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_SYSFILE_GOVERNOR,
data/dpdk-20.11~rc3/lib/librte_power/power_common.c:27:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_SYSFILE_SCALING_DRIVER,
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:124:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_MSR_PATH, lcore_id);
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:167:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath_min, sizeof(fullpath_min), POWER_SYSFILE_MIN_FREQ,
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:173:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath_max, sizeof(fullpath_max), POWER_SYSFILE_MAX_FREQ,
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:185:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath_base, sizeof(fullpath_base), POWER_SYSFILE_BASE_FREQ,
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:343:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_SYSFILE_GOVERNOR,
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:398:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath, sizeof(fullpath), POWER_SYSFILE_GOVERNOR,
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:450:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath_max, sizeof(fullpath_max),
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:453:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath_min, sizeof(fullpath_min),
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:549:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(fullpath_cur, sizeof(fullpath_cur),
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_json.h:37:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(tmp, sizeof(tmp), format, ap);
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_json.h:40:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buf, tmp);
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:68:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(callbacks[num_legacy_callbacks].data, MAX_LEN,
data/dpdk-20.11~rc3/lib/librte_vhost/vhost.h:536:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(packet + strnlen(packet, VHOST_MAX_PRINT_BUFF), VHOST_MAX_PRINT_BUFF - strnlen(packet, VHOST_MAX_PRINT_BUFF), \
data/dpdk-20.11~rc3/app/pdump/main.c:396:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, " ",
data/dpdk-20.11~rc3/app/proc-info/main.c:235:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "p:m",
data/dpdk-20.11~rc3/app/test-acl/main.c:1026:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "", lgopts,  &opt_idx)) != EOF) {
data/dpdk-20.11~rc3/app/test-bbdev/main.c:205:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "hin:b:c:v:l:s:t:", lgopts,
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options_parse.c:619:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "h", lgopts, &opt_idx)) != EOF) {
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:982:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "h", lgopts, &opt_idx)) != EOF) {
data/dpdk-20.11~rc3/app/test-eventdev/evt_options.c:409:17:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opts = getopt_long(argc, argv, "", lgopts, &opt_idx)) != EOF) {
data/dpdk-20.11~rc3/app/test-fib/main.c:690:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "f:t:n:d:l:r:c6ab:e:g:w:u:sv:")) !=
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:603:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "",
data/dpdk-20.11~rc3/app/test-pipeline/config.c:190:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:",
data/dpdk-20.11~rc3/app/test-pmd/csumonly.c:699:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		nb_seg = random() % tx_pkt_nb_segs + 1;
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:711:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, SHORTOPTS "ah",
data/dpdk-20.11~rc3/app/test-regex/main.c:79:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "",
data/dpdk-20.11~rc3/app/test-sad/main.c:362:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "f:t:n:d:l:r:6b:vpc")) != -1) {
data/dpdk-20.11~rc3/app/test/test.c:100:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	extra_args = getenv("DPDK_TEST_PARAMS");
data/dpdk-20.11~rc3/app/test/test.c:153:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	recursive_call = getenv(RECURSIVE_ENV_VAR);
data/dpdk-20.11~rc3/app/test/test.c:173:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *dpdk_test = getenv("DPDK_TEST");
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2856:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(BIG_DATA_TEST_SIZE);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3305:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_LB);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3376:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_LB);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3447:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_LB);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3519:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_LB);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3592:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_LB);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3660:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_SGL);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3731:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_SGL);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3802:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_SGL);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3874:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_SGL);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3948:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_SGL);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:4017:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_OVER);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:4092:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_OVER);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:4165:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(IM_BUF_DATA_TEST_SIZE_OVER);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:10543:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/dpdk-20.11~rc3/app/test/test_efd.c:127:12:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	data[0] = mrand48() & VALUE_BITMASK;
data/dpdk-20.11~rc3/app/test/test_efd.c:164:12:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	data[1] = mrand48() & VALUE_BITMASK;
data/dpdk-20.11~rc3/app/test/test_efd.c:258:13:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		data[i] = mrand48() & VALUE_BITMASK;
data/dpdk-20.11~rc3/app/test/test_fib_perf.c:238:10:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	start = lrand48() & mask;
data/dpdk-20.11~rc3/app/test/test_fib_perf.c:257:9:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		pos = lrand48();
data/dpdk-20.11~rc3/app/test/test_lpm6_data.h:1132:31:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			large_ips_table[i].ip[j] = lrand48();
data/dpdk-20.11~rc3/app/test/test_lpm_perf.c:260:10:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	start = lrand48() & mask;
data/dpdk-20.11~rc3/app/test/test_lpm_perf.c:289:9:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		pos = lrand48();
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_vfio.c:82:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		container = getenv("DPRC");
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:185:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DPAA2_PORTAL_INTR_THRESHOLD"))
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:186:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		threshold = atoi(getenv("DPAA2_PORTAL_INTR_THRESHOLD"));
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:188:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DPAA2_PORTAL_INTR_TIMEOUT"))
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:189:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		sscanf(getenv("DPAA2_PORTAL_INTR_TIMEOUT"), "%x", &timeout);
data/dpdk-20.11~rc3/drivers/bus/pci/pci_common.c:38:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	path = getenv("SYSFS_PCI_DEVICES");
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:290:4:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		 getenv("MLX5_GLUE_PATH") : NULL),
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:170:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *dllpath = getenv("ARK_EXT_PATH");
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:1926:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DPAA_TX_TAILDROP_THRESHOLD")) {
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:1927:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		td_tx_threshold = atoi(getenv("DPAA_TX_TAILDROP_THRESHOLD"));
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:2182:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv("DPAA_PUSH_QUEUES_NUMBER")) {
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:2184:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
					atoi(getenv("DPAA_PUSH_QUEUES_NUMBER"));
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c:2205:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv("DPAA2_STRICT_ORDERING_ENABLE")) {
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c:2728:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DPAA2_ENABLE_SOFT_PARSER")) {
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3907:3:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		getenv("DPAA2_FLOW_CONTROL_LOG");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3909:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DPAA2_FLOW_CONTROL_MISS_FLOW")) {
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3913:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			atoi(getenv("DPAA2_FLOW_CONTROL_MISS_FLOW"));
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:1470:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	uint64_t random;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:1480:36:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	memcpy(&mac_addr->addr_bytes[3], &random, 3);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:1209:4:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		 getenv("MLX4_GLUE_PATH") : NULL),
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:2191:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	env = getenv(MLX5_SHUT_UP_BF);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:1197:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *val = getenv(name);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:689:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home_path = getenv("HOME");
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_ethdev.c:332:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("PFE_INTR_SUPPORT")) {
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif.c:802:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("PFE_INTR_SUPPORT")) {
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:1046:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned int)time(NULL));
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2494:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	uint64_t random;
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2507:36:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	memcpy(&mac_addr->addr_bytes[3], &random, 3);
data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.c:1352:5:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			(getenv("DPAA2_NO_QDMA_PREFETCH_RX"))) {
data/dpdk-20.11~rc3/examples/bbdev_app/main.c:236:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "e:d:p:b:", lgopts, &opt_indx)) !=
data/dpdk-20.11~rc3/examples/distributor/main.c:669:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:",
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:158:7:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		c = getopt_long(argc, argv, "r:t:e:c:w:n:f:s:m:paoPqDW:",
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_gcm.c:96:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			vec.iv.val[i] = (uint8_t)random;
data/dpdk-20.11~rc3/examples/fips_validation/main.c:251:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "s:",
data/dpdk-20.11~rc3/examples/flow_classify/flow_classify.c:731:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "",
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:629:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, short_options,
data/dpdk-20.11~rc3/examples/ip_fragmentation/main.c:529:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:",
data/dpdk-20.11~rc3/examples/ip_pipeline/main.c:80:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "h:p:s:", lgopts, &option_index))
data/dpdk-20.11~rc3/examples/ip_reassembly/main.c:625:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:",
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:1601:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "aelp:Pu:f:j:w:c:s:",
data/dpdk-20.11~rc3/examples/ipv4_multicast/main.c:497:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:",
data/dpdk-20.11~rc3/examples/kni/main.c:531:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "p:Pm", longopts,
data/dpdk-20.11~rc3/examples/l2fwd-cat/cat.c:667:8:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	opt = getopt_long(argc, argvopt, "", lgopts, NULL);
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1664:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:sT:", lgopts,
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:218:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, short_options,
data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c:621:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:T:l",
data/dpdk-20.11~rc3/examples/l2fwd-keepalive/main.c:379:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:T:K:",
data/dpdk-20.11~rc3/examples/l2fwd/main.c:460:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, short_options,
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1762:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:P",
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1819:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
				if (0 == getopt_long(argc, argvopt, "",
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:457:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, short_options, lgopts,
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:504:8:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
			if (getopt_long(argc, argvopt, "", &lenopts,
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1784:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:l:m:h:P",
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1916:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
				if (0 == getopt_long(argc, argvopt, "",
data/dpdk-20.11~rc3/examples/l3fwd/main.c:573:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, short_options,
data/dpdk-20.11~rc3/examples/l3fwd/main.c:634:8:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
			if (getopt_long(argc, argvopt, "",
data/dpdk-20.11~rc3/examples/link_status_interrupt/main.c:370:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:T:",
data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_client/client.c:99:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "n:", lgopts,
data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/args.c:115:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "n:p:", lgopts,
data/dpdk-20.11~rc3/examples/multi_process/symmetric_mp/main.c:128:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:", \
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1158:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, short_options,
data/dpdk-20.11~rc3/examples/packet_ordering/main.c:167:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:",
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:2897:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:P",
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:2988:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
				if (0 == getopt_long(argc, argvopt, "", &lenopts,
data/dpdk-20.11~rc3/examples/pipeline/main.c:67:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "h:p:s:", lgopts, &option_index))
data/dpdk-20.11~rc3/examples/ptpclient/ptpclient.c:687:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:T:",
data/dpdk-20.11~rc3/examples/qos_meter/main.c:243:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:", lgopts, &option_index)) != EOF) {
data/dpdk-20.11~rc3/examples/qos_sched/args.c:336:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "i",
data/dpdk-20.11~rc3/examples/rxtx_callbacks/main.c:302:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "t", lgopts, &option_index))
data/dpdk-20.11~rc3/examples/server_node_efd/node/node.c:103:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "n:", lgopts,
data/dpdk-20.11~rc3/examples/server_node_efd/server/args.c:132:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "n:f:p:", lgopts,
data/dpdk-20.11~rc3/examples/vdpa/main.c:69:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, short_option, long_option, &idx))
data/dpdk-20.11~rc3/examples/vhost/main.c:497:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "p:P",
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:222:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "s:",
data/dpdk-20.11~rc3/examples/vm_power_manager/guest_cli/main.c:66:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "n:b:q:p:",
data/dpdk-20.11~rc3/examples/vm_power_manager/main.c:172:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, "p:q:T:b:",
data/dpdk-20.11~rc3/examples/vmdq/main.c:403:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "p:", long_option,
data/dpdk-20.11~rc3/examples/vmdq_dcb/main.c:459:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "p:", long_option,
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:458:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	char *realp = realpath(pathname, NULL);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:298:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home_dir = getenv("HOME");
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:81:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *xdg_runtime_dir = getenv("XDG_RUNTIME_DIR");
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:471:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, eal_short_options,
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:514:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, eal_short_options,
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:94:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *xdg_runtime_dir = getenv("XDG_RUNTIME_DIR");
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:657:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, eal_short_options,
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:697:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, eal_short_options,
data/dpdk-20.11~rc3/lib/librte_eal/windows/eal.c:107:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, eal_short_options,
data/dpdk-20.11~rc3/lib/librte_eal/windows/eal.c:141:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argvopt, eal_short_options,
data/dpdk-20.11~rc3/lib/librte_eal/windows/getopt.c:437:1:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
getopt(int nargc, char *nargv[], const char *options)
data/dpdk-20.11~rc3/lib/librte_eal/windows/getopt.c:448:1:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
getopt_long(int nargc, char *nargv[], const char *options,
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/getopt.h:30:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
#include_next <getopt.h>
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/getopt.h:42:9:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
#define getopt(a, b, c) usual_getopt(a, b, c)
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/getopt.h:43:9:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
#define getopt_long(a, b, c, d, e) usual_getopt_long(a, b, c, d, e)
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/getopt.h:83:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt(int argc, char *argv[], const char *options);
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/getopt.h:86:5:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt_long(int argc, char *argv[], const char *options,
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/pthread.h:157:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(mutex);
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/pthread.h:164:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(mutex);
data/dpdk-20.11~rc3/app/pdump/main.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rx_dev[TX_STREAM_SIZE];
data/dpdk-20.11~rc3/app/pdump/main.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tx_dev[TX_STREAM_SIZE];
data/dpdk-20.11~rc3/app/pdump/main.c:521:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/pdump/main.c:638:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vdev_name[SIZE];
data/dpdk-20.11~rc3/app/pdump/main.c:639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vdev_args[SIZE];
data/dpdk-20.11~rc3/app/pdump/main.c:640:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[SIZE];
data/dpdk-20.11~rc3/app/pdump/main.c:641:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mempool_name[SIZE];
data/dpdk-20.11~rc3/app/pdump/main.c:975:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argp[argc + 2];
data/dpdk-20.11~rc3/app/proc-info/main.c:60:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char host_id[MAX_LONG_OPT_SZ];
data/dpdk-20.11~rc3/app/proc-info/main.c:79:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bdr_str[MAX_STRING_LEN];
data/dpdk-20.11~rc3/app/proc-info/main.c:544:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char counter_type[MAX_STRING_LEN];
data/dpdk-20.11~rc3/app/proc-info/main.c:545:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[MAX_STRING_LEN];
data/dpdk-20.11~rc3/app/proc-info/main.c:701:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/app/proc-info/main.c:763:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ebuf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/app/proc-info/main.c:1361:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argp[argc + 4];
data/dpdk-20.11~rc3/app/test-acl/main.c:342:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char line[LINE_MAX];
data/dpdk-20.11~rc3/app/test-acl/main.c:360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_TRC_NUM];
data/dpdk-20.11~rc3/app/test-acl/main.c:391:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_ipv6_addr(const char *in, const char **end, uint32_t v[IPV6_ADDR_U32],
data/dpdk-20.11~rc3/app/test-acl/main.c:391:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_ipv6_addr(const char *in, const char **end, uint32_t v[IPV6_ADDR_U32],
data/dpdk-20.11~rc3/app/test-acl/main.c:416:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_cb_ipv6_addr_trace(const char *in, uint32_t v[IPV6_ADDR_U32])
data/dpdk-20.11~rc3/app/test-acl/main.c:443:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_TRC_NUM];
data/dpdk-20.11~rc3/app/test-acl/main.c:493:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(config.trace_file, "r");
data/dpdk-20.11~rc3/app/test-acl/main.c:525:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_ipv6_net(const char *in, struct rte_acl_field field[4])
data/dpdk-20.11~rc3/app/test-acl/main.c:559:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_FLD_NUM];
data/dpdk-20.11~rc3/app/test-acl/main.c:654:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_FLD_NUM];
data/dpdk-20.11~rc3/app/test-acl/main.c:776:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&cfg.defs, ipv6_defs, sizeof(ipv6_defs));
data/dpdk-20.11~rc3/app/test-acl/main.c:779:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&cfg.defs, ipv4_defs, sizeof(ipv4_defs));
data/dpdk-20.11~rc3/app/test-acl/main.c:801:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(config.rule_file, "r");
data/dpdk-20.11~rc3/app/test-acl/main.c:932:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/dpdk-20.11~rc3/app/test-bbdev/main.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_vector_filename[PATH_MAX];
data/dpdk-20.11~rc3/app/test-bbdev/main.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[MAX_CMDLINE_TESTCASES];
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_BBDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_BBDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev.c:771:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_tmp[32];
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_perf.c:425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_perf.c:446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_perf.c:960:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(data, seg->addr, seg->length);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1366:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "r");
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char driver_name[RTE_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input_file[PATH_MAX];
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_common.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_test_common.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[32] = "";
data/dpdk-20.11~rc3/app/test-compress-perf/main.c:229:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(test_data->input_file, "r");
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:206:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_ptr, test_vector->cipher_iv.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:245:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_ptr, test_vector->auth_iv.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:307:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(iv_ptr, test_vector->auth_iv.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:412:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_ptr, test_vector->cipher_iv.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(iv_ptr, test_vector->auth_iv.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:521:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(iv_ptr + 1, test_vector->aead_iv.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:524:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ops[i]->sym->aead.aad.data + 18,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:528:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(iv_ptr, test_vector->aead_iv.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_ops.c:531:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ops[i]->sym->aead.aad.data,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options.h:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device_type[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_common.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[32] = "";
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:469:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(opts->test_file, "r");
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:437:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(t_vec->cipher_iv.data, iv, options->cipher_iv_sz);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:463:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(t_vec->digest.data, digest,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:495:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(t_vec->cipher_iv.data, iv, options->cipher_iv_sz);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:527:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(t_vec->digest.data, digest,
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:542:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t_vec->auth_iv.data, iv, options->auth_iv_sz);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:557:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(t_vec->aad.data, aad, options->aead_aad_sz);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:575:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t_vec->digest.data, digest, options->digest_sz);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vectors.c:588:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t_vec->aead_iv.data, iv, options->aead_iv_sz);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_verify.c:133:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data + len, rte_pktmbuf_mtod(m, uint8_t *),
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_verify.c:224:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mbuf_data, test_data, remaining_bytes);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_verify.c:228:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mbuf_data, test_data, segment_sz);
data/dpdk-20.11~rc3/app/test-crypto-perf/main.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/app/test-eventdev/evt_common.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_name[EVT_TEST_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-eventdev/evt_options.c:70:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	opt->verbose_level = atoi(arg);
data/dpdk-20.11~rc3/app/test-eventdev/evt_options.c:131:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	opt->socket_id = atoi(arg);
data/dpdk-20.11~rc3/app/test-eventdev/evt_options.c:207:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	opt->pool_sz = atoi(arg);
data/dpdk-20.11~rc3/app/test-eventdev/evt_options.h:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[EVT_PROD_MAX_NAME_LEN];
data/dpdk-20.11~rc3/app/test-eventdev/evt_test.h:83:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&_evt_test_entry_ ##nm.test.ops, &nm,  \
data/dpdk-20.11~rc3/app/test-eventdev/test_perf_common.c:826:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(t->sched_type_list, opt->sched_type_list,
data/dpdk-20.11~rc3/app/test-eventdev/test_perf_common.h:67:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pad[offsetof(struct rte_event_timer, user_meta)];
data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_atq.c:465:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(t->tx_evqueue_id, tx_evqueue_id, sizeof(uint8_t) *
data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_common.c:525:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(t->sched_type_list, opt->sched_type_list,
data/dpdk-20.11~rc3/app/test-eventdev/test_pipeline_queue.c:480:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(t->tx_evqueue_id, tx_evqueue_id, sizeof(uint8_t) *
data/dpdk-20.11~rc3/app/test-fib/main.c:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char line[LINE_MAX];
data/dpdk-20.11~rc3/app/test-fib/main.c:308:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp.addr, rt[i].addr, 16);
data/dpdk-20.11~rc3/app/test-fib/main.c:312:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rt[i].addr, rt[j].addr, 16);
data/dpdk-20.11~rc3/app/test-fib/main.c:316:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rt[j].addr, tmp.addr, 16);
data/dpdk-20.11~rc3/app/test-fib/main.c:474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[RT_NUM];
data/dpdk-20.11~rc3/app/test-fib/main.c:508:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[RT_NUM];
data/dpdk-20.11~rc3/app/test-fib/main.c:566:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(config.lookup_ips_file_s, "w");
data/dpdk-20.11~rc3/app/test-fib/main.c:808:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(config.routes_file_s, "w");
data/dpdk-20.11~rc3/app/test-fib/main.c:1013:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(config.routes_file_s, "w");
data/dpdk-20.11~rc3/app/test-fib/main.c:1235:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fr = fopen(config.routes_file, "r");
data/dpdk-20.11~rc3/app/test-fib/main.c:1248:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fl = fopen(config.lookup_ips_file, "r");
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:548:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &eth_item, sizeof(eth_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:571:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &vlan_item, sizeof(vlan_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:597:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &ipv4_item, sizeof(ipv4_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:615:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &ipv6_item, sizeof(ipv6_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:637:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(*header, &udp_item, sizeof(udp_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:662:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &vxlan_item, sizeof(vxlan_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:687:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &vxlan_gpe_item, sizeof(vxlan_gpe_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:704:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &gre_item, sizeof(gre_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:728:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &geneve_item, sizeof(geneve_item));
data/dpdk-20.11~rc3/app/test-flow-perf/actions_gen.c:751:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*header, &gtp_item, sizeof(gtp_item));
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:613:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:633:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:646:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:713:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:724:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1060:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p[6][4];
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1065:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(p[i], "%03d", (int)(n % 1000));
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1070:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(p[i++], "%d", (int)n);
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1092:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(old, lcore_infos,
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[3][32];
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1106:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char go_up_nr_lines[16];
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1108:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(go_up_nr_lines, "%c[%dA\r", 27, nr_lines);
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1146:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old, lcore_infos,
data/dpdk-20.11~rc3/app/test-pipeline/init.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/dpdk-20.11~rc3/app/test-pipeline/init.c:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/dpdk-20.11~rc3/app/test-pipeline/init.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/app/test-pipeline/pipeline_acl.c:152:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(table_acl_params.field_format, ipv4_field_formats,
data/dpdk-20.11~rc3/app/test-pipeline/pipeline_hash.c:454:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(key, ipv6_dst, 16);
data/dpdk-20.11~rc3/app/test-pipeline/pipeline_lpm_ipv6.c:130:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key.ip, &ip, sizeof(uint32_t));
data/dpdk-20.11~rc3/app/test-pmd/5tswap.c:52:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&addr, &ipv6_hdr->src_addr, 16);
data/dpdk-20.11~rc3/app/test-pmd/5tswap.c:53:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ipv6_hdr->src_addr, &ipv6_hdr->dst_addr, 16);
data/dpdk-20.11~rc3/app/test-pmd/5tswap.c:54:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ipv6_hdr->dst_addr, &addr, 16);
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2239:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	else if (isdigit(res->value[0]) && atoi(res->value) > 0 &&
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2240:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						atoi(res->value) < 64)
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2241:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		rss_conf.rss_hf = 1ULL << atoi(res->value);
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2842:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2851:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2979:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2981:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[8];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:5662:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char * const timeouts[RTE_PMD_IXGBE_BYPASS_TMT_NUM] =
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:5664:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char * const modes[RTE_PMD_IXGBE_BYPASS_MODE_NUM] =
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:5666:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char * const events[RTE_PMD_IXGBE_BYPASS_EVENT_NUM] = {
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:6270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ethdev_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:6551:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char token[128];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:6552:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char help[256];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:6618:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char token[128];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:6619:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char help[256];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:10102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[32];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:10126:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (isdigit(string[0]) && atoi(string) > 0 && atoi(string) < 64)
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:10126:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (isdigit(string[0]) && atoi(string) > 0 && atoi(string) < 64)
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:10127:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return (uint16_t)atoi(string);
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:10521:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:10525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[max_num];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:12402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:12404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[16];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:13688:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *file_fld[2];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:16339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[FEC_NAME_SIZE];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:16513:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PTYPE_NAMESIZE], ltype[LTYPE_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:16717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ptype_name[PTYPE_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:743:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char file[128];
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5100:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(action_vxlan_encap_data->item_eth.dst.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5102:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(action_vxlan_encap_data->item_eth.src.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5105:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&action_vxlan_encap_data->item_ipv6.hdr.src_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&action_vxlan_encap_data->item_ipv6.hdr.dst_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(action_vxlan_encap_data->item_vxlan.vni, vxlan_encap_conf.vni,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(action_nvgre_encap_data->item_eth.dst.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5225:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(action_nvgre_encap_data->item_eth.src.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5228:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&action_nvgre_encap_data->item_ipv6.hdr.src_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5231:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&action_nvgre_encap_data->item_ipv6.hdr.dst_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5243:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(action_nvgre_encap_data->item_nvgre.tni, nvgre_encap_conf.tni,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.dst.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5295:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.src.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5297:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &eth, sizeof(eth));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5304:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &vlan, sizeof(vlan));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5353:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &eth, sizeof(eth));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5356:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &vlan, sizeof(vlan));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5433:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.dst.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5435:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.src.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5437:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &eth, sizeof(eth));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5444:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &vlan, sizeof(vlan));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5448:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv4, sizeof(ipv4));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5451:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.hdr.src_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5454:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.hdr.dst_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5457:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv6, sizeof(ipv6));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5460:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &gre, sizeof(gre));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5462:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mpls.label_tc_s, mplsogre_encap_conf.label,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5465:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &mpls, sizeof(mpls));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5528:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.dst.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5530:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.src.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5532:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &eth, sizeof(eth));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5539:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &vlan, sizeof(vlan));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5543:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv4, sizeof(ipv4));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5546:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv6, sizeof(ipv6));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5549:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &gre, sizeof(gre));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5552:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &mpls, sizeof(mpls));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5627:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.dst.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5629:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.src.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5631:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &eth, sizeof(eth));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5638:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &vlan, sizeof(vlan));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5642:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv4, sizeof(ipv4));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5645:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.hdr.src_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5648:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.hdr.dst_addr,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5651:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv6, sizeof(ipv6));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5654:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &udp, sizeof(udp));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5656:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mpls.label_tc_s, mplsoudp_encap_conf.label,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5659:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &mpls, sizeof(mpls));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5724:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.dst.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5726:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth.src.addr_bytes,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5728:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &eth, sizeof(eth));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5735:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &vlan, sizeof(vlan));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5739:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv4, sizeof(ipv4));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5742:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &ipv6, sizeof(ipv6));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5745:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &udp, sizeof(udp));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:5748:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header, &mpls, sizeof(mpls));
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6124:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)ctx->object + arg->offset,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[16]; /* Ought to be enough. */
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6398:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, str, len);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6404:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)ctx->object + arg_addr->offset,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6410:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)ctx->objmask + arg_addr->offset,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[3];
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6463:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[16]; /* Ought to be enough. */
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6511:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, hex_tmp, hexlen);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6518:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)ctx->object + arg_addr->offset,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6524:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)ctx->objmask + arg_addr->offset,
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6600:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, &tmp, size);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6621:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str2[len + 1];
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6635:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str2, str, len);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6646:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, &tmp, size);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6667:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str2[len + 1];
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6682:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str2, str, len);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6690:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, &tmp, size);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:7807:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[16] = {0};
data/dpdk-20.11~rc3/app/test-pmd/cmdline_mtr.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/dpdk-20.11~rc3/app/test-pmd/cmdline_tm.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/dpdk-20.11~rc3/app/test-pmd/config.c:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/app/test-pmd/config.c:581:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-pmd/config.c:587:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devstr[128];
data/dpdk-20.11~rc3/app/test-pmd/config.c:657:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-pmd/config.c:659:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_version[ETHDEV_FWVERS_LEN];
data/dpdk-20.11~rc3/app/test-pmd/config.c:825:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test-pmd/config.c:883:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[len_eeprom];
data/dpdk-20.11~rc3/app/test-pmd/config.c:942:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[minfo.eeprom_len];
data/dpdk-20.11~rc3/app/test-pmd/config.c:1698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/dpdk-20.11~rc3/app/test-pmd/config.c:2276:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(file_name, "w");
data/dpdk-20.11~rc3/app/test-pmd/config.c:2667:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/config.c:4076:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char fwd_modes[128] = "";
data/dpdk-20.11~rc3/app/test-pmd/config.c:4097:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char fwd_modes[128] = "";
data/dpdk-20.11~rc3/app/test-pmd/config.c:4645:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[32];
data/dpdk-20.11~rc3/app/test-pmd/config.c:5156:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(file_path, O_RDONLY);
data/dpdk-20.11~rc3/app/test-pmd/config.c:5209:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fh = fopen(file_path, "wb");
data/dpdk-20.11~rc3/app/test-pmd/config.c:5284:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/app/test-pmd/config.c:5321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/app/test-pmd/csumonly.c:655:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, len);
data/dpdk-20.11~rc3/app/test-pmd/csumonly.c:703:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(seglen, tx_pkt_seg_lengths, nb_seg * sizeof(seglen[0]));
data/dpdk-20.11~rc3/app/test-pmd/csumonly.c:1002:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[256];
data/dpdk-20.11~rc3/app/test-pmd/icmpecho.c:218:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d.%d.%d.%d", (ipv4_addr >> 24) & 0xFF,
data/dpdk-20.11~rc3/app/test-pmd/icmpecho.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/app/test-pmd/icmpecho.c:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/dpdk-20.11~rc3/app/test-pmd/noisy_vnf.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NOISY_STRSIZE];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:242:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	config_file = fopen(config_filename, "r");
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:461:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:839:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:847:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:895:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:923:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:931:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:943:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:999:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1010:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1022:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1090:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1099:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1108:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1148:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1188:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1198:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1205:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1212:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1227:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1234:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1241:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1248:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1255:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1262:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1269:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1276:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1366:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1375:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1400:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1409:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1418:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1427:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1436:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/parameters.c:1445:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(optarg);
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cmdline_filename[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:543:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char dynf_names[64][RTE_MBUF_DYN_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:975:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:3166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:3728:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rte_port->dev_conf, &port_conf, sizeof(struct rte_eth_conf));
data/dpdk-20.11~rc3/app/test-pmd/testpmd.h:116:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char dynf_names[64][RTE_MBUF_DYN_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/testpmd.h:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[16];
data/dpdk-20.11~rc3/app/test-pmd/testpmd.h:347:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cmdline_filename[PATH_MAX]; /**< offline commands file */
data/dpdk-20.11~rc3/app/test-pmd/testpmd.h:677:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/app/test-pmd/util.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/app/test-pmd/util.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/dpdk-20.11~rc3/app/test-regex/main.c:99:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*nb_jobs = atoi(optarg);
data/dpdk-20.11~rc3/app/test-regex/main.c:105:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*nb_iterations = atoi(optarg);
data/dpdk-20.11~rc3/app/test-regex/main.c:130:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(file, "r");
data/dpdk-20.11~rc3/app/test-regex/main.c:418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rules_file[MAX_FILE_NAME];
data/dpdk-20.11~rc3/app/test-regex/main.c:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data_file[MAX_FILE_NAME];
data/dpdk-20.11~rc3/app/test-sad/main.c:85:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char line[LINE_MAX];
data/dpdk-20.11~rc3/app/test-sad/main.c:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_RULE_NUM];
data/dpdk-20.11~rc3/app/test-sad/main.c:318:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(file_name, "r");
data/dpdk-20.11~rc3/app/test-sad/main.c:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[INET6_ADDRSTRLEN];
data/dpdk-20.11~rc3/app/test/process.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv_cpy[numargs + 1];
data/dpdk-20.11~rc3/app/test/process.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[32];
data/dpdk-20.11~rc3/app/test/process.h:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/process.h:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/resource.c:58:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fname, "w");
data/dpdk-20.11~rc3/app/test/resource.c:116:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, res->begin, resource_size(res));
data/dpdk-20.11~rc3/app/test/resource.c:194:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, res->begin, resource_size(res));
data/dpdk-20.11~rc3/app/test/test.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *eargv[MAX_EXTRA_ARGS];
data/dpdk-20.11~rc3/app/test/test.c:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024];
data/dpdk-20.11~rc3/app/test/test_acl.c:213:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cfg->defs, ipv4_defs, sizeof(ipv4_defs));
data/dpdk-20.11~rc3/app/test/test_acl.c:753:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cfg->defs, ipv4_defs, sizeof(ipv4_defs));
data/dpdk-20.11~rc3/app/test/test_acl.c:1220:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rules[i], &acl_rule,
data/dpdk-20.11~rc3/app/test/test_acl.c:1283:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rule, &acl_rule, sizeof(struct rte_acl_ipv4vlan_rule));
data/dpdk-20.11~rc3/app/test/test_bpf.c:2616:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ph, &iph, sizeof(iph));
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:477:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:478:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:479:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:578:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:671:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:790:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:791:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:994:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:995:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_cirbuf.c:1184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_etheraddr.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_ipaddr.c:337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_ipaddr.c:580:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_ipaddr.c:628:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_lib.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_num.c:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_num.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_num.c:410:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_portlist.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_string.c:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_string.c:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_string.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char help_str[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_string.c:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char small_buf[SMALL_BUF];
data/dpdk-20.11~rc3/app/test/test_cmdline_string.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_cmdline_string.c:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char help_str[CMDLINE_TEST_BUFSIZE];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:349:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&invalid_config, &valid_config,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:363:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&invalid_config, &valid_config,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:536:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dst_data, src_data, remaining_data);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:539:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dst_data, src_data, dst_buf->data_len);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:660:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dst_data, src_data, remaining_data);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:663:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dst_data, src_data, dst_buf->data_len);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:723:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf_ptr, data_ptr, data_size);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:763:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf_ptr, data_ptr, data_size);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:1599:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ops[i] + 1, ops_processed[i] + 1,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2194:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(compress_xform, ts_params->def_comp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2266:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(compress_xform, ts_params->def_comp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2378:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(compress_xform, ts_params->def_comp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2431:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[NUM_XFORMS];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2448:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(compress_xforms[i], ts_params->def_comp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2462:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(decompress_xforms[i], ts_params->def_decomp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2620:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(compress_xform, ts_params->def_comp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2631:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(decompress_xform, ts_params->def_decomp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2966:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(compress_xform, ts_params->def_comp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:2977:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(decompress_xform, ts_params->def_decomp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3084:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3192:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(compress_xform, ts_params->def_comp_xform,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3331:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[2];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3402:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[2];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3473:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[3];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3545:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[4];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3686:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[2];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3757:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[2];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3828:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[3];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3901:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[4];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:4045:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[2];
data/dpdk-20.11~rc3/app/test/test_compressdev.c:4118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *test_buffers[2];
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vdev_args[VDEV_ARGS_SIZE] = {""};
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:709:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp_str[VDEV_ARGS_SIZE] = {"mode=multi-core,"
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2010:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hash_key, key, key_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2048:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cipher_key, key, key_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cipher_auth_key, key, key_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2216:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cipher_auth_key, key, key_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2286:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(auth_cipher_key, key, key_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2623:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sym_op->auth.digest.data, auth_tag, auth_tag_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2715:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2805:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2891:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:2979:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:3204:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:3396:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:3574:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:3662:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:3754:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:3845:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4064:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, (tdata->plaintext.len >> 3));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4097:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(expected_ciphertext_shifted, tdata->ciphertext.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4164:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4255:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4354:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4457:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4595:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4603:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:4994:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:5002:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:5371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:5480:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:5682:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:5805:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:5813:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:6296:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(output->key.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:6301:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(output->auth_iv.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:6306:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(output->plaintext.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:6311:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(output->digest.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:6821:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:6829:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:7390:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(aead_key, key, key_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:7478:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sym_op->aead.aad.data + 18, tdata->aad.data, tdata->aad.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:7499:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sym_op->aead.aad.data, tdata->aad.data, tdata->aad.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:7525:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:7546:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ciphertext, tdata->ciphertext.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:7648:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&tdata->aad.data[i], &tdata->aad.data[0], 32);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:7788:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, input_vec, input_vec_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:8000:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, input_vec, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:8035:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, input_vec + trn_data, to_trn);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:8553:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ciphertext, d_td->ciphertext.data, d_td->ciphertext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:8729:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, d_td->plaintext.data, d_td->plaintext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9133:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9149:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9165:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9181:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9198:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9199:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(aad, gcm_test_case_7.aad.data, gcm_test_case_7.aad.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9216:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9274:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&tdata->aad.data[i], &tdata->aad.data[0], 32);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9484:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9500:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9515:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9530:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9546:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9547:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(aad, gcm_test_case_7.aad.data, gcm_test_case_7.aad.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9563:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9792:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key, tdata->key.data, tdata->key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:9900:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key, tdata->key.data, tdata->key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:10138:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key, test_case->key.data, test_case->key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:10181:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*plaintext, test_case->plaintext.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:10737:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&data[i], &data[0], 32);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:10846:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(auth_key, tdata->key.data, tdata->key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:10933:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11063:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11177:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, tdata->plaintext.data + trn_data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11493:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(auth_key, reference->auth_key.data, reference->auth_key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11528:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cipher_key, reference->cipher_key.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11530:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(auth_key, reference->auth_key.data, reference->auth_key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11603:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sym_op->auth.digest.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11650:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sym_op->auth.digest.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11703:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sym_op->auth.digest.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11797:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, reference->plaintext.data, reference->plaintext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11879:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, reference->plaintext.data, reference->plaintext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:11969:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ciphertext, reference->ciphertext.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12040:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cipher_key, reference->cipher_key.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12042:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(auth_key, reference->auth_key.data, reference->auth_key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12086:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, reference->plaintext.data, reference->plaintext.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12173:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cipher_key, reference->cipher_key.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12175:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(auth_key, reference->auth_key.data, reference->auth_key.len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12218:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ciphertext, reference->ciphertext.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12456:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(plaintext, tdata->plaintext.data, plaintext_len);
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12492:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(plaintext, tdata->plaintext.data + trn_data,
data/dpdk-20.11~rc3/app/test/test_cryptodev.c:12830:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vdev_name[32];
data/dpdk-20.11~rc3/app/test/test_cryptodev_asym.c:355:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(input, data_tc->modex.base.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev_asym.c:375:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(input, data_tc->modinv.base.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev_asym.c:532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_msg[ASYM_TEST_MSG_LEN + 1];
data/dpdk-20.11~rc3/app/test/test_cryptodev_asym.c:1545:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(input, base, sizeof(base));
data/dpdk-20.11~rc3/app/test/test_cryptodev_asym.c:1670:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(input, base, sizeof(base));
data/dpdk-20.11~rc3/app/test/test_cryptodev_blockcipher.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cipher_key, tdata->cipher_key.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev_blockcipher.c:172:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(auth_key, tdata->auth_key.data,
data/dpdk-20.11~rc3/app/test/test_cryptodev_blockcipher.c:751:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_msg[BLOCKCIPHER_TEST_MSG_LEN + 1];
data/dpdk-20.11~rc3/app/test/test_distributor.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[NUM_TOKENS];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hugefile_prefix[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hugedir[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:98:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	hugedir_handle = fopen("/proc/mounts", "r");
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:133:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char file_path[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:304:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:452:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:716:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX] = "";
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:801:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hugepath[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:807:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:810:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:823:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	hugedir_handle = fopen("/proc/mounts", "r");
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1033:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX] = "";
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX], tmp[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg2_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg3_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg4_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg5_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg6_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg8_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char invalid_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_flags.c:1368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char valid_socket_mem[SOCKET_MEM_STRLEN];
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX] = "";
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char proc_path[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:34:20:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	tmp_file_handle = mkstemp(file_template);
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:57:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(filename,"w");
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:77:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(filename,"w");
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:98:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(filename,"w");
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:112:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(filename,"w");
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:127:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(filename,"w");
data/dpdk-20.11~rc3/app/test/test_eal_fs.c:141:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(filename,"w");
data/dpdk-20.11~rc3/app/test/test_efd_perf.c:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp_key, keys[i], hashtest_key_lens[params->cycle]);
data/dpdk-20.11~rc3/app/test/test_efd_perf.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(keys[i], keys[swap_idx], hashtest_key_lens[params->cycle]);
data/dpdk-20.11~rc3/app/test/test_efd_perf.c:100:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(keys[swap_idx], temp_key, hashtest_key_lens[params->cycle]);
data/dpdk-20.11~rc3/app/test/test_errno.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expected_libc_retval[sizeof(unknown_code_result)+3];
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/app/test/test_event_eth_rx_adapter.c:527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char driver_name[50];
data/dpdk-20.11~rc3/app/test/test_event_eth_tx_adapter.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[ETH_NAME_LEN];
data/dpdk-20.11~rc3/app/test/test_event_eth_tx_adapter.c:151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dev_name[DEV_NAME_LEN];
data/dpdk-20.11~rc3/app/test/test_event_eth_tx_adapter.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ETH_NAME_LEN];
data/dpdk-20.11~rc3/app/test/test_event_eth_tx_adapter.c:638:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *null_dev[2] = { "eth_null0", "eth_null1" };
data/dpdk-20.11~rc3/app/test/test_fib6_perf.c:120:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ip_batch[i], large_ips_table[i].ip, 16);
data/dpdk-20.11~rc3/app/test/test_flow_classify.c:579:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/app/test/test_flow_classify.c:836:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(table_acl_params.field_format, ipv4_defs, sizeof(ipv4_defs));
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mempool_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mempool_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbk_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbk_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lpm_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lpm_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_func_reentrancy.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/app/test/test_graph.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_NODE_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_graph.c:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *next_nodes[MAX_NODES];
data/dpdk-20.11~rc3/app/test/test_graph_perf.c:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lookup_name[RTE_NODE_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_graph_perf.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nname[RTE_NODE_NAMESIZE / 2];
data/dpdk-20.11~rc3/app/test/test_graph_perf.c:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ename[nodes_per_stage];
data/dpdk-20.11~rc3/app/test/test_hash_multiwriter.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_hash_perf.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_hash_perf.c:143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp_key, keys[i], hashtest_key_lens[table_index]);
data/dpdk-20.11~rc3/app/test/test_hash_perf.c:147:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(keys[i], keys[swap_idx], hashtest_key_lens[table_index]);
data/dpdk-20.11~rc3/app/test/test_hash_perf.c:151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(keys[swap_idx], temp_key, hashtest_key_lens[table_index]);
data/dpdk-20.11~rc3/app/test/test_hash_readwrite_lf_perf.c:240:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tbl_rwc_test_param.keys_shift_path +
data/dpdk-20.11~rc3/app/test/test_ipsec.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char auth_algo[128];
data/dpdk-20.11~rc3/app/test/test_ipsec.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cipher_algo[128];
data/dpdk-20.11~rc3/app/test/test_ipsec.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aead_algo[128];
data/dpdk-20.11~rc3/app/test/test_ipsec.c:290:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(uparams.auth_algo, "null");
data/dpdk-20.11~rc3/app/test/test_ipsec.c:291:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(uparams.cipher_algo, "null");
data/dpdk-20.11~rc3/app/test/test_kni.c:552:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/dpdk-20.11~rc3/app/test/test_kni.c:612:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(KNI_MODULE_PARAM_LO, "r");
data/dpdk-20.11~rc3/app/test/test_kvargs.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:238:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pmd_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pmd_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:913:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&slave_mac_addr, slave_mac, sizeof(struct rte_ether_addr));
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:914:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&bonded_mac_addr, slave_mac, sizeof(struct rte_ether_addr));
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:930:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pmd_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:2034:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char slave_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4743:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client1, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4754:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client2, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4765:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client3, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4776:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client4, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4864:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client1, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4876:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client2, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4888:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client3, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4900:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client4, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding.c:4998:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client_mac.addr_bytes, mac_client1, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/app/test/test_link_bonding_mode4.c:388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test/test_link_bonding_mode4.c:513:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&lacp->partner.port_params, &lacp->actor.port_params,
data/dpdk-20.11~rc3/app/test/test_link_bonding_rssconf.c:513:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/dpdk-20.11~rc3/app/test/test_lpm6.c:1581:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ip, large_route_table[i].ip, 16);
data/dpdk-20.11~rc3/app/test/test_lpm6.c:1592:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ip, large_ips_table[i].ip, 16);
data/dpdk-20.11~rc3/app/test/test_lpm6_perf.c:125:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ip_batch[i], large_ips_table[i].ip, 16);
data/dpdk-20.11~rc3/app/test/test_malloc.c:679:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char data[0];
data/dpdk-20.11~rc3/app/test/test_malloc.c:759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char save_buf[64];
data/dpdk-20.11~rc3/app/test/test_malloc.c:767:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(over_write_vals, save_buf, sizeof(save_buf));
data/dpdk-20.11~rc3/app/test/test_malloc.c:784:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(over_write_vals, save_buf, sizeof(save_buf));
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256] = "";
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1540:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256] = "";
data/dpdk-20.11~rc3/app/test/test_mbuf.c:2120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(seg_lengths, test_data->seg_lengths,
data/dpdk-20.11~rc3/app/test/test_mbuf.c:2254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data_buf[MBUF_DATA_SIZE];
data/dpdk-20.11~rc3/app/test/test_member_perf.c:92:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp_key, keys[i], hashtest_key_lens[params->cycle]);
data/dpdk-20.11~rc3/app/test/test_member_perf.c:93:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(keys[i], keys[swap_idx],
data/dpdk-20.11~rc3/app/test/test_member_perf.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(keys[swap_idx], temp_key,
data/dpdk-20.11~rc3/app/test/test_memcpy_perf.c:189:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dst+dst_addrs[t], src+src_addrs[t], size);               \
data/dpdk-20.11~rc3/app/test/test_memzone.c:855:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[20];
data/dpdk-20.11~rc3/app/test/test_mp_secondary.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char coremask[10];
data/dpdk-20.11~rc3/app/test/test_mp_secondary.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_mp_secondary.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_pdump.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char coremask[10];
data/dpdk-20.11~rc3/app/test/test_pdump.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX] = { 0 };
data/dpdk-20.11~rc3/app/test/test_pdump.c:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX] = { 0 };
data/dpdk-20.11~rc3/app/test/test_pmd_perf.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/app/test/test_pmd_perf.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/app/test/test_pmd_perf.c:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/app/test/test_pmd_ring_perf.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/app/test/test_power_cpufreq.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/app/test/test_power_cpufreq.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/app/test/test_power_cpufreq.c:57:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "r");
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char hash_name[RTE_MAX_LCORE][8];
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c:631:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcu_dq_name[RTE_RCU_QSBR_DQ_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c:698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcu_dq_name[RTE_RCU_QSBR_DQ_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c:741:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcu_dq_name[RTE_RCU_QSBR_DQ_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c:776:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcu_dq_name[RTE_RCU_QSBR_DQ_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c:812:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcu_dq_name[RTE_RCU_QSBR_DQ_NAMESIZE];
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr.c:1048:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(hash_name[hash_id], "hash%d", hash_id);
data/dpdk-20.11~rc3/app/test/test_rcu_qsbr_perf.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char hash_name[8];
data/dpdk-20.11~rc3/app/test/test_resource.c:50:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("test_resource.c", "r");
data/dpdk-20.11~rc3/app/test/test_resource.c:76:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("test_resource.c", "r");
data/dpdk-20.11~rc3/app/test/test_ring.h:67:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sz);
data/dpdk-20.11~rc3/app/test/test_ring_stress_impl.h:166:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(elm[i], fill, sizeof(*elm[i]));
data/dpdk-20.11~rc3/app/test/test_stack.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_STACK_NAMESIZE + 1];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *splits[6];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *splits[6];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *splits[6];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *splits[6];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *splits[6];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:138:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char dst[BUF_LEN] = "Test string";
data/dpdk-20.11~rc3/app/test/test_string_fns.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bsd_dst[BUF_LEN];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rte_dst[BUF_LEN];
data/dpdk-20.11~rc3/app/test/test_string_fns.c:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bsd_dst, dst, BUF_LEN);
data/dpdk-20.11~rc3/app/test/test_string_fns.c:151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rte_dst, dst, BUF_LEN);
data/dpdk-20.11~rc3/app/test/test_table.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/dpdk-20.11~rc3/app/test/test_table.c:115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/dpdk-20.11~rc3/app/test/test_table.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_PIPELINE_MAX_NAME_SZ];
data/dpdk-20.11~rc3/app/test/test_table_acl.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_FLD_NUM];
data/dpdk-20.11~rc3/app/test/test_table_acl.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_FLD_NUM];
data/dpdk-20.11~rc3/app/test/test_table_acl.c:326:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char line[128];
data/dpdk-20.11~rc3/app/test/test_table_acl.c:342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char acl_name[64];
data/dpdk-20.11~rc3/app/test/test_table_acl.c:423:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(acl_params.field_format, ipv4_defs, sizeof(ipv4_defs));
data/dpdk-20.11~rc3/app/test/test_table_acl.c:666:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rte_pktmbuf_mtod(mbuf, char *), &five_tuple,
data/dpdk-20.11~rc3/app/test/test_table_tables.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *entries[RTE_PORT_IN_BURST_SIZE_MAX];
data/dpdk-20.11~rc3/app/test/test_table_tables.c:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *entries[RTE_PORT_IN_BURST_SIZE_MAX];
data/dpdk-20.11~rc3/app/test/test_table_tables.c:291:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *entries[RTE_PORT_IN_BURST_SIZE_MAX];
data/dpdk-20.11~rc3/app/test/test_table_tables.c:457:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *entries[RTE_PORT_IN_BURST_SIZE_MAX];
data/dpdk-20.11~rc3/app/test/test_table_tables.c:635:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *entries[RTE_PORT_IN_BURST_SIZE_MAX];
data/dpdk-20.11~rc3/app/test/test_table_tables.c:738:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *entries[RTE_PORT_IN_BURST_SIZE_MAX];
data/dpdk-20.11~rc3/app/test/test_table_tables.c:899:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *entries[RTE_PORT_IN_BURST_SIZE_MAX];
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUF_SIZE * 16];
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_of_value[8];
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:140:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(name_of_value, "dict_%d", i);
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_of_value[8];
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:245:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(name_of_value, "dict_%d", i);
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUF_SIZE];
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[25];
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[25];
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(str) - 5] = "ABC";
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(str) - 5] = "XYZ";
data/dpdk-20.11~rc3/app/test/test_timer_secondary.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char coremask[10];
data/dpdk-20.11~rc3/app/test/test_timer_secondary.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/test_timer_secondary.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[PATH_MAX] = {0};
data/dpdk-20.11~rc3/app/test/virtual_pmd.c:519:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_buf[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/app/test/virtual_pmd.c:585:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth_dev->data->mac_addrs, mac_addr,
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:42:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(filename, O_RDONLY);
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[1024];
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:51:12:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		infile = tmpfile();
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpsymname[128];
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:386:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ofd = fopen(outfile, "w+");
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.h:97:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *opt_vals[PMD_OPT_MAX];
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[RTE_BBDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/baseband/fpga_5gnr_fec/rte_fpga_5gnr_fec.c:1852:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[RTE_BBDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/baseband/fpga_lte_fec/fpga_lte_fec.c:2341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[RTE_BBDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/baseband/null/bbdev_null.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/baseband/turbo_sw/bbdev_turbo_software.c:289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/fman/fman.c:385:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&__if->__if.mac_addr, mac_addr, ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/fman/fman.c:604:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fman_ccsr_map_fd = open(FMAN_DEVICE_PATH, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/fman/fman_hw.c:156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&m->__if.mac_addr, eth, ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irqname[MAX_IRQNAME];
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman_driver.c:73:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	bmfd = open(BMAN_PORTAL_IRQ_PATH, O_RDONLY);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/bman_driver.c:159:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ccsr_map_fd = open(BMAN_CCSR_MAP, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/process.c:36:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(PROCESS_PATH, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irqname[MAX_IRQNAME];
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman.c:511:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman.c:579:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "qportal-%d", c->channel);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman_driver.c:64:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	qmfd = open(QMAN_PORTAL_IRQ_PATH, O_RDONLY);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman_driver.c:170:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	q_fd = open(QMAN_PORTAL_IRQ_PATH, O_RDONLY);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman_driver.c:328:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ccsr_map_fd = open("/dev/mem", O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/dpaa/base/qbman/qman_priv.h:60:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, src, sizeof(*dest));
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[32];
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:187:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(dev->name, "fm%d-mac%d", (fman_intf->fman_idx + 1),
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:226:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(dev->name, "dpaa_sec-%d", i+1);
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:417:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fm_name[16];
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:429:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sec_name[16];
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:619:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	svr_file = fopen(DPAA_SOC_ID_FILE, "r");
data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fman.h:372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node_name[IF_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/dpaa/include/fman.h:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/dpaa/include/process.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            if_name[IF_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/dpaa/include/process.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    if_name[IF_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/dpaa/include/process.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    if_name[IF_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/dpaa/include/process.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    if_name[IF_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/dpaa/include/process.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    if_name[IF_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/dpaa/rte_dpaa_bus.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[32];
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fslmc_dirpath[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_vfio.c:600:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_vfio.c:629:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[STRING_LEN], command[COMMAND_LEN];
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:137:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen("/proc/interrupts", "r");
data/dpdk-20.11~rc3/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c:186:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		threshold = atoi(getenv("DPAA2_PORTAL_INTR_THRESHOLD"));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:759:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:760:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[8], fd, sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:782:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:783:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[8], fd, sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:821:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:822:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[8], fd, sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:861:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:862:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[8], fd, sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:936:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:937:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[8], fd, sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1003:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1004:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], &fd[i], sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1073:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1074:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], &fd[i], sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1202:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1203:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], &fd[i], sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1271:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], fd[i], sizeof(struct qbman_fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1341:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1342:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], fd[i], sizeof(struct qbman_fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1470:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1471:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], fd[i], sizeof(struct qbman_fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1545:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1546:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], &fd[i], sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1610:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1611:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], &fd[i], sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1729:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[1], &cl[1], 28);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1730:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&p[8], &fd[i], sizeof(*fd));
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1902:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[1], &cl[1], 12);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_portal.c:1951:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p[1], &cl[1], 12);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_sys.h:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[64];
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_sys.h:76:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		pos += sprintf(buf + pos, "%08lx: ", start);
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_sys.h:79:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				pos += sprintf(buf + pos, "..");
data/dpdk-20.11~rc3/drivers/bus/fslmc/qbman/qbman_sys.h:81:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				pos += sprintf(buf + pos, "%02x", *(c++));
data/dpdk-20.11~rc3/drivers/bus/fslmc/rte_fslmc.h:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FSLMC_OBJECT_MAX_LEN];    /**< DPAA2 Object name*/
data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_bus.c:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name1[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_bus.c:426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rawdev_name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_bus.c:430:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_port[8];
data/dpdk-20.11~rc3/drivers/bus/ifpga/ifpga_bus.c:443:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_port, name, str_port_len);
data/dpdk-20.11~rc3/drivers/bus/ifpga/rte_bus_ifpga.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bs_path[IFPGA_BUS_BITSTREAM_PATH_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/ifpga/rte_bus_ifpga.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[IFPGA_BUS_BITSTREAM_PATH_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[PATH_MAX]; /* contains the /dev/uioX */
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:131:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dev->intr_handle.fd = open(devname, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:148:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(*uio_res)->pci_addr, &dev->addr, sizeof((*uio_res)->pci_addr));
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:183:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(devname, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:347:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/pci", O_RDONLY);
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:422:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/pci", O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:434:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, &pi.pi_data, size);
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:473:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pi.pi_data, buf, len);
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:475:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/pci", O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *ptrs[PCI_RESOURCE_FMT_NVAL];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:183:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:222:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char driver[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:414:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *str[PCI_FMT_NVAL]; /* last element-separator is "." not ":" */
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:455:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:505:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:514:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:560:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX] = "/proc/cpuinfo";
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:561:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fp = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:636:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[RTE_DEV_NAME_MAX_LEN] = "";
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:660:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[RTE_DEV_NAME_MAX_LEN] = "";
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:688:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pci_id[16];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:702:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen("/proc/ioports", "r");
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:90:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:218:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cfgname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[PATH_MAX]; /* contains the /dev/uioX */
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:236:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dev->intr_handle.fd = open(devname, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:245:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dev->intr_handle.uio_cfg_fd = open(cfgname, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:273:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(*uio_res)->pci_addr, &dev->addr, sizeof((*uio_res)->pci_addr));
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:318:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(devname, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:334:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(devname, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:377:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:408:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dev->intr_handle.fd = open(filename, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:430:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:439:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_uio.c:463:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:701:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pci_addr[PATH_MAX] = {0};
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:850:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pci_addr[PATH_MAX] = {0};
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:970:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pci_addr[PATH_MAX] = {0};
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci_vfio.c:1027:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pci_addr[PATH_MAX] = {0};
data/dpdk-20.11~rc3/drivers/bus/pci/pci_common_uio.c:44:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(uio_res->maps[i].path, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/pci/private.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/rte_bus_pci.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PCI_PRI_STR_SIZE+1];      /**< PCI location (ASCII) */
data/dpdk-20.11~rc3/drivers/bus/pci/windows/pci.c:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  pci_device_info[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/pci/windows/pci_netuio.c:36:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR dev_instance_id[MAX_DEVICENAME_SZ];
data/dpdk-20.11~rc3/drivers/bus/vdev/vdev.c:380:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:50:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:92:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *map_names[VMBUS_MAX_RESOURCE] = {
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uioname[PATH_MAX], filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX], mapname[64];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[PATH_MAX]; /* contains the /dev/uioX */
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:83:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dev->intr_handle.fd = open(devname, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:145:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(uio_res->path, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:212:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ring_path, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:269:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ring_path, O_RDWR);
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:323:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char chan_path[PATH_MAX], subchan_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/private.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_bufring.c:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(br_data + windex, src, fraglen);
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_bufring.c:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(br_data, src + fraglen, cplen - fraglen);
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_bufring.c:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(br_data + windex, src, cplen);
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_bufring.c:182:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, br_data + rindex, fraglen);
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_bufring.c:183:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst + fraglen, br_data, cplen - fraglen);
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_bufring.c:185:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, br_data + rindex, cplen);
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_common.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char guid[RTE_UUID_STRLEN];
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_common.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ubuf[RTE_UUID_STRLEN];
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_common.c:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(addr, &guid, sizeof(guid));
data/dpdk-20.11~rc3/drivers/bus/vmbus/vmbus_common_uio.c:57:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(uio_res->path, O_RDWR);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_fpm_tables.c:1111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, fpm_table_scalar[i].data, fpm_table_scalar[i].len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cpt_ctx->fctx.enc.encr_iv, salt, 4);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:196:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cpt_ctx->zs_ctx.ci_key, keyx, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:205:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cpt_ctx->zs_ctx.ci_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:206:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cpt_ctx->zs_ctx.zuc_const, zuc_d, 32);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cpt_ctx->k_ctx.ci_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cpt_ctx->k_ctx.ci_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:264:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fctx->enc.encr_key+key_len, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:265:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fctx->enc.encr_key+2*key_len, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:284:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fctx->enc.encr_iv, salt, 4);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:299:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fctx->hmac.ipad, &key[key_len], key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:323:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fctx->enc.encr_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:1576:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_d, iv, 16);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:1623:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iv_d, iv, 16);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:1866:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_d, iv, 16);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:1914:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iv_d, iv, 16);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2133:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iv_d, iv_s, iv_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2353:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uint8_t *)offset_vaddr + OFF_CTRL_LEN,
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2514:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cpt_ctx->zs_ctx.ci_key, keyx, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2520:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cpt_ctx->zs_ctx.ci_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2521:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cpt_ctx->zs_ctx.zuc_const, zuc_d, 32);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2528:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cpt_ctx->k_ctx.ci_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2533:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cpt_ctx->k_ctx.ci_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2563:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cpt_ctx->auth_key, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:2569:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fctx->hmac.opad, key, key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:3086:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src[SRC_IOV_SIZE];
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:3087:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst[SRC_IOV_SIZE];
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:3097:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)iv_buf,
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:3402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src[SRC_IOV_SIZE];
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode.h:3444:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_buf, rte_pktmbuf_mtod(cop->sym->m_src,
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:62:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->modulus.data, mod, mod_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:64:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->exponent.data, exp, exp_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:99:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rsa->n.data, xfrm_rsa->n.data, mod_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:101:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rsa->e.data, xfrm_rsa->e.data, exp_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->qt.q.data, qt.q.data, qt.q.length);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->qt.dQ.data, qt.dQ.data, qt.dQ.length);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->qt.p.data, qt.p.data, qt.p.length);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:112:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->qt.dP.data, qt.dP.data, qt.dP.length);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->qt.qInv.data, qt.qInv.data, qt.qInv.length);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:258:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, mod->modulus.data, total_key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:260:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, mod_op.base.data, base_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:323:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, rsa->n.data, total_key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:327:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, crypto_param->data, in_size);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:411:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, rsa->qt.q.data, total_key_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:415:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, crypto_param->data, in_size);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:660:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, ecdsa->k.data, k_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:663:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, ec_grp[curveid].prime.data, prime_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:666:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + o_offset, ec_grp[curveid].order.data, order_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:669:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + pk_offset, ecdsa->pkey.data, pkey_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:672:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, ecdsa->message.data, message_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:764:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + r_offset, ecdsa->r.data, r_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:767:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + s_offset, ecdsa->s.data, s_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:770:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, ecdsa->message.data, message_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:773:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + o_offset, ec_grp[curveid].order.data, order_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:776:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, ec_grp[curveid].prime.data, prime_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:779:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + qx_offset, ecdsa->q.x.data, qx_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:782:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + qy_offset, ecdsa->q.y.data, qy_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:873:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + x1_offset, ecpm->p.x.data, x1_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:875:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr + y1_offset, ecpm->p.y.data, y1_len);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:877:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, ecpm->scalar.data, ecpm->scalar.length);
data/dpdk-20.11~rc3/drivers/common/cpt/cpt_ucode_asym.h:879:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dptr, ec_grp[curveid].prime.data, ec_grp[curveid].prime.length);
data/dpdk-20.11~rc3/drivers/common/dpaax/compat.h:340:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define copy_words memcpy
data/dpdk-20.11~rc3/drivers/common/dpaax/compat.h:341:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define copy_shorts memcpy
data/dpdk-20.11~rc3/drivers/common/dpaax/compat.h:342:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define copy_bytes memcpy
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char full_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char full_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.c:47:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ret = open(full_path, O_RDONLY);
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_MAX];
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char full_name[PATH_MAX];
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaax_iova_table.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_data[MEM_NODE_FILE_LEN];
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaax_iova_table.c:88:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(result.gl_pathv[0], O_RDONLY);
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaax_iova_table.c:135:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&nodes[j], file_data + i, 16);
data/dpdk-20.11~rc3/drivers/common/iavf/iavf_common.c:307:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char d_buf[16];
data/dpdk-20.11~rc3/drivers/common/iavf/iavf_impl.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/common/iavf/iavf_type.h:359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char err_str[16];
data/dpdk-20.11~rc3/drivers/common/iavf/virtchnl.h:751:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkg_name[PKG_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[32];
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:45:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(path, "rb");
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[IF_NAMESIZE] = "";
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:194:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(path, "rb");
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char glue_path[sizeof(RTE_EAL_PMD_PATH) - 1 + sizeof("-glue")];
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:318:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[ret + 1];
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:432:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char m[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:438:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&(*data->mac)[data->mac_n++],
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:550:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(RTA_DATA(&req.rta), mac, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char m[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:628:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ivm.mac, mac, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:629:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(RTA_DATA(&req.vf_mac_rta), &ivm, sizeof(ivm));
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1035:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)((uintptr_t)na + NLA_HDRLEN),
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1040:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)((uintptr_t)na + NLA_HDRLEN),
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1214:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(arg, &info, sizeof(info));
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1333:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)nla + sizeof(struct nlattr), data, alen);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[sizeof(MLX5_VMWA_VLAN_DEVICE_PFX) + 32];
data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[mkstr_size_##name + 1]; \
data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_common_mp.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MP_MAX_NAME_LEN];
data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_devx_cmds.c:69:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, &out[MLX5_ST_SZ_DW(access_register_out)],
data/dpdk-20.11~rc3/drivers/common/mlx5/mlx5_devx_cmds.c:1089:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss_key, tir_attr->rx_hash_toeplitz_key, MLX5_RSS_HASH_KEY_LEN);
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_dev.c:34:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	mem_fd = open("/dev/mem", O_RDWR);
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_io_generic.h:65:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, in, (4 + (2 * lmtext)) * sizeof(uint64_t));
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_irq.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[MSIX_IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_irq.c:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[MSIX_IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_mbox.h:538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lmac_type[LMACTYPE_STR_LEN];
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_mbox.h:1491:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char __otx2_io dmac[6];
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_mbox.h:1492:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char __otx2_io smac[6];
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[QAT_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value_str[4] = { };
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:148:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(value_str, arg2, iter);
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[QAT_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:257:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[QAT_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[QAT_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/common/qat/qat_qp.c:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char op_cookie_pool_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/common/qat/qat_qp.c:941:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out_data, resp_msg, queue->msg_size);
data/dpdk-20.11~rc3/drivers/common/qat/qat_qp.c:980:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(base_addr + queue->tail, &null_msg, sizeof(null_msg));
data/dpdk-20.11~rc3/drivers/common/qat/qat_qp.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		memz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c:243:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_SRC_MAC),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c:245:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_DST_MAC),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c:270:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_SRC_IP),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c:273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_DST_IP),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c:306:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_VNI_OR_VSID),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c:309:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_IFRM_DST_MAC),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_filter.c:1254:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:746:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + hdr_offset, &chunk_hdr, sizeof (chunk_hdr));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:753:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + chunk_hdr.offset,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:771:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + hdr_offset, &chunk_hdr, SIGNED_IMAGE_CHUNK_HDR_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:778:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + chunk_hdr.offset,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:798:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + hdr_offset, &chunk_hdr, SIGNED_IMAGE_CHUNK_HDR_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:805:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + chunk_hdr.offset,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:824:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + hdr_offset, &chunk_hdr, SIGNED_IMAGE_CHUNK_HDR_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:831:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uint8_t *)bufferp + chunk_hdr.offset,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:849:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + hdr_offset, &chunk_hdr, SIGNED_IMAGE_CHUNK_HDR_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_image.c:856:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + chunk_hdr.offset,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_mcdi.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)bufferp + pos, &data, chunk);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_nvram.c:369:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, data, len);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_nvram.c:602:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&partition.tlv_cursor, cursor, sizeof (*cursor));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_nvram.c:1052:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(valuep, tlv_value(&cursor), value_length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_nvram.c:1391:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, value, length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_proxy.c:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, efx_byte_t,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_proxy.c:426:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inbufp[MC_CMD_PROXY_CMD_IN_LEN / sizeof (*inbufp)],
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_rx.c:270:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(MCDI_IN2(req, uint8_t, RSS_CONTEXT_SET_KEY_IN_TOEPLITZ_KEY),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_vpd.c:137:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, dvpd, dvpd_size);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_vpd.c:300:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(evvp->evv_value,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/ef10_vpd.c:316:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evvp->evv_value, data + offset, length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx.h:1429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			enc_phy_name[21];
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx.h:1431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			enc_phy_revision[21];
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx.h:1655:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			enbi_serial[EFX_NIC_BOARD_INFO_SERIAL_LEN];
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx.h:1656:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			enbi_name[EFX_NIC_BOARD_INFO_NAME_LEN];
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_bootcfg.c:472:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&hdrp[1], valuep, value_length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_bootcfg.c:803:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data + 1, sector + 1, used_bytes - 1);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_bootcfg.c:946:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data + 1, payload + 1, used_bytes - 1);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_bootcfg.c:1074:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(partn_data + sector_offset, data, used_bytes);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_filter.c:419:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spec->efs_loc_mac, addr, EFX_MAC_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_filter.c:554:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spec->efs_vni_or_vsid, vni_or_vsid, EFX_VNI_OR_VSID_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_filter.c:558:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spec->efs_loc_mac, outer_addr, EFX_MAC_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_filter.c:562:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spec->efs_ifrm_loc_mac, inner_addr, EFX_MAC_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_filter.c:1642:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, rx_matches, list_length * sizeof (rx_matches[0]));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_impl.h:842:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			en_drv_version[EFX_DRV_VER_MAX];
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_lic.c:549:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(keyp, &bufferp[offset], length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_lic.c:585:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufferp + offset, keyp, length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_lic.c:1012:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bufferp,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mac.c:445:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old_mulcst_addr_list, epp->ep_mulcst_addr_list,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mac.c:450:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(epp->ep_mulcst_addr_list, addrs,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mac.c:471:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(epp->ep_mulcst_addr_list, old_mulcst_addr_list,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mac.c:992:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(epp->ep_multicst_hash, old_hash, sizeof (old_hash));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:662:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mvp + descp->emmd_value_offset, value, value_size);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:663:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mvp + descp->emmd_mask_offset, mask, mask_size);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:676:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mvp + descp->emmd_value_offset,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:688:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mvp + descp->emmd_mask_offset,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:973:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&spec->ema_vlan_push_descs[n_tags], arg, arg_size);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:1036:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&spec->ema_mark_value, arg, arg_size);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:1065:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&spec->ema_deliver_mport, arg, arg_size);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:1462:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(payload + offset, spec->emms_mask_value_pairs.outer,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mae.c:1818:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(payload + offset, spec->emms_mask_value_pairs.action,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mcdi.c:1151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(versionp, ver.emv_version, sizeof (ver.emv_version));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mcdi.c:1444:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MCDI_IN2(req, char, DRV_ATTACH_IN_V2_DRIVER_VERSION),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mcdi.c:1639:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(encp->enc_phy_name, namep, namelen);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_mcdi.c:2364:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nic.c:508:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(enp->en_drv_version, verp, length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nic.c:789:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(enfip->enfi_mc_fw_version, mc_fw_version,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nic.c:832:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(board_infop, &ver.emv_board_info, sizeof (*board_infop));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nvram.c:587:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nvram.c:672:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(descp, MCDI_OUT2(req, char,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nvram.c:837:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_nvram.c:933:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(MCDI_IN2(req, uint8_t, NVRAM_WRITE_IN_WRITE_BUFFER),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_vpd.c:596:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data + offset, __efx_vpd_blank_pid,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_vpd.c:601:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data + offset, __efx_vpd_blank_r, sizeof (__efx_vpd_blank_r));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/efx_vpd.c:898:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data + dest - evvp->evv_length, evvp->evv_value,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/mcdi_mon.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stat_maskp, stat_mask, sizeof (stat_mask));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_rx.c:319:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idsp,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/rhead_tunnel.c:111:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(MCDI_IN2(req, uint8_t, VNIC_ENCAP_RULE_ADD_IN_DST_IP),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_mac.c:153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(MCDI_IN2(req, uint8_t, SET_MCAST_HASH_IN_HASH0),
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_mcdi.c:139:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)bufferp + pos, &data, chunk);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_nvram.c:557:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(version, temp, sizeof (temp));
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_vpd.c:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(svpd, (caddr_t)scfg + vpd_offset, vpd_length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_vpd.c:248:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, (caddr_t)dcfg + vpd_offset, vpd_length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_vpd.c:410:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(evvp->evv_value,
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_vpd.c:427:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(evvp->evv_value, data + offset, length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/base/siena_vpd.c:538:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((caddr_t)dcfg + vpd_offset, data, vpd_length);
data/dpdk-20.11~rc3/drivers/common/sfc_efx/sfc_efx_mcdi.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[SFC_MCDI_LOG_BUF_SIZE];
data/dpdk-20.11~rc3/drivers/compress/isal/isal_compress_pmd_ops.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/compress/isal/isal_compress_pmd_private.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip.c:107:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)cmdq->sw_head,
data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip.c:123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)cmdq->sw_head,
data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip_pmd.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res_pool[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip_pmd.c:561:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char compressdev_name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/compress/octeontx/otx_zip_pmd.c:607:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char compressdev_name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst_memz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inter_buff_mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c:294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char xform_pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c:393:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char stream_pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c:668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c:669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char capa_memz_name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/compress/qat/qat_comp_pmd.c:744:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(comp_dev->capa_mz->addr, capabilities, capa_size);
data/dpdk-20.11~rc3/drivers/compress/zlib/zlib_pmd_ops.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/compress/zlib/zlib_pmd_private.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_pmd.c:478:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(digest, tmpdigest, s->req_digest_length);
data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_pmd.c:687:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(op->sym->aead.digest.data, qp->temp_digest,
data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_pmd.c:690:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(op->sym->auth.digest.data, qp->temp_digest,
data/dpdk-20.11~rc3/drivers/crypto/aesni_gcm/aesni_gcm_pmd_private.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/aesni_mb_pmd_private.h:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c:271:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->auth.zuc_auth_key, xform->auth.key.data, 16);
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c:612:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->cipher.zuc_cipher_key, xform->cipher.key.data,
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c:752:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->cipher.expanded_aes_keys.encode,
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c:1084:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p_dst + op->sym->auth.data.offset,
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c:1096:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p_dst + cipher_end, p_src + cipher_end,
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c:1613:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(op->sym->auth.digest.data, job->auth_tag_output,
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c:1943:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vec->digest[i].va, dgst[i], len);
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c:859:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c:951:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/armv8/armv8_pmd_private.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/armv8/rte_armv8_pmd.c:291:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->auth.hmac.i_key_pad, partial, SHA1_BLOCK_SIZE);
data/dpdk-20.11~rc3/drivers/crypto/armv8/rte_armv8_pmd.c:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->auth.hmac.o_key_pad, partial, SHA1_BLOCK_SIZE);
data/dpdk-20.11~rc3/drivers/crypto/armv8/rte_armv8_pmd.c:326:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->auth.hmac.i_key_pad, partial, SHA256_BLOCK_SIZE);
data/dpdk-20.11~rc3/drivers/crypto/armv8/rte_armv8_pmd.c:333:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->auth.hmac.o_key_pad, partial, SHA256_BLOCK_SIZE);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:20:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char name[BCMFS_MAX_PATH_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:21:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char suffix[BCMFS_DEV_NAME_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr[BCMFS_MAX_NODES][BCMFS_MAX_PATH_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char top_dirpath[BCMFS_MAX_PATH_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sub_dirpath[BCMFS_MAX_PATH_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_dirpath[BCMFS_MAX_PATH_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:241:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_dirname[BCMFS_MAX_PATH_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[BCMFS_MAX_PATH_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[BCMFS_DEV_NAME_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_qp.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char q_name[16];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_qp.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char memz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_qp.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[BCMFS_HW_OPS_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:623:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len, fsattr_va(auth_key),
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:629:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len, fsattr_va(iv),
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:726:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cipher_buf,
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:729:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cipher_buf + xts_keylen,
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:732:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cipher_buf, fsattr_va(cipher_key),
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:740:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len,
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:848:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len,
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:858:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len,
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:869:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len,
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:882:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)fmd + src_msg_len, fsattr_va(aad), aad_size);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:1041:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iv_buf, fsattr_va(iv), iv_size);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:1047:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_buf, fsattr_va(iv),
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:1078:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len,
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:1089:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)fmd + src_msg_len, iv_buf, iv_size);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_engine.c:1102:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)fmd + src_msg_len, fsattr_va(aad), aad_size);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_pmd.c:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char softreq_pool_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_pmd.c:361:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_sym_session.c:47:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session_key, input_key, keylen);
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c:1566:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->cipher_key.data, xform->cipher.key.data,
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c:1589:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->auth_key.data, xform->auth.key.data,
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c:1615:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->aead_key.data, xform->aead.key.data,
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c:1787:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->cipher_key.data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c:1789:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->auth_key.data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c:1975:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[20];
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr.c:2289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char absolute_file_name[SEC_UIO_MAX_ATTR_FILE_NAME];
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:147:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(absolute_file_name, O_RDONLY);
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uio_sys_root[SEC_UIO_MAX_ATTR_FILE_NAME];
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uio_sys_map_subdir[SEC_UIO_MAX_ATTR_FILE_NAME];
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:273:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uio_map_size_str[32];
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uio_device_file_name[32];
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:391:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	job_ring->uio_fd = open(uio_device_file_name, O_RDWR);
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uio_name[32];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.c:607:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char zero_iv[AES_BLOCK_SIZE] = {0};
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.c:608:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dst[2 * AES_BLOCK_SIZE] = {0};
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.c:609:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char k1[AES_BLOCK_SIZE] = {0};
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.c:610:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char k2[AES_BLOCK_SIZE] = {0};
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.c:1433:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char temp_dst[64];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_crypto.c:1444:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, temp_dst, d_len);
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:623:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:658:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:661:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uio_devname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:727:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	uio_fd = open(uio_devname, O_RDWR | O_NONBLOCK);
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:736:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char devname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:742:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		res_fd = open(devname, O_RDWR);
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:781:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.h:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char memz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:27:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(PROC_MODULES, "r");
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *str[PCI_FMT_NVAL];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:103:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *ptrs[PCI_RESOURCE_FMT_NVAL];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:160:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "r");
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname_uio[PATH_MAX];
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pmd_private.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/ccp/rte_ccp_pmd.c:56:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*i = atoi(value);
data/dpdk-20.11~rc3/drivers/crypto/ccp/rte_ccp_pmd.c:92:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	i = atoi(value);
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:420:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old_icv,	sym_op->aead.digest.data, icv_len);
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:559:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old_icv,	sym_op->aead.digest.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:706:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old_icv,	sym_op->auth.digest.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:850:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old_icv,	sym_op->auth.digest.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:1852:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->cipher_key.data, xform->cipher.key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:1994:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->auth_key.data, xform->auth.key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2217:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->aead_key.data, aead_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2365:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->cipher_key.data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2367:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->auth_key.data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2616:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->aead_key.data, aead_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2695:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->cipher_key.data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2714:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->auth_key.data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2905:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(encap_pdb.gcm.salt,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2953:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ip6_hdr.src_addr,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2955:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ip6_hdr.dst_addr,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:2980:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(decap_pdb.gcm.salt,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:3136:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->cipher_key.data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:3195:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->auth_key.data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:3761:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&qp->rx_vq.ev, event, sizeof(struct rte_event));
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:3847:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[30];
data/dpdk-20.11~rc3/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c:3949:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cryptodev_name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:1224:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->digest, sym->aead.digest.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:1305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->digest, sym->aead.digest.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:1462:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->digest, sym->auth.digest.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:1527:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->digest, sym->auth.digest.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:1964:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[20];
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2024:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->cipher_key.data, xform->cipher.key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2076:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->auth_key.data, xform->auth.key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2160:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->cipher_key.data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2162:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->auth_key.data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2243:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->aead_key.data, xform->aead.key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2510:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session->aead_key.data, aead_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2534:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(session->encap_pdb.gcm.salt,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2537:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(session->decap_pdb.gcm.salt,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2568:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->cipher_key.data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2587:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->auth_key.data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2781:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&session->ip6_hdr.src_addr,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2783:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&session->ip6_hdr.dst_addr,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2911:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->cipher_key.data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:2963:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->auth_key.data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:3262:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&qp->outq.ev, event, sizeof(struct rte_event));
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.c:3426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cryptodev_name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/dpaa_sec/dpaa_sec.h:197:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char inq_attach[RTE_DPAA_MAX_RX_QUEUE];
data/dpdk-20.11~rc3/drivers/crypto/kasumi/kasumi_pmd_private.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd.c:267:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cipher_key, cipher_xform->cipher.key.data,
data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd.c:317:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(auth_key, auth_xform->auth.key.data,
data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd.c:379:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(aead_key, aead_xform->aead.key.data,
data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd.c:858:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*i = atoi(value);
data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd_ops.c:639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_qp.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_qp.h:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&qp->cmdq.ring[head * qp->cmdq.instr_size],
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c:403:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fctx->crypto.key, xform->key.data, xform->key.length);
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c:478:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fctx->auth.opad, xform->key.data, xform->key.length);
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c:518:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fctx->crypto.key, xform->key.data, xform->key.length);
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c:520:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fctx->auth.opad, xform->key.data, xform->key.length);
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c:748:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_reqmgr.c:680:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->salt, addr, AES_GCM_SALT_SIZE);
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_reqmgr.c:681:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->fctx.crypto.iv, addr, AES_GCM_SALT_SIZE);
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym_reqmgr.c:833:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char softreq_pool_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/null/null_crypto_pmd_private.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_hw_access.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mempool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_hw_access.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[32];
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:670:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->cipher.data, req->rptr, rsa->cipher.length);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:683:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->message.data, req->rptr, rsa->message.length);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:687:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->sign.data, req->rptr, rsa->sign.length);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:700:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->sign.data, req->rptr, rsa->sign.length);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:727:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecdsa->r.data, req->rptr, prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:728:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecdsa->s.data, req->rptr + ROUNDUP8(prime_len), prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:740:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecpm->r.x.data, req->rptr, prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:741:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecpm->r.y.data, req->rptr + ROUNDUP8(prime_len), prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:762:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(op->modex.result.data, req->rptr,
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_ops.c:937:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[32];
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_capabilities.c:811:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&otx2_cpt_caps[cur_pos], caps, nb_caps * sizeof(caps[0]));
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_capabilities.c:844:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&otx2_cpt_sec_caps[cur_pos], caps, nb_caps * sizeof(caps[0]));
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_mbox.c:39:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw_caps, rsp->eng_caps,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mempool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:456:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lmtline, &inst, sizeof(inst));
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:502:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lmtline, &inst, sizeof(inst));
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:763:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->cipher.data, req->rptr, rsa->cipher.length);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:768:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rsa->message.data, req->rptr,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:778:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rsa->message.data, req->rptr + 2,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:784:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rsa->sign.data, req->rptr, rsa->sign.length);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:789:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rsa->sign.data, req->rptr, rsa->sign.length);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:798:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rsa->sign.data, req->rptr + 2,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:825:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecdsa->r.data, req->rptr, prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:826:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecdsa->s.data, req->rptr + ROUNDUP8(prime_len), prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:838:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecpm->r.x.data, req->rptr, prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:839:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ecpm->r.y.data, req->rptr + ROUNDUP8(prime_len), prime_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_ops.c:860:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(op->modex.result.data, req->rptr,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:241:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sa->iv.gcm.nonce, &ipsec->salt, 4);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:260:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ip->src_addr, &ipsec->tunnel.ipv4.src_ip,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:262:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ip->dst_addr, &ipsec->tunnel.ipv4.dst_ip,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:278:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ip6->src_addr, &ipsec->tunnel.ipv6.src_addr,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:280:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ip6->dst_addr, &ipsec->tunnel.ipv6.dst_addr,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sa->cipher_key, cipher_key, cipher_key_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:379:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sa->iv.gcm.nonce, &ipsec->salt, 4);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_cryptodev_sec.c:398:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sa->cipher_key, cipher_key, cipher_key_len);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_po_ops.h:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, data + hdr_len, RTE_ETHER_HDR_LEN);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_po_ops.h:111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&hdr->iv[0], &sa->iv.gcm.nonce, 4);
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_po_ops.h:112:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&hdr->iv[4], rte_crypto_op_ctod_offset(cop, uint8_t *,
data/dpdk-20.11~rc3/drivers/crypto/octeontx2/otx2_ipsec_po_ops.h:115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&hdr->iv[0], rte_crypto_op_ctod_offset(cop, uint8_t *,
data/dpdk-20.11~rc3/drivers/crypto/openssl/openssl_pmd_private.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:97:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(session_key, input_key, keylen);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:109:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key_ede, key, 24);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key_ede, key, 16);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key_ede + 16, key, 8);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:118:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key_ede, key, 8);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key_ede + 8, key, 8);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:120:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key_ede + 16, key, 8);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:1027:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctr, iv, 8);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:1601:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(auth_dst, dst, sess->auth.digest_length);
data/dpdk-20.11~rc3/drivers/crypto/openssl/rte_openssl_pmd.c:2054:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p_dst + op->sym->auth.data.offset,
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym_pmd.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym_pmd.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char capa_memz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_asym_pmd.c:324:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(internals->capa_mz->addr, qat_gen1_asym_capabilities,
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym.c:403:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(aad_data	+ ctx->cipher_iv.length +
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym.c:409:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(aad_data	+ ctx->cipher_iv.length +
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_hw_dp.c:156:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(aad_data	+ ctx->cipher_iv.length +
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_hw_dp.c:162:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(aad_data	+ ctx->cipher_iv.length +
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_pmd.c:326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_pmd.c:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char capa_memz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_pmd.c:451:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(internals->capa_mz->addr, capabilities, capa_size);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1624:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cipher->key, cipherkey, cipherkeylen);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1625:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp_key, cipherkey, cipherkeylen);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1635:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cipher->key, cipherkey, cipherkeylen);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1645:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cdesc->cd_cur_ptr, cipherkey, padding_size);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1649:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cdesc->cd_cur_ptr, cipherkey,
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1651:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cdesc->cd_cur_ptr+cipherkeylen,
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1902:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cipherconfig->key, authkey, authkeylen);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1920:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cdesc->cd_cur_ptr + state1_size, authkey, authkeylen);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1962:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cdesc->cd_cur_ptr + state1_size, authkey, authkeylen);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1977:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cdesc->cd_cur_ptr + state1_size, authkey, authkeylen);
data/dpdk-20.11~rc3/drivers/crypto/qat/qat_sym_session.c:1979:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pTempKey, authkey, authkeylen);
data/dpdk-20.11~rc3/drivers/crypto/scheduler/rte_cryptodev_scheduler.c:261:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&sched_ctx->workers[i], &sched_ctx->workers[i+1],
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_multicore.c:345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char r_name[16];
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mode_param_str[RTE_CRYPTODEV_SCHEDULER_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char worker_names[RTE_CRYPTODEV_SCHEDULER_MAX_NB_WORKERS]
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char param_name[RTE_CRYPTODEV_SCHEDULER_NAME_MAX_LEN] = {0};
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char param_val[RTE_CRYPTODEV_SCHEDULER_NAME_MAX_LEN] = {0};
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:270:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*i = atoi(value);
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd_ops.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char order_ring_name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd_ops.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd_private.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_SCHEDULER_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd_private.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char description[RTE_CRYPTODEV_SCHEDULER_DESC_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd_private.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *init_worker_names[RTE_CRYPTODEV_SCHEDULER_MAX_NB_WORKERS];
data/dpdk-20.11~rc3/drivers/crypto/snow3g/snow3g_pmd_private.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(virt_addr_started, ctrl, len_ctrl_req);
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:163:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)virt_addr_started + len_total,
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uint8_t *)virt_addr_started + len_total,
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vq_name[VIRTQUEUE_MAX_NAME_SZ];
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mpool_name[MPOOL_MAX_NAME_SZ];
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:1244:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cipher_key_data, cipher_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:1270:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(auth_key_data, auth_xform->key.data,
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:1441:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:1458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cryptodev_name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/crypto/zuc/rte_zuc_pmd.c:96:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->pKey_cipher, cipher_xform->cipher.key.data,
data/dpdk-20.11~rc3/drivers/crypto/zuc/rte_zuc_pmd.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sess->pKey_hash, auth_xform->auth.key.data,
data/dpdk-20.11~rc3/drivers/crypto/zuc/zuc_pmd_private.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/event/dlb/dlb.c:912:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/dlb/dlb.c:1102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/dlb/pf/dlb_pf.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2.c:1095:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/dlb2/dlb2.c:1267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/dlb2/pf/dlb2_pf.c:235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_eventdev.c:548:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char event_port_name[32];
data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_eventdev.c:555:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(event_port_name, "event-port-%d", port_id);
data/dpdk-20.11~rc3/drivers/event/dpaa2/dpaa2_eventdev.c:600:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&dpaa2_portal->evq_info[queues[i]], evq_info,
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_evdev.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_event.c:207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg.qfs, qfs, sizeof(struct dsw_queue_flow) * qfs_len);
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_sort.h:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[_elem_size];					\
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_sort.h:20:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, _a_ptr, _elem_size);			\
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_sort.h:21:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(_a_ptr, _b_ptr, _elem_size);			\
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_sort.h:22:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(_b_ptr, tmp, _elem_size);			\
data/dpdk-20.11~rc3/drivers/event/dsw/dsw_xstats.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char xstats_name[RTE_EVENT_DEV_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/event/octeontx/ssovf_evdev.c:717:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*flag = !!atoi(value);
data/dpdk-20.11~rc3/drivers/event/octeontx/timvf_evdev.c:235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[25];
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.c:938:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.c:1452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&temp_ws, &ws->ws_state[0],
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.c:1624:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*val = atoi(tok);
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.h:251:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*(uint8_t *)opaque = !!atoi(value);
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.h:260:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*(uint32_t *)opaque = (uint32_t)atoi(value);
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_stats.h:11:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char name[RTE_EVENT_DEV_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_tim_evdev.c:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[25];
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_tim_evdev.c:598:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*val = atoi(tok);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c:405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char queue_id[64];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c:406:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char total_cyc[64];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c:581:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*socket_id = atoi(value);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c:591:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*do_val = atoi(value);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c:602:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*do_test = atoi(value);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c:731:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opdl->service_name, name, str_len);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.h:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char service_name[OPDL_PMD_NAME_MAX];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev_init.c:552:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _pad1[RTE_CACHE_LINE_SIZE * 3];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _pad2[RTE_CACHE_LINE_SIZE * 3];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _pad3[RTE_CACHE_LINE_SIZE * 2];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[OPDL_NAME_SIZE];  /* OPDL queue instance name */
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:519:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(entries_offset, get_slots, t->slot_size);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:539:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(entries_offset, ev, t->slot_size);
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:578:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entries_offset, get_slot(t, s->head + offset),
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:899:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:1227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_ring.c:1254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_test.c:72:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)((uintptr_t)m->buf_addr + m->data_off),
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IQ_ROB_NAMESIZE];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:882:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*socket_id = atoi(value);
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:892:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*quanta = atoi(value);
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:902:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*credit = atoi(value);
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:912:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*deq_burst_sz = atoi(value);
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:922:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*min_burst_sz = atoi(value);
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.c:932:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*refill_once_per_call = atoi(value);
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev.h:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char service_name[SW_PMD_NAME_MAX];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_selftest.c:79:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)((uintptr_t)m->buf_addr + m->data_off),
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_selftest.c:329:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_selftest.c:344:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_selftest.c:2784:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rx_port_used_stat[64];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_selftest.c:2785:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rx_port_free_stat[64];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_selftest.c:2786:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char other_port_used_stat[64];
data/dpdk-20.11~rc3/drivers/event/sw/sw_evdev_worker.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_evs, events, n * sizeof(events[0]));
data/dpdk-20.11~rc3/drivers/mempool/bucket/rte_mempool_bucket.c:411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rg_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/mempool/bucket/rte_mempool_bucket.c:459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rg_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool.c:169:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	val = atoi(value);
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool.c:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[OTX2_NPA_DEV_NAME_LEN];
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool.c:383:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[OTX2_NPA_DEV_NAME_LEN];
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool_ops.c:563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool_ops.c:665:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/mempool/octeontx2/otx2_mempool_ops.c:765:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&aura, mp->pool_config, sizeof(struct npa_aura_s));
data/dpdk-20.11~rc3/drivers/mempool/ring/rte_mempool_ring.c:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rg_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/mempool/stack/rte_mempool_stack.c:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_STACK_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rte_pktmbuf_mtod(mbuf, void *), pbuf, rte_pktmbuf_data_len(mbuf));
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:226:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pbuf, rte_pktmbuf_mtod(tmp_mbuf, void*), data_len);
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:511:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ifr.ifr_hwaddr.sa_data, addr, sizeof(*addr));
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:685:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ifr.ifr_name, pair->value, ifnamelen);
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:706:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(*internals)->eth_addr, ifr.ifr_hwaddr.sa_data, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:920:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			qpairs = atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:930:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			blocksize = atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:940:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			framesize = atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:950:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			framecount = atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:960:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			qdisc_bypass = atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char if_name[IFNAMSIZ];
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prog_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:1005:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:1006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:1590:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char if_name[IFNAMSIZ] = {'\0'};
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:1594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prog_path[PATH_MAX] = {'\0'};
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:401:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:961:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *file = fopen(value, "r");
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[ARK_MAX_ARG_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_global.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkt_gen_args[ARK_MAX_ARG_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_global.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkt_chkr_args[ARK_MAX_ARG_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_mpu.h:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char id[4];
data/dpdk-20.11~rc3/drivers/net/ark/ark_mpu.h:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ver[4];
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktchkr.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char STR[ARK_MAX_STR_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktchkr.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opt[ARK_MAX_STR_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktchkr.c:345:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			o->v.INT = atoi(val);
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktgen.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char STR[ARK_MAX_STR_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktgen.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opt[ARK_MAX_STR_LEN];
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktgen.c:327:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			o->v.INT = atoi(val);
data/dpdk-20.11~rc3/drivers/net/ark/ark_rqp.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eval[4];
data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c:886:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uint8_t *)&cfg->aq_macsec.txsc.mac + 2, mac,
data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c:899:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uint8_t *)&cfg->aq_macsec.rxsc.mac + 2, mac,
data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c:917:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cfg->aq_macsec.txsa.key, key, 16);
data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c:932:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cfg->aq_macsec.rxsa.key, key, 16);
data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c:1868:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cfg->aq_rss.hash_secret_key, rss_conf->rss_key,
data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c:1872:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cfg->aq_rss.hash_secret_key, def_rss_key,
data/dpdk-20.11~rc3/drivers/net/atlantic/atl_ethdev.c:1892:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, cfg->aq_rss.hash_secret_key,
data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_utils.c:793:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&self->last_stats, &mbox.stats, sizeof(mbox.stats));
data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_utils_fw2x.c:369:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cfg->mac_addr, mac, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/atlantic/hw_atl/hw_atl_utils_fw2x.c:408:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg->hw_addr, mac, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/avp/avp_ethdev.c:867:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&avp->ethaddr.addr_bytes[0],
data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_common.h:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[RTE_AVP_NAMESIZE];	/**< Network device name for AVP */
data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_common.h:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ethaddr[ETH_ALEN];
data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_common.h:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ethaddr[RTE_ETHER_ADDR_LEN];
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_ethdev.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char vendor[AXGBE_SFP_BASE_VENDOR_NAME_LEN + 1];
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c:156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char partno[AXGBE_SFP_BASE_VENDOR_PN_LEN + 1];
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char rev[AXGBE_SFP_BASE_VENDOR_REV_LEN + 1];
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char serno[AXGBE_SFP_BASE_VENDOR_SN_LEN + 1];
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c:718:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&phy_data->sfp_eeprom, &sfp_eeprom, sizeof(sfp_eeprom));
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:40:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char version[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:2426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cdu_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:8902:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:9662:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = open(fwname, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:11803:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char flag_str[BNX2X_INFO_STR_MAX];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:11812:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char unknown[BNX2X_INFO_STR_MAX];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                    msg[RTE_MEMZONE_NAMESIZE - 6];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:431:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pad[1024];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:728:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		phy_mtx_name[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:813:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:966:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bc_ver_str[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:1124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_ver_str[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:1125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mf_mode_str[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:1126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pci_link_str[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:1148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_addr_str[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:1288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			fw_ver[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.h:1408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[1]; /* holds names of desc.num stats, each desc.len in length */
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_ethdev.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_ethdev.c:388:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sc->mc_addrs, mc_addrs, mc_addrs_num * sizeof(*mc_addrs));
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_vfpf.c:210:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sc_resp, resp, sizeof(sc->acquire_resp));
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_vfpf.c:738:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(query->multicast[i], mc_addrs[i].addr_bytes, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_vfpf.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_ver[32];
data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_init.h:604:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[8];		/* Block's longest name is 7 characters long
data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_mfw_req.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[ETH_STAT_INFO_VERSION_LEN];
data/dpdk-20.11~rc3/drivers/net/bnx2x/elink.c:9243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vendor_name[ELINK_SFP_EEPROM_VENDOR_NAME_SIZE + 1];
data/dpdk-20.11~rc3/drivers/net/bnx2x/elink.c:9244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vendor_pn[ELINK_SFP_EEPROM_PART_NO_SIZE + 1];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:589:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:1534:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(filter->l2_addr, mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:1915:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&eth_dev->data->dev_conf.rx_adv_conf.rss_conf,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:1938:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vnic->rss_hash_key, rss_conf->rss_key, rss_conf->rss_key_len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:1962:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rss_conf->rss_key, vnic->rss_hash_key, len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:2586:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bp->mac_addr, addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:2623:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vnic->mc_list + off, &mc_addr_list[i],
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:4062:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:4278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:4397:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&eth_dev->data->mac_addrs[0], bp->mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ethdev.c:5517:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_filter.c:40:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(filter->l2_addr, bp->mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_flow.c:802:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(filter1, nf, sizeof(*filter1));
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_flow.c:819:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(filter1->l2_addr, nf->src_macaddr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_flow.c:822:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(filter1->l2_addr, nf->dst_macaddr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_flow.c:992:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(filter->l2_addr, filter1->l2_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_flow.c:1379:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vnic->rss_hash_key,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_flow.c:1383:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vnic->rss_hash_key,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(short_cmd_req, req, msg_len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:288:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(resp_msg, resp, resp_len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:323:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req.tf_req, msg, msg_len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:336:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(response,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:544:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req.l2_addr, filter->l2_addr,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:548:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req.l2_addr_mask, filter->l2_addr_mask,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:757:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bp->mac_addr, &resp->mac_address, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:1080:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:2377:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(func_qstats, resp,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:2652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:3236:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bp->parent->mac_addr, resp->mac_address, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4065:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req.encap_request, encaped, ec_size);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4089:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mac->addr_bytes, resp->mac_address, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4109:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req.encap_request, encaped, ec_size);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4219:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bp->leds, &resp->led0_id,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4332:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, buf, len > buflen ? buflen : len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4368:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, buf, length);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, data, data_len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4641:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req.src_macaddr, filter->src_macaddr,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4645:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req.dst_macaddr, filter->dst_macaddr,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:4742:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req.src_macaddr, filter->src_macaddr,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_hwrm.c:5338:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req.dflt_mac_addr, bp->mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_irq.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[RTE_ETH_NAME_MAX_LEN + 2];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_ring.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_rxq.c:191:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vnic->rss_hash_key,
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_stats.c:789:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_stats.c:791:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buf, "flow_%d_bytes", i);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_stats.c:796:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buf, "flow_%d_packets", i);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_stats.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_vnic.c:27:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dest, &rb, 8);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_vnic.c:31:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dest, &rb, len);
data/dpdk-20.11~rc3/drivers/net/bnxt/bnxt_vnic.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_p4.c:249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uint8_t *)(uintptr_t)op->hw.base_addr +
data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_p4.c:262:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key_obj->data,
data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_p4.c:279:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&table_entry,
data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_p4.c:290:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uint8_t *)(uintptr_t)op->hw.base_addr +
data/dpdk-20.11~rc3/drivers/net/bnxt/hcapi/hcapi_cfa_p4.c:307:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&table_entry,
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:1292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	hwrm_fw_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:1297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	mgmt_fw_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:1302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	netctrl_fw_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:1304:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	active_pkg_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:1309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	roce_fw_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:18863:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	phy_vendor_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:18870:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	phy_vendor_partnumber[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid0_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid1_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid2_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid3_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid4_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid5_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid6_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:24196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	qid7_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:37669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:37729:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:37795:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	vf_pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:37828:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:37942:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:38036:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:38135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:38197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pair_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:38253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	vfr_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:38317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	vfr_name[32];
data/dpdk-20.11~rc3/drivers/net/bnxt/hsi_struct_def_dpdk.h:45171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pkg_name[16];
data/dpdk-20.11~rc3/drivers/net/bnxt/rte_pmd_bnxt.c:799:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(filter->l2_addr, addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_core.h:514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctrl_chan_name[TF_SESSION_NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_core.h:625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctrl_chan_name[TF_SESSION_NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_core.h:639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char attach_chan_name[TF_SESSION_NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_em_common.c:287:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key_entry->key, in_key, TF_HW_EM_KEY_MAX_SIZE + 4);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_rm.c:878:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(parms->info,
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_session.h:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctrl_chan_name[TF_SESSION_NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tbl.c:451:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sk_entry->key, parms->data, len);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tcam.c:213:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(result,
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tcam.c:469:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sk_entry->key, tkey, klen);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tcam.c:470:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sk_entry->mask, parms->mask, klen);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_core/tf_shadow_tcam.c:740:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sr_entry->result, sparms->result, sparms->result_size);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_def_rules.c:153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&act_prop->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_VTAG],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_mapper.c:869:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&val_size, &parms->act_prop->act_details[size_idx],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:67:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(field->spec, buffer, field->size);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:81:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(field->mask, buffer, size);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:394:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr_field->spec, &svif, sizeof(svif));
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:395:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr_field->mask, &mask, sizeof(mask));
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:592:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr_field->spec, &svif, sizeof(svif));
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:593:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr_field->mask, &mask, sizeof(mask));
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1456:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&param->act_prop.act_details[BNXT_ULP_ACT_PROP_IDX_MARK],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1561:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_VTAG +
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1572:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_VTAG_NUM],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1576:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_VTAG_SZ],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1631:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_IP_SZ],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1636:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_L3_TYPE],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1692:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_IP_SZ],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1697:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_L3_TYPE],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1731:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&vxlan_spec, item->spec, vxlan_size);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1745:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ap->act_details[BNXT_ULP_ACT_PROP_IDX_ENCAP_TUN_SZ],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1794:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act_prop->act_details[BNXT_ULP_ACT_PROP_IDX_COUNT],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1825:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_VPORT],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1842:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_VNIC],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:1997:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&prm->act_prop.act_details[BNXT_ULP_ACT_PROP_IDX_VPORT],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:2034:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_PUSH_VLAN],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:2057:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_SET_VLAN_VID],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:2080:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_SET_VLAN_PCP],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:2101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_SET_IPV4_SRC],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:2122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_SET_IPV4_DST],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:2143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_SET_TP_SRC],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c:2165:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&act->act_details[BNXT_ULP_ACT_PROP_IDX_SET_TP_DST],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.c:53:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tun_entry->t_dmac,
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tun_entry->t_dst_ip,
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.c:100:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&params->hdr_field[ULP_TUN_O_DMAC_HDR_FIELD_INDEX],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.c:164:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&flow_info->first_inner_tun_params, params,
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.c:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tun_entry->t_dst_ip,
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_tun.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&params->hdr_field[ULP_TUN_O_DMAC_HDR_FIELD_INDEX],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_utils.c:315:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(local_data, &blob->data[ULP_BITS_2_BYTE_NR(offset)],
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_utils.c:333:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&blob->data[ULP_BITS_2_BYTE_NR(offset + datalen)], local_data,
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_utils.c:752:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val, operand, bytes);
data/dpdk-20.11~rc3/drivers/net/bnxt/tf_ulp/ulp_utils.c:786:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dst[idx],
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char a_address[18];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p_address[18];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char a_state[256] = { 0 };
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p_state[256] = { 0 };
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&port->partner, &lacp->actor.port_params,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:368:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&port->partner, &port->partner_admin,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:604:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hdr->lacpdu.actor.port_params, &port->actor,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:614:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&lacpdu->partner.port_params, &port->partner,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:1018:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:1030:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port->actor, &initial, sizeof(struct port_params));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:1035:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port->partner, &initial, sizeof(struct port_params));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_8023ad.c:1036:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port->partner_admin, &initial, sizeof(struct port_params));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_alb.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_alb.c:120:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(client_info->vlan, eth_h + 1, offset);
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_alb.c:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(client_info->vlan, eth_h + 1, offset);
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_alb.c:192:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(client_info->vlan, eth_h + 1, offset);
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_alb.c:227:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth_h + 1, client_info->vlan,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_api.c:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devargs[52];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_api.c:297:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rxconf_i, &di->default_rxconf, sizeof(*rxconf_i));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_api.c:325:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(txconf_i, &di->default_txconf, sizeof(*txconf_i));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_api.c:414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bond_desc_lim, slave_desc_lim, sizeof(*bond_desc_lim));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_api.c:854:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(slaves, internals->active_slaves,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:303:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(slaves, internals->active_slaves,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:499:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst_ip[16];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:500:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ArpOp[24];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:503:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src_ip[16];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:590:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(slaves, internals->active_slaves,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:618:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&bufs[nb_pkts - tx_fail_total],
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:930:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(slaves, internals->tlb_slaves_order,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:1176:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&bufs[nb_bufs - total_tx_fail_count],
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:1205:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(slave_port_ids, internals->active_slaves,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:1234:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(slave_port_ids, internals->active_slaves,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:1317:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(slaves, internals->active_slaves,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:1441:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mac_addr, new_mac_addr, sizeof(*mac_addr));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:1632:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mem_name[256];
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:1910:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(slave_details->persisted_mac_addr), slave_eth_dev->data->mac_addrs,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:2286:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(bd_rx_q->rx_conf), rx_conf, sizeof(struct rte_eth_rxconf));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:2310:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(bd_tx_q->tx_conf), tx_conf, sizeof(bd_tx_q->tx_conf));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:2977:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&internals->reta_conf[i], &internals->reta_conf[0],
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:3019:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&bond_rss_conf, rss_conf, sizeof(struct rte_eth_rss_conf));
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:3031:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(internals->rss_key, bond_rss_conf.rss_key,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:3054:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, internals->rss_key, internals->rss_key_len);
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:3497:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(internals->rss_key,
data/dpdk-20.11~rc3/drivers/net/bonding/rte_eth_bond_pmd.c:3502:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(internals->rss_key, default_rss_key,
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:339:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, (const __be64 *)cmd, size);
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:2652:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char hdr_arr[16];      /* must start with 0x55aa */
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:2653:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char hdr_ver[4];       /* Expansion ROM version */
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4045:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mac, c.mac, sizeof(c.mac));
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4048:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mac + 24, c.nmac3, sizeof(c.nmac3));
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4051:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mac + 18, c.nmac2, sizeof(c.nmac2));
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4054:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mac + 12, c.nmac1, sizeof(c.nmac1));
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4057:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mac + 6,  c.nmac0, sizeof(c.nmac0));
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4216:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((u8 *)&p->data1[0] + 2, addr, ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4217:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((u8 *)&p->data1m[0] + 2, mask, ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4273:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((u8 *)&p->data1[0] + 2, addr, ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:4274:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((u8 *)&p->data1m[0] + 2, mask, ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4_hw.c:5653:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char byte[4];
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4vf_hw.c:237:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(rpl, cmd_rpl, size);
data/dpdk-20.11~rc3/drivers/net/cxgbe/base/t4vf_hw.c:677:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fwsp, &rpl.u.ctl.stat0, sizeof(__be64) * nstats);
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_ethdev.c:870:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, rss_conf->rss_key, CXGBE_DEFAULT_RSS_KEY_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_ethdev.c:927:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, mod_key, CXGBE_DEFAULT_RSS_KEY_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_ethdev.c:1228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_ethdev.c:1246:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char namei[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:20:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(fs)->val.elem, &(__v), sizeof(__v)); \
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:21:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(fs)->mask.elem, &(__m), sizeof(__m)); \
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:737:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fs->nat_fip, &ipv4->ipv4_addr, sizeof(ipv4->ipv4_addr));
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:750:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fs->nat_lip, &ipv4->ipv4_addr, sizeof(ipv4->ipv4_addr));
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:763:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fs->nat_fip, ipv6->ipv6_addr, sizeof(ipv6->ipv6_addr));
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:776:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fs->nat_lip, ipv6->ipv6_addr, sizeof(ipv6->ipv6_addr));
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:1050:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char repeat[ARRAY_SIZE(parseitem)] = {0};
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[80];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:718:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			bufp += sprintf(bufp, "100M/");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:720:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			bufp += sprintf(bufp, "1G/");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:722:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			bufp += sprintf(bufp, "10G/");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:724:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			bufp += sprintf(bufp, "25G/");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:726:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			bufp += sprintf(bufp, "40G/");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:728:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			bufp += sprintf(bufp, "50G/");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:730:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			bufp += sprintf(bufp, "100G/");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:1127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char config_name[20];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:1151:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(config_name, "On Flash");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:1195:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(config_name, "Firmware Default");
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:2092:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbevf_ethdev.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbevf_ethdev.c:130:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char namei[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbevf_main.c:205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/cxgbe/mps_tcam.c:98:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entry->eth_addr, eth_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/mps_tcam.c:99:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entry->mask, mask, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/mps_tcam.c:142:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entry->eth_addr, addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/cxgbe/sge.c:660:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sgl->sge, buf, part0);
data/dpdk-20.11~rc3/drivers/net/cxgbe/sge.c:864:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)vmwr->ethmacdst, (void *)q->coalesce.ethmacdst,
data/dpdk-20.11~rc3/drivers/net/cxgbe/sge.c:976:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)q->coalesce.ethmacdst,
data/dpdk-20.11~rc3/drivers/net/cxgbe/sge.c:1198:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)vmwr->ethmacdst, rte_pktmbuf_mtod(m, void *),
data/dpdk-20.11~rc3/drivers/net/cxgbe/sge.c:1451:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name_sw[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:524:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	svr_file = fopen(DPAA_SOC_ID_FILE, "r");
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:1188:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rxq->ev, &queue_conf->ev, sizeof(struct rte_event));
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:1927:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		td_tx_threshold = atoi(getenv("DPAA_TX_TAILDROP_THRESHOLD"));
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:2184:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					atoi(getenv("DPAA_PUSH_QUEUES_NUMBER"));
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_flow.c:123:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fp = fopen(fm_log, "wb");
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_flow.c:142:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fp = fopen(fm_log, "rb");
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cctree_name[FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pcd_name[FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reasm_name[FMC_MANIP_MAX][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char frag_name[FMC_MANIP_MAX][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr_name[FMC_HMANIP_MAX][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char scheme_name[FMC_SCHEMES_NUM][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ccnode_name[FMC_CC_NODES_NUM][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:146:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ccmask[FMC_CC_NODES_NUM][FM_PCD_MAX_NUM_OF_KEYS]
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:152:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ccentry_frag[FMC_CC_NODES_NUM][FM_PCD_MAX_NUM_OF_KEYS];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:156:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ccmiss_frag[FMC_CC_NODES_NUM];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char htnode_name[FMC_CC_NODES_NUM][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:174:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char htentry_frag[FMC_CC_NODES_NUM][FM_PCD_MAX_NUM_OF_KEYS];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:179:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char htmiss_frag[FMC_CC_NODES_NUM];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char replicator_name[FMC_REPLICATORS_NUM][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:189:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char repentry_frag[FMC_REPLICATORS_NUM][FM_PCD_MAX_REPS];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char policer_name[FMC_PLC_NUM][FMC_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_fmc.c:392:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *fp = fopen(FMC_FILE, "rb");
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[20];
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:55:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev_name, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[20];
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:130:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev_name, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[30];
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:385:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev_name, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_vsp.c:31:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&params.params, p_params, sizeof(t_fm_port_vspalloc_params));
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_vsp.c:53:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&param, p_fm_vsp_params, sizeof(t_fm_vsp_params));
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_vsp.c:136:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&params.fm_buffer_prefix_content,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c:2231:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dpaa2_ethq->ev, &queue_conf->ev, sizeof(struct rte_event));
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c:2436:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&prime_mac, &phy_mac,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_ethdev.c:2452:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mac_entry, &prime_mac, sizeof(struct rte_ether_addr));
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:163:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "eth");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:165:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".dst");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:167:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".src");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:169:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".type");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:171:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:173:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "vlan");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:175:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".tci");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:177:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:179:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "ip");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:181:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".src");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:183:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".dst");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:185:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".proto");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:187:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:189:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "tcp");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:191:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".src");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:193:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".dst");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:195:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:197:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "udp");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:199:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".src");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:201:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".dst");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:203:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:205:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "icmp");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:207:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".type");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:209:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".code");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:211:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:213:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "sctp");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:215:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".src");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:217:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".dst");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:219:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:221:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "gre");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:223:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".type");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:225:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(string, ".unknown field");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:227:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string, "unknown protocol");
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[32];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[32];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:647:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)key_iova, (const void *)(&eth_type),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:650:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)mask_iova, (const void *)(&eth_type),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:654:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)key_iova, (const void *)(&ip_proto),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:657:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)mask_iova, (const void *)(&ip_proto),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:674:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)key_iova, (const void *)(&eth_type),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:677:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)mask_iova, (const void *)(&eth_type),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:681:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)key_iova, (const void *)(&ip_proto),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:684:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)mask_iova, (const void *)(&ip_proto),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:707:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)(size_t)(rule->key_iova + offset), key, size);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:708:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)(size_t)(rule->mask_iova + offset), mask, size);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:719:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)(size_t)(rule->key_iova + offset), key, size);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:720:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)(size_t)(rule->mask_iova + offset), mask, size);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:737:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[NH_FLD_IPV6_ADDR_SIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:763:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, (char *)key_src, len);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:765:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)key_dst, tmp, len);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:767:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, (char *)mask_src, len);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:769:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)mask_dst, tmp, len);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:861:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mask[64];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:906:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mask, mask_support, size);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:934:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char zero_cmp[RTE_ETHER_ADDR_LEN] = {0};
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:1421:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char zero_cmp[NH_FLD_IPV6_ADDR_SIZE] = {0};
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:2960:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipsrc_key[NH_FLD_IPV6_ADDR_SIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:2961:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipdst_key[NH_FLD_IPV6_ADDR_SIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:2962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipsrc_mask[NH_FLD_IPV6_ADDR_SIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:2963:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipdst_mask[NH_FLD_IPV6_ADDR_SIZE];
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3026:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipsrc_key,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3034:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipsrc_mask,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3058:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipdst_key,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3066:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipdst_mask,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3080:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->qos_rule.key_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3084:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->qos_rule.mask_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3092:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->qos_rule.key_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3096:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->qos_rule.mask_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3146:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipsrc_key,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3154:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipsrc_mask,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3176:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipdst_key,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3184:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipdst_mask,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3196:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->fs_rule.key_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3200:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->fs_rule.mask_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3206:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->fs_rule.key_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3210:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)(size_t)curr->fs_rule.mask_iova +
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3627:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&flow->action_cfg, &action,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_flow.c:3913:4:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			atoi(getenv("DPAA2_FLOW_CONTROL_MISS_FLOW"));
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_mux.c:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key_iova, (const void *)(&spec->hdr.next_proto_id),
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_mux.c:112:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mask_iova, pattern[0]->mask, sizeof(uint8_t));
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_mux.c:130:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)key_iova, (const void *)&udp_dst_port,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_mux.c:132:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mask_iova, pattern[0]->mask, sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_mux.c:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)key_iova, (const void *)&eth_type,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_mux.c:152:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mask_iova, pattern[0]->mask, sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_rxtx.c:487:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)m->buf_addr + mbuf->data_off,
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_sparser.c:172:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, sp_param.byte_code, sp_param.size);
data/dpdk-20.11~rc3/drivers/net/dpaa2/dpaa2_sparser.c:221:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(param_addr, sp_param.param_array, cfg.param_size);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1009:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(pba->pba_block,
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1067:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&eeprom_buf[pba->word[1]],
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.c:265:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(hw->mac.perm_addr, addr, 6);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.c:307:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg_addr, addr, 6);
data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c:432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c:3997:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(flex_filter->filter_info.dwords, filter->bytes, filter->len);
data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c:5119:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(info->data, (u8 *)dataword + (info->offset & 1), info->length);
data/dpdk-20.11~rc3/drivers/net/e1000/igb_pf.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char vf_mac_addr[RTE_ETHER_ADDR_LEN];
data/dpdk-20.11~rc3/drivers/net/e1000/igb_pf.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vfinfo[vfn].vf_mac_addresses, vf_mac_addr,
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:2883:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		.key = memcpy(out->key, in->key, in->key_len),
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:2884:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		.queue = memcpy(out->queue, in->queue,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:245:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&admin_queue->sq.entries[tail_masked], cmd, cmd_size_in_bytes);
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:464:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(comp_ctx->user_cqe, (void *)cqe, comp_ctx->comp_size);
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:1962:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&get_feat_ctx->dev_attr, &get_resp.u.dev_attr,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:1976:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&get_feat_ctx->max_queue_ext, &get_resp.u.max_queue_ext,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:1983:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&get_feat_ctx->max_queues, &get_resp.u.max_queue,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:1997:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&get_feat_ctx->aenq, &get_resp.u.aenq,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2005:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&get_feat_ctx->offload, &get_resp.u.offload,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2014:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&get_feat_ctx->hw_hints, &get_resp.u.hw_hints,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2023:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&get_feat_ctx->llq, &get_resp.u.llq,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2033:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&get_feat_ctx->ind_table, &get_resp.u.ind_table,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2227:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &ctx.get_resp.u.eni_stats,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2242:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &ctx.get_resp.u.basic_stats,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(offload, &resp.u.offload, sizeof(resp.u.offload));
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2395:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(hash_key->key, key, key_len);
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_com.c:2452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, hash_key->key, (size_t)(hash_key->keys_num) << 2);
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_eth_com.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bounce_buffer + header_offset, header_src, header_len);
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_eth_com.c:329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&io_sq->cached_tx_meta, ena_meta,
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_plat_dpdk.h:64:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define memcpy_toio memcpy
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_plat_dpdk.h:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char z_name[RTE_MEMZONE_NAMESIZE];		\
data/dpdk-20.11~rc3/drivers/net/ena/base/ena_plat_dpdk.h:219:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char z_name[RTE_MEMZONE_NAMESIZE];		\
data/dpdk-20.11~rc3/drivers/net/ena/ena_ethdev.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ETH_GSTRING_LEN];
data/dpdk-20.11~rc3/drivers/net/ena/ena_ethdev.h:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ENA_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/enetc/enetc_ethdev.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_cq.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:188:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		vdev->res[type].vaddr = (char __iomem *)bar[bar_num].vaddr +
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:392:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&vdev->args[2], args, nargs * sizeof(args[0]));
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:407:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(args, &vdev->args[1], nargs * sizeof(args[0]));
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:422:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vdev->args, args, nargs * sizeof(args[0]));
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:426:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(args, vdev->args, nargs * sizeof(args[0]));
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:592:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:969:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:1125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:1164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:1235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:1259:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tlv->val, (void *)data, filter_size);
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:1267:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tlv->val, (void *)action_v2, action_size);
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_devcmd.h:708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_version[32];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_devcmd.h:709:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_build[32];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_devcmd.h:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hw_version[32];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_devcmd.h:711:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hw_serial_number[32];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_enet.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[16];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_resource.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char serial[16];		/* card serial number */
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_rq.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_wq.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/enic.h:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bdf_name[ENICPMD_BDF_LENGTH];
data/dpdk-20.11~rc3/drivers/net/enic/enic_clsf.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[layer].mask, mask, len);
data/dpdk-20.11~rc3/drivers/net/enic/enic_clsf.c:71:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[layer].val, val, len);
data/dpdk-20.11~rc3/drivers/net/enic/enic_clsf.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char clsf_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/enic_ethdev.c:679:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/enic/enic_ethdev.c:691:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/enic/enic_ethdev.c:763:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(enic->mc_addrs, mc_addr_set,
data/dpdk-20.11~rc3/drivers/net/enic/enic_ethdev.c:1293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:522:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(l5_mask + start_off, mask, val_size);
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:523:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(l5_val + start_off, val, val_size);
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:659:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(enic_spec.d_addr.addr_bytes, spec->dst.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:661:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(enic_spec.s_addr.addr_bytes, spec->src.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:664:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(enic_mask.d_addr.addr_bytes, mask->dst.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:666:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(enic_mask.s_addr.addr_bytes, mask->src.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:672:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L2].mask, &enic_mask,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:674:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L2].val, &enic_spec,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:753:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L3].mask, &mask->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:755:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L3].val, &spec->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:782:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L3].mask, &mask->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:784:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L3].val, &spec->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:811:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].mask, &mask->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:813:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].val, &spec->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:840:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].mask, &mask->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:842:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].val, &spec->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:890:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].mask, &mask->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:892:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].val, &spec->hdr,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:927:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L5].mask, mask,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:929:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L5].val, spec,
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:977:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].mask + sizeof(struct rte_udp_hdr),
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:979:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].val + sizeof(struct rte_udp_hdr),
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1033:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].mask + sizeof(struct rte_udp_hdr),
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1035:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L4].val + sizeof(struct rte_udp_hdr),
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1039:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(layer, gp->layer[FILTER_GENERIC_1_L5].mask + vxlan, inner);
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1040:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L5].mask, layer, sizeof(layer));
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1042:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(layer, gp->layer[FILTER_GENERIC_1_L5].val + vxlan, inner);
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1043:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gp->layer[FILTER_GENERIC_1_L5].val, layer, sizeof(layer));
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128], *bp;
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip4[16], ip6[16], udp[16], tcp[16], tcpudp[16], ip4csum[16];
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1370:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char l4csum[16], ipfrag[16];
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1450:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(bp, "%02x",
data/dpdk-20.11~rc3/drivers/net/enic/enic_flow.c:1458:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(bp, "%02x",
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_data->l2.eth, spec, sizeof(struct rte_ether_hdr));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:372:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_mask->l2.eth, mask, sizeof(struct rte_ether_hdr));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:454:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_data->l3.ip4, spec, sizeof(*spec));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:455:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_mask->l3.ip4, mask, sizeof(*mask));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:482:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_data->l3.ip6, spec, sizeof(struct rte_ipv6_hdr));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:483:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_mask->l3.ip6, mask, sizeof(struct rte_ipv6_hdr));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:510:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_data->l4.udp, spec, sizeof(*spec));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:511:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_mask->l4.udp, mask, sizeof(*mask));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:538:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_data->l4.tcp, spec, sizeof(*spec));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:539:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_mask->l4.tcp, mask, sizeof(*mask));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:593:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fm_data->l4.rawdata, spec, sizeof(*spec));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:594:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fm_mask->l4.rawdata, mask, sizeof(*mask));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:627:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_data->vxlan, spec, sizeof(*spec));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:628:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fm_mask->vxlan, mask, sizeof(*mask));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:679:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fm_data->l4.rawdata + sizeof(struct rte_udp_hdr),
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:681:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fm_mask->l4.rawdata + sizeof(struct rte_udp_hdr),
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:722:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&cmd->fet_key, key, sizeof(*key));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:723:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&fet->key, key, sizeof(*key));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:914:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*template, data, len);
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:1626:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *fmop_str[FMOP_OP_MAX] = {
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:1650:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128], *bp = buf;
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:1706:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *fm_fkm_str[FKM_BIT_COUNT] = {
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:1731:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *fm_fkh_str[FKH_BIT_COUNT] = {
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:1777:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:2105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ftm, match_in, sizeof(*ftm));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:2196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fma, action_in, sizeof(*fma));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:2199:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ah->key, action_in, sizeof(struct fm_action));
data/dpdk-20.11~rc3/drivers/net/enic/enic_fm_flow.c:2751:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/enic_main.c:1033:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/enic/enic_rxtx.c:309:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rxmb, rq->free_mbufs + ENIC_RX_BURST_MAX - rq->num_free_mbufs,
data/dpdk-20.11~rc3/drivers/net/enic/enic_rxtx.c:664:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wq->bufs + head_idx, tx_pkts, sizeof(struct rte_mbuf *) * n);
data/dpdk-20.11~rc3/drivers/net/enic/enic_rxtx.c:674:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(wq->bufs, tx_pkts, sizeof(struct rte_mbuf *) * rem);
data/dpdk-20.11~rc3/drivers/net/enic/enic_rxtx_vec_avx2.c:787:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rxmb, rq->free_mbufs + ENIC_RX_BURST_MAX - rq->num_free_mbufs,
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char output[DEVARGS_MAXLEN + 1];
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char output[DEVARGS_MAXLEN + 1];
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:305:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
fs_remove_sub_devices_definition(char params[DEVARGS_MAXLEN])
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[DEVARGS_MAXLEN] = {0};
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:382:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mut_params[DEVARGS_MAXLEN] = "";
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devstr[DEVARGS_MAXLEN] = "";
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_eal.c:77:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char devstr[DEVARGS_MAXLEN] = "";
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_ether.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_ether.c:183:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ea_fmt[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_ops.c:975:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_mbx.c:248:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fifo->buffer, msg + end, (len - end) << 2);
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_mbx.c:253:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tail, msg, end << 2);
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_pf.c:298:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac.perm_addr, perm_addr, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_pf.c:299:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac.addr, perm_addr, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_tlv.c:629:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATIC const unsigned char test_mac[ETH_ALEN] = { 0x12, 0x34, 0x56,
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_tlv.c:746:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char result_str[80];
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_tlv.c:747:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char result_mac[ETH_ALEN];
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_vf.c:242:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac.perm_addr, perm_addr, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_vf.c:282:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac.perm_addr, perm_addr, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/fm10k/base/fm10k_vf.c:283:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac.addr, perm_addr, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k_ethdev.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k_ethdev.c:3139:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hw->mac.perm_addr, hw->mac.addr, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/fm10k/fm10k_rxtx_vec.c:644:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rx_bufs, pkts, pkt_idx * (sizeof(*pkts)));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_api_cmd.c:248:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cell_ctxt->api_cmd_vaddr, cmd, cmd_size);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_cfg.c:19:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cap, &hwdev->cfg_mgmt->svc_cap.nic_cap, sizeof(*cap));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_cmdq.c:269:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((u8 *)dst + FIRST_DATA_TO_WRITE_LAST,
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:57:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *__hw_to_char_fec[HILINK_FEC_MAX_TYPE] = {
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:60:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *__hw_to_char_port_type[LINK_PORT_MAX_TYPE] = {
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:65:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *hinic_module_link_err[LINK_ERR_NUM] = {
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fault_type[FAULT_TYPE_MAX][FAULT_SHOW_STR_LEN + 1] = {
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:882:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fault_level[FAULT_LEVEL_MAX][FAULT_SHOW_STR_LEN + 1] = {
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:884:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type_str[FAULT_SHOW_STR_LEN + 1] = { 0 };
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:885:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char level_str[FAULT_SHOW_STR_LEN + 1] = { 0 };
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:1055:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(info, &board_info.info, sizeof(*info));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:1413:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_str[512] = {0};
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:1414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_vendor[17] = {0};
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:1442:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_vendor, info->vendor_name, sizeof(info->vendor_name));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:1502:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *hilink_info_report_type[HILINK_EVENT_MAX_TYPE] = {
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mbox.c:288:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mbox_max_buf, seg, seg_len);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mbox.c:493:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((u8 *)recv_mbox->mbox + seq_id * HINIC_MSG_SEG_LEN,
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mbox.c:763:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf_out, mbox_for_resp->mbox,
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mgmt.c:142:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mgmt_cmd, header, sizeof(*header));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mgmt.c:146:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mgmt_cmd, msg, msg_len);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mgmt.c:469:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf_out, recv_msg->msg,
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mgmt.c:634:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest_msg, msg_body, seq_len);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:286:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mac_info.old_mac, old_mac, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:287:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mac_info.new_mac, new_mac, ETH_ALEN);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:732:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ets.up_tc, up_tc, HINIC_DCB_TC_MAX);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:733:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ets.pg_bw, pg_bw, HINIC_DCB_UP_MAX);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:734:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ets.pgid, pgid, HINIC_DCB_UP_MAX);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:735:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ets.up_bw, up_bw, HINIC_DCB_UP_MAX);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:736:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ets.prio, prio, HINIC_DCB_UP_MAX);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:779:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &vport_stats_rsp.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:812:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &port_stats_rsp.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:925:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(temp_key.key, temp, HINIC_RSS_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:965:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(temp, temp_key.key, HINIC_RSS_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:1064:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(indir_tbl->entry, &indir_tbl->entry[indir_size], indir_size);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:1134:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss_cfg.prio_tc, prio_tc, HINIC_DCB_UP_MAX);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:1900:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)&port_tcam_cmd.filter_rule,
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:1902:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)&port_tcam_cmd.filter_action,
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_niccfg.c:1972:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)&tcam_cmd.rule, (void *)tcam_rule,
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c:782:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_ver[HINIC_MGMT_VERSION_MAX_LEN] = {0};
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c:1446:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mac_addr->addr_bytes[3], &random_value, 3);
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c:1971:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hashkey, rss_conf->rss_key, rss_conf->rss_key_len);
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c:2034:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, hashkey, sizeof(hashkey));
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.h:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char proc_dev_name[HINIC_DEV_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_rx.c:293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &rxq->rxq_stats, sizeof(rxq->rxq_stats));
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_rx.c:495:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hashkey, default_rss_key, HINIC_RSS_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_rx.c:497:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hashkey, rss_conf->rss_key, rss_conf->rss_key_len);
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_tx.c:273:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &txq->txq_stats, sizeof(txq->txq_stats));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_cmd.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_dcb.c:709:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pf->prio_tc, hw->dcb_info.prio_tc, HNS3_MAX_USER_PRIO);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_dcb.c:1091:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pause_param->mac_addr, addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_dcb.c:1092:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pause_param->mac_addr_extra, addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1341:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(desc[0].data, req,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1350:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(desc[0].data, req,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1380:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(desc.data, req,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1395:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mc_desc[0].data, req,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1425:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(desc.data, req, sizeof(struct hns3_mac_vlan_tbl_entry_cmd));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1510:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1541:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1559:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1598:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1628:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1730:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1793:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1840:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:1887:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:2088:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:3076:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac.mac_addr, cfg.mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:3971:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(desc.data, req, sizeof(struct hns3_mac_mgr_tbl_entry_cmd));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev.c:6082:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:306:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr_bytes, mac_addr->addr_bytes, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:307:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&addr_bytes[RTE_ETHER_ADDR_LEN], old_addr->addr_bytes,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:1302:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hw->tqps_num, &resp_msg[0], sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:1303:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hw->rss_size_max, &resp_msg[2], sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:1323:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hw->num_tx_desc, &resp_msg[0], sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:1324:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hw->num_rx_desc, &resp_msg[2], sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:1367:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac.mac_addr, host_mac, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:1455:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&msg_data[1], &vlan_id, sizeof(vlan_id));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:1456:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&msg_data[3], &proto, sizeof(proto));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_ethdev_vf.c:2435:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.c:396:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req1->tcam_data, key, len);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.c:400:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req2->tcam_data, key, len);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.c:404:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req3->tcam_data, key, len);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.c:537:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val_x, &tmp_x_l, sizeof(tmp_x_l));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.c:538:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val_y, &tmp_y_l, sizeof(tmp_y_l));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_fdir.c:815:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fdir_hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:461:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rule->key_conf.mask.src_mac,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:466:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rule->key_conf.mask.dst_mac,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:473:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rule->key_conf.spec.src_mac, eth_spec->src.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:475:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rule->key_conf.spec.dst_mac, eth_spec->dst.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:932:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rule->key_conf.mask.outer_tun_vni, vxlan_mask->vni,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:935:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rule->key_conf.spec.outer_tun_vni, vxlan_spec->vni,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:984:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rule->key_conf.mask.outer_tun_vni, nvgre_mask->tni,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:987:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rule->key_conf.spec.outer_tun_vni, nvgre_spec->tni,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:1036:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rule->key_conf.mask.outer_tun_vni, geneve_mask->vni,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:1039:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rule->key_conf.spec.outer_tun_vni, geneve_spec->vni,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:1335:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out->queue, in->queue,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:1338:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		out->conf.key = memcpy(out->key, in->key, in->key_len);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:1528:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(indir_tbl, hw->rss_info.rss_indirection_tbl,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:1856:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&fdir_rule_ptr->fdir_conf, &fdir_rule,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_flow.c:1902:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&fdir_rule, &fdir_rule_ptr->fdir_conf,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_intr.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *reset_string[HNS3_MAX_RESET] = {
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_mbx.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(resp_data, &mbx_resp->additional_info[0], resp_len);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_mbx.c:163:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&req->msg[offset], msg_data, msg_len);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_mbx.c:404:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&msg_q[0], req->msg,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rss.c:231:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(req->hash_key, key_cur, key_size);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rss.c:240:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->rss_info.key, key, HNS3_RSS_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rss.c:481:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, rss_cfg->key, HNS3_RSS_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rss.c:520:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(indirection_tbl, rss_cfg->rss_indirection_tbl,
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rss.c:667:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss_cfg->key, hns3_hash_key, HNS3_RSS_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx.c:647:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg_data, &queue_id, sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_rxtx.c:2829:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d, s, len);
data/dpdk-20.11~rc3/drivers/net/hns3/hns3_stats.h:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_common.c:351:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char d_buf[16];
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_type.h:762:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char err_str[16];
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_type.h:1973:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[I40E_DDP_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_type.h:1982:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[I40E_DDP_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_type.h:1993:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[I40E_DDP_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:517:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:632:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:955:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ethertype_hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:1000:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tunnel_hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:1046:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fdir_hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:1312:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	use_latest_vec = atoi(value);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:3727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ver_str[64] = {0};
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:4564:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:5995:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&vsi->info, &ctxt.info, sizeof(ctxt.info));
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:11719:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mac_filter.mac_addr, mac_addr, ETH_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:11725:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pf->dev_addr, mac_addr, ETH_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:11917:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:12048:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_PMD_I40E_DDP_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:12467:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		.queue = memcpy(out->queue, in->queue,
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:12471:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		out->conf.key = memcpy(out->key, in->key, in->key_len);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev_vf.c:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev_vf.c:2937:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vf->mc_addrs, mc_addrs, mc_addrs_num * sizeof(*mc_addrs));
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_fdir.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_fdir.c:954:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(raw_pkt, fdir_input->flow.raw_flow.packet,
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_flow.c:2315:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pf->fdir.flex_mask[pctype], &flex_mask,
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_common.h:73:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rx_bufs, pkts, pkt_idx * (sizeof(*pkts)));
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_vf_representor.c:202:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &vsi->eth_stats, sizeof(vsi->eth_stats));
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1503:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pinfo->name, name, I40E_DDP_NAME_SIZE);
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1504:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pinfo->version, version, sizeof(struct i40e_ddp_version));
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1851:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(info->name,
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1854:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&info->version,
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1882:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(info_buff, &note_seg_hdr[1], note_seg_hdr->size);
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1911:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(info->name,
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1914:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&info->version,
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:1940:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(info_buff,
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:2039:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pinfo[j], tlv->data,
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.c:2089:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pinfo[j], tlv->data,
data/dpdk-20.11~rc3/drivers/net/i40e/rte_pmd_i40e.h:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_PMD_I40E_DDP_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_ethdev.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_ethdev.c:238:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vf->mc_addrs,
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_ethdev.c:1586:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flex_name[32];
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_common.h:74:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rx_bufs, pkts, pkt_idx * (sizeof(*pkts)));
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_adminq_cmd.h:2586:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ICE_SEG_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_common.c:677:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nvm_str[ICE_NVM_VER_LEN] = { 0 };
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.c:1153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char flags[ICE_PKG_FLAG_COUNT + 1] = { 0 };
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_type.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char seg_id[ICE_PKG_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_type.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkg_name[ICE_PKG_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_type.h:350:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ICE_META_SECT_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_type.h:407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[ICE_PKG_LABEL_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_osdep.h:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkg_name[ICE_MAX_PKG_FILENAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:330:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(pkg_name, "rb");
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char xtr_name[32];
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1764:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opt_ddp_filename[ICE_MAX_PKG_FILENAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1824:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkg_file[ICE_MAX_PKG_FILENAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1836:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(pkg_file, "rb");
data/dpdk-20.11~rc3/drivers/net/ice/ice_fdir_filter.c:387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fdir_hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/ice/ice_fdir_filter.c:450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1000:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(pba->pba_block,
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1058:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&eeprom_buf[pba->word[1]],
data/dpdk-20.11~rc3/drivers/net/igc/igc_ethdev.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/igc/igc_ethdev.h:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filter[0];		/* filter data */
data/dpdk-20.11~rc3/drivers/net/igc/igc_filter.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&igc->ethertype_filters[ret], filter, sizeof(*filter));
data/dpdk-20.11~rc3/drivers/net/igc/igc_filter.c:273:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&igc->ntuple_filters[ret], ntuple, sizeof(*ntuple));
data/dpdk-20.11~rc3/drivers/net/igc/igc_flow.c:672:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(flow->filter, filter, inbytes);
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:948:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out->key, rss->key, rss->key_len);
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:957:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out->queue, rss->queue,
data/dpdk-20.11~rc3/drivers/net/ionic/ionic.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_version[IONIC_DEVINFO_FWVERS_BUFLEN];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_dev.c:538:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ctx->comp, cq_desc, sizeof(*cq_desc));
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_dev.c:571:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(q_desc, &ctx->cmd, sizeof(ctx->cmd));
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_dev.h:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IONIC_INTR_NAME_MAX_SZ];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.c:622:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(reta_conf->reta,
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.c:648:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, lif->rss_hash_key,
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.c:1142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_ethdev.c:1281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char   os_dist_str[128];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:240:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char   kernel_ver_str[32];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char   driver_ver_str[32];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:360:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char   name[IONIC_IFNAMSIZ];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:1320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    name[IONIC_IFNAMSIZ];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:1418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    name[IONIC_IFNAMSIZ];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:1682:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    name[IONIC_QOS_CLASS_NAME_SZ];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:2362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char   fw_version[IONIC_DEVINFO_FWVERS_BUFLEN];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_if.h:2363:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char   serial_num[IONIC_DEVINFO_SERIAL_BUFLEN];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_lif.c:246:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx.cmd.rx_filter_add.mac.addr, addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_lif.c:945:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lif->rss_hash_key, key, IONIC_RSS_HASH_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_lif.c:951:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx.cmd.lif_setattr.rss.key, lif->rss_hash_key,
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_lif.c:1430:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lif->mac_addr, ctx.comp.lif_getattr.mac, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_lif.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IONIC_LIF_NAME_MAX_SZ];
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_main.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_ethdev.c:468:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_ethdev.c:551:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char attr_name[IPN3KE_RAWDEV_ATTR_LEN_MAX];
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:2100:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	port_id = atoi(ch);
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:2168:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	port_id = atoi(ch);
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:2268:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	port_id = atoi(ch);
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_tm.c:1930:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *str_state[IPN3KE_TM_NODE_STATE_MAX] = {"Idle",
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_tm.c:1965:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *str_state[IPN3KE_TM_NODE_STATE_MAX] = {"Idle",
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:798:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(pba->pba_block,
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:856:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&eeprom_buf[pba->word[1]],
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_type.h:3195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char driver_string[FW_CEM_DRIVER_VERSION_SIZE];
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_vf.c:202:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hw->mac.perm_addr, addr, IXGBE_ETH_LENGTH_OF_ADDRESS);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_vf.c:325:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg_addr, addr, 6);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_vf.c:511:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg_addr, addr, 6);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x550.c:4629:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fw_cmd.driver_string, driver_ver, len);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:1371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fdir_hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:1407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char l2_tn_hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:1480:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mac_addr->addr_bytes[3], &random, 3);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:1707:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ipsec.c:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, ic_session->key, ic_session->key_len);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ipsec.c:248:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, ic_session->key, ic_session->key_len);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ipsec.c:414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ic_session->salt,
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_pf.c:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char vf_mac_addr[RTE_ETHER_ADDR_LEN];
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_pf.c:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vfinfo[vfn].vf_mac_addresses, vf_mac_addr,
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:5834:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		.key = memcpy(out->key, in->key, in->key_len),
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:5835:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		.queue = memcpy(out->queue, in->queue,
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_common.h:71:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rx_bufs, pkts, pkt_idx * (sizeof(*pkts)));
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.c:553:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss_param->itable, rss_state->itable, rss_state->itable_size);
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.c:589:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(reta_conf->reta,
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.c:616:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hash_key, rss_state->hash_key, rss_state->hash_key_size);
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.c:675:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_state->hash_key, rss_conf->rss_key,
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.c:677:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_param->key, rss_state->hash_key,
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_ethdev.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lio_firmware_version[LIO_FW_VERSION_LENGTH];
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_rxtx.c:1207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sc_pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_struct.h:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_string[LIO_DEVICE_NAME_LEN]; /* Device print string */
data/dpdk-20.11~rc3/drivers/net/liquidio/lio_struct.h:659:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char firmware_version[LIO_FW_VERSION_LENGTH];
data/dpdk-20.11~rc3/drivers/net/memif/memif_socket.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctl[CMSG_SPACE(sizeof(int))];
data/dpdk-20.11~rc3/drivers/net/memif/memif_socket.c:625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctl[CMSG_SPACE(sizeof(int)) +
data/dpdk-20.11~rc3/drivers/net/memif/memif_socket.c:956:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[MEMIF_SOCKET_UN_SIZE];
data/dpdk-20.11~rc3/drivers/net/memif/memif_socket.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/memif/memif_socket.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MEMIF_SOCKET_UN_SIZE];	/**< socket filename */
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char port_name[RTE_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c:386:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rte_pktmbuf_mtod_offset(mbuf, void *, dst_off),
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c:647:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)memif_get_buffer(proc_private, d0) + dst_off,
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c:920:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shm_name[ETH_MEMIF_SHM_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char secret[ETH_MEMIF_SECRET_SIZE]; /**< secret (optional security parameter) */
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_name[RTE_DEV_NAME_MAX_LEN];		/**< remote app name */
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.h:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_if_name[RTE_DEV_NAME_MAX_LEN];	/**< remote peer name */
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char local_disc_string[ETH_MEMIF_DISC_STRING_SIZE];
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_disc_string[ETH_MEMIF_DISC_STRING_SIZE];
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:468:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[32];
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:471:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(path, "rb");
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:773:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[IF_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:862:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:1202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char glue_path[sizeof(RTE_EAL_PMD_PATH) - 1 + sizeof("-glue")];
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:1238:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[ret + 1];
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.h:202:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int mlx4_get_ifname(const struct mlx4_priv *priv, char (*ifname)[IF_NAMESIZE]);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c:61:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
mlx4_get_ifname(const struct mlx4_priv *priv, char (*ifname)[IF_NAMESIZE])
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[IF_NAMESIZE] = "";
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c:93:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(path, "rb");
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c:185:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mac, request.ifr_hwaddr.sa_data, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c:554:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(priv->mac + RTE_DIM(priv->mac) - num, list, sizeof(*list) * num);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_flow.c:254:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth->val.dst_mac, spec->dst.addr_bytes, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_flow.c:255:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth->mask.dst_mac, mask->dst.addr_bytes, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_flow.c:1441:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rule_mac, mac, sizeof(*mac));
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_rxq.c:117:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss->key, key, MLX4_RSS_HASH_KEY_SIZE);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_rxq.c:118:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss->queue_id, queue_id, queue_id_size);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_utils.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[mkstr_size_##name + 1]; \
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:146:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
mlx5_get_ifname(const struct rte_eth_dev *dev, char (*ifname)[IF_NAMESIZE])
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:154:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ifname, priv->bond_name, IF_NAMESIZE);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1043:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[IF_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1044:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char port_name[IF_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1071:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(phys_port_name, "rb");
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1078:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(phys_switch_id, "rb");
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[IF_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1135:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(bond_if, "rb");
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1266:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char et_stat_buf[sizeof(struct ethtool_stats) + stats_sz];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1551:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mac, request.ifr_hwaddr.sa_data, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[MLX5_HLIST_NAMESIZE] __rte_unused;
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:697:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:1395:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ifname[IF_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:1648:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[IF_NAMESIZE + 1];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:1682:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(slaves, "r");
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:1689:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	MLX5_ASSERT(atol(RTE_STR(IF_NAMESIZE)) == IF_NAMESIZE);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:1691:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp_str[IF_NAMESIZE + 32];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:1712:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(tmp_str, "rb");
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:2007:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ifname[IF_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:2411:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:2420:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(path1, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:2423:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[21] = {'\0'};
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.h:23:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int mlx5_get_ifname(const struct rte_eth_dev *dev, char (*ifname)[IF_NAMESIZE]);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_socket.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMSG_SPACE(sizeof(int))] = { 0 };
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:1149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[MLX5_HLIST_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:1201:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(val);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fw_ver[64];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.h:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dpdk_name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.h:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctr_name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.h:716:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibdev_name[DEV_SYSFS_NAME_MAX]; /* SYSFS dev name. */
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.h:717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibdev_path[DEV_SYSFS_PATH_MAX]; /* SYSFS dev path for secondary */
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.h:954:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bond_name[IF_NAMESIZE]; /**< Bond interface name. */
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_devx.c:835:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tir_attr->rx_hash_toeplitz_key, rss_key, MLX5_RSS_HASH_KEY_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_ethdev.c:95:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(priv->rss_conf.rss_key,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:2413:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], spec->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:2414:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], mask->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:2490:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], spec->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:2491:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], mask->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:3362:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(translated, actions, actions_size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4096:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(actions_tx, actions,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(actions_tx, actions,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4451:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*action_cur, actions, sizeof(struct rte_flow_action));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4482:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sfx_items, items, sizeof(*sfx_items));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4487:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(sfx_items, items, sizeof(*sfx_items));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4578:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(split_actions, actions, sizeof(*split_actions) * actions_n);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4675:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ext_actions, actions, sizeof(*ext_actions) * encap_idx);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4691:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ext_actions + encap_idx + 1, actions + encap_idx,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4855:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(actions_pre, actions,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4859:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(actions_pre + index, actions + index + 1,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4864:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(actions_sfx, actions + qrss_action_pos,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4870:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(actions_pre, actions,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4882:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(actions_pre + index, actions + sample_action_pos,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:4890:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(actions_sfx, actions + sample_action_pos + 1,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:5566:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)&attr_factor, (const void *)attr, sizeof(*attr));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow.c:7535:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tunnel->app_tunnel, app_tunnel, sizeof(*app_tunnel));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:517:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6_mask.hdr.src_addr,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:523:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6_mask.hdr.dst_addr,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:3414:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(res.buf, raw_encap_data->data, res.size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:3503:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res.buf, encap_data->data, res.size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:4650:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pools, old_pools, cmng->n *
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:6335:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(MLX5_ADDR_OF(fte_match_set_lyr_2_4, hdrs_m, dmac_47_16),
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:6341:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(MLX5_ADDR_OF(fte_match_set_lyr_2_4, hdrs_m, smac_47_16),
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:6637:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(l24_m, ipv6_m->hdr.dst_addr, size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:6644:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(l24_m, ipv6_m->hdr.src_addr, size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:6998:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gre_key_m, tni_flow_id_m, size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:7054:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vni_m, vxlan_m->vni, size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:7114:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vni_m, vxlan_m->vni, size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:7180:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vni_m, geneve_m->vni, size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:9230:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mdest_res->sample_idx[0], &res->sample_idx,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:9232:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mdest_res->sample_act[0], &res->sample_act,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:9339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pools, old_pools,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:9769:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rss_desc->queue, rss->queue,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:9774:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rss_desc->key, rss_key, MLX5_RSS_HASH_KEY_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:10196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)dev_flow->dv.actions,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:11258:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss_desc.key, action->origin.key, MLX5_RSS_HASH_KEY_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:11348:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(shared_action->key, rss_key, MLX5_RSS_HASH_KEY_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:11351:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(shared_action->queue, rss->queue, queue_size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_dv.c:11602:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(shared_rss->queue, action_conf->queue, queue_size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_meter.c:661:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fm->action, params->action, sizeof(params->action));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(pools, cmng->pools,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:451:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, size);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:486:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&eth.val.dst_mac, spec->dst.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:488:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&eth.val.src_mac, spec->src.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:491:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&eth.mask.dst_mac, mask->dst.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:493:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&eth.mask.src_mac, mask->src.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:668:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.val.src_ip, spec->hdr.src_addr,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:670:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.val.dst_ip, spec->hdr.dst_addr,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:672:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.mask.src_ip, mask->hdr.src_addr,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:674:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ipv6.mask.dst_ip, mask->hdr.dst_addr,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:834:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], spec->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:836:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], mask->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:876:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], spec->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:878:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&id.vni[1], mask->vni, 3);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:1094:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss_desc->queue, rss->queue, rss->queue_num * sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:1098:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rss_desc->key, rss_key, MLX5_RSS_HASH_KEY_LEN);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:1250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errstr[32];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_flow_verbs.c:1701:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errstr[32];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rss.c:60:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(priv->rss_conf.rss_key, rss_conf->rss_key,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rss.c:99:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, priv->rss_conf.rss_key,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxq.c:1227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxq.c:2156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hrxq->rss_key, rss_key, rss_key_len);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxq.c:2232:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hrxq->rss_key, rss_key, rss_key_len);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx.c:677:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(path, "a+");
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx.c:681:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = fopen(path2, "a+");
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx.c:2383:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pdst, psrc, 2 * RTE_ETHER_ADDR_LEN - sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx.c:2476:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pdst, psrc, 2 * RTE_ETHER_ADDR_LEN - sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx.c:2951:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pdst, buf, MLX5_DSEG_MIN_INLINE_SIZE);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx_vec_altivec.h:527:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		vector unsigned char cqes[4], vector unsigned char op_err,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_rxtx_vec_altivec.h:864:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		vector unsigned char cqes[MLX5_VPMD_DESCS_PER_LOOP];
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_trigger.c:1327:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&unicast.dst.addr_bytes,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_utils.c:508:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, pool->trunks, pool->n_trunk_valid *
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_utils.h:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MLX5_HLIST_NAMESIZE]; /**< Name of the hash list. */
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_utils.h:527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MLX5_NAME_SIZE]; /**< Name of the cache list. */
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *names[NETA_NUM_ETH_PPIO];
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[MVNETA_MATCH_LEN];
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:648:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/mvneta/mvneta_ethdev.c:836:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth_dev->data->mac_addrs[0].addr_bytes,
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:88:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *names[PP2_NUM_ETH_PPIO * PP2_NUM_PKT_PROC];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[MRVL_MATCH_LEN];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[MRVL_MATCH_LEN];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:1121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:1159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:1220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:2779:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[MRVL_MATCH_LEN];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_ethdev.c:2861:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth_dev->data->mac_addrs[0].addr_bytes,
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_flow.c:704:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(k.s6_addr, spec->hdr.dst_addr, size);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_flow.c:705:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(m.s6_addr, mask->hdr.dst_addr, size);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_flow.c:709:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(k.s6_addr, spec->hdr.src_addr, size);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_flow.c:710:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(m.s6_addr, mask->hdr.src_addr, size);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_mtr.c:39:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cap, &capa, sizeof(capa));
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_mtr.c:104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&prof->profile, profile, sizeof(*profile));
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_mtr.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[MRVL_MATCH_LEN];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sec_name[32];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[max_elems + 1];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *rng_tokens[MAX_RNG_TOKENS + 1];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entry_cpy[CFG_VALUE_LEN];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sec_name[32];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sec_name[32];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:688:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char match[16];
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:697:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(match, "policer-%d:%d\n", priv->pp_id, 0);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_ethdev.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_ethdev.c:369:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hv->rss_key, rss_conf->rss_key ? : rss_default_key,
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_ethdev.c:416:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, hv->rss_key,
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_nvs.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[NVS_RESPSIZE_MAX];
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_nvs.c:118:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(resp, buffer, resplen);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.c:355:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hv->rndis_resp, data, len);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.c:424:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(comp, hv->rndis_resp, comp_len);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.c:499:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req + 1, idata, idlen);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.c:538:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(odata, (const char *)comp + ofs, odlen);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.c:752:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req + 1, data, dlen);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rndis.c:1020:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rssp.rss_key, hv->rss_key, NDIS_HASH_KEYSIZE_TOEPLITZ);
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rxtx.c:246:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_rxtx.c:935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/netvsc/hn_vf.c:486:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/nfb/nfb.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char             nfb_dev[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:512:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hw->mac_addr[0], &tmp, 4);
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:515:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hw->mac_addr[4], &tmp, 2);
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:1130:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &nfp_dev_stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:2541:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&key, &rss_conf->rss_key[i], 1);
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:2658:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rss_conf->rss_key[i], &key, 1);
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3314:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(address.sa_data, "/tmp/nfp_cpp");
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_name[125];
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char serial[40];
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3514:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fw_f = open(fw_name, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3523:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fw_f = open(fw_name, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3530:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fw_f = open(fw_name, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3581:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char card_desc[100];
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char busdev[BUSDEV_SZ];
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:647:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lockname[30];
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:652:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:697:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(lockfile, "/.lock_nfp_secondary");
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:698:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	desc->secondary_lock = open(lockfile, O_RDWR | O_CREAT | O_NONBLOCK,
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cppcore.c:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cpp->serial, serial, serial_len);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cppcore.c:160:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(area->name, name, strlen(name) + 1);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_mip.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_mip.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char toolchain[32];
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_nsp.h:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[40];
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_resource.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NFP_RESOURCE_ENTRY_NAME_SZ + 1];
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_resource.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_pad[NFP_RESOURCE_ENTRY_NAME_SZ + 2];
data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_bgx.c:37:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(conf->macaddr, bgx_conf.macaddr, 6);
data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_bgx.c:121:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(conf->macaddr, bgx_conf.macaddr, 6);
data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_bgx.c:287:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(filter.mac_addr, mac_addr, len);
data/dpdk-20.11~rc3/drivers/net/octeontx/base/octeontx_bgx.c:361:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&conf, cfg, len);
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:61:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*i = atoi(value);
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:146:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&nic->mac_addr[0], &bgx_port_conf.macaddr[0],
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:1300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char octtx_name[OCTEONTX_MAX_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:1417:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data->mac_addrs, nic->mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:1455:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char octtx_name[OCTEONTX_MAX_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:1464:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(octtx_name, "eth_octeontx_%d", i);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:638:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rxq->qconf.conf.rx, rx_conf, sizeof(struct rte_eth_rxconf));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:1089:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:1312:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&txq->qconf.conf.tx, tx_conf, sizeof(struct rte_eth_txconf));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:1362:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tx_qconf[i], &txq[i]->qconf, sizeof(*tx_qconf));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:1375:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rx_qconf[i], &rxq[i]->qconf, sizeof(*rx_qconf));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:1811:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ea_fmt[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:1998:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ea, dev->mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev.c:2524:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth_dev->data->mac_addrs, dev->mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_debug.c:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char regstr[MAX_REGS_PER_MBOX_MSG * 2][NIX_REG_NAME_SZ];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_devargs.c:16:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	val = atoi(value);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_devargs.c:33:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	val = atoi(value);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_devargs.c:50:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	val = atoi(value);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_devargs.c:72:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	val = atoi(value);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_devargs.c:84:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*(uint16_t *)extra_args = atoi(value);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_devargs.c:95:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	val = atoi(value);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:294:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(md->buffer, auth_key, len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:336:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hmac_key, md->buffer, 48);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:382:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sa->nonce, &ipsec->salt, 4);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:394:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&sa->ip_src, &ipsec->tunnel.ipv4.src_ip,
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:396:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&sa->ip_dst, &ipsec->tunnel.ipv4.dst_ip,
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:423:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sa->cipher_key, cipher_key, cipher_key_len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:505:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sa->nonce, &ipsec->salt, 4);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:516:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sa->cipher_key, cipher_key, cipher_key_len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:822:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec.c:869:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec_tx.h:96:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, data + sizeof(*hdr), RTE_ETHER_HDR_LEN);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_ethdev_sec_tx.h:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hdr->iv, &sa->nonce, 4);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.c:121:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pst->flow->mcam_data, key_data, key_len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.c:122:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pst->flow->mcam_mask, key_mask, key_len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.c:220:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reta + i * rss->queue_num, rss->queue,
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.c:225:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&reta[dev->rss_info.rss_size] - i,
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.c:932:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mkex_pfl_name[MKEX_NAME_LEN];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow.c:950:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&idev->kex_cfg, kex_rsp,
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_parse.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hw_mask[64];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_parse.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hw_mask[64];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_parse.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hw_mask[64];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_parse.c:396:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hw_mask[NPC_MAX_EXTRACT_DATA_LEN];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_parse.c:556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hw_mask[NPC_MAX_EXTRACT_DATA_LEN];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_utils.c:257:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pst->mcam_mask + x->key_off, int_info_mask, len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_utils.c:258:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pst->mcam_data + x->key_off, int_info, len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_flow_utils.c:775:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rsp, rsp_cmd, sizeof(*rsp));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_rss.c:155:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss->key, key, key_len);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_rx.h:266:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data + INLINE_INB_RPTR_HDR, data, RTE_ETHER_HDR_LEN);
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_stats.c:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_vlan.c:147:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->entry_data, entry, sizeof(struct mcam_entry));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_vlan.c:184:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->entry_data, entry, sizeof(struct mcam_entry));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_vlan.c:943:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mkex->la_xtract, x_info, sizeof(struct npc_xtract_info));
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_vlan.c:945:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mkex->lb_xtract, x_info, sizeof(struct npc_xtract_info));
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char errbuf[PCAP_ERRBUF_SIZE];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[ETH_PCAP_ARG_MAXLEN];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[ETH_PCAP_ARG_MAXLEN];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devargs[ETH_PCAP_ARG_MAXLEN];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:328:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char temp_data[RTE_ETH_PCAP_SNAPLEN];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:413:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char temp_data[RTE_ETH_PCAP_SNAPLEN];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:819:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ring_name[NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:1098:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int phy_mac = atoi(value);
data/dpdk-20.11~rc3/drivers/net/pcap/rte_eth_pcap.c:1112:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int infinite_rx = atoi(value);
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_eth.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_ethdev.c:72:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	svr_file = fopen(PFE_SOC_ID_FILE, "r");
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_ethdev.c:350:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pfe_cdev_fd = open(PFE_CDEV_PATH, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_ethdev.c:842:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr.addr_bytes, priv->einfo->mac_addr,
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_ethdev.c:904:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pdata->ls1012a_eth_pdata[port].mac_addr, mac_addr,
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_ethdev.c:1051:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/mem", O_RDWR);
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif.c:806:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		pfe_cdev_fd = open(PFE_CDEV_PATH, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif.h:152:30:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define __memcpy8(dst, src)		memcpy(dst, src, 8)
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif.h:153:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define __memcpy12(dst, src)		memcpy(dst, src, 12)
data/dpdk-20.11~rc3/drivers/net/pfe/pfe_hif.h:154:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define __memcpy(dst, src, len)		memcpy(dst, src, len)
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:305:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char err_str[64];
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:309:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(err_str, "Fan Failure");
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:312:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(err_str, "MFW Response Failure");
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:315:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(err_str, "HW Attention");
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:318:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(err_str, "DMAE Failure");
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:321:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(err_str, "Ramrod Failure");
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:324:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(err_str, "FW Assertion");
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.c:327:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(err_str, "Unknown");
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore.h:414:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hw_mac_addr[ETH_ALEN];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore.h:598:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore.h:763:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:40:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *grc_int_attn_desc[5] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:88:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *grc_prty_attn_desc[3] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:134:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *miscs_int_attn_desc[14] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:207:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *miscs_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:239:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *misc_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:283:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pglue_b_int_attn_desc[24] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:358:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pglue_b_prty_attn_desc[35] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:468:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cnig_int_attn_desc[10] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:521:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cnig_prty_attn_desc[3] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:555:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cpmu_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:599:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ncsi_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:643:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ncsi_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:687:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *opte_prty_attn_desc[12] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:758:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *bmb_int_attn_desc[297] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1436:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *bmb_prty_attn_desc[61] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1587:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pcie_int_attn_desc[17] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1623:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pcie_prty_attn_desc[24] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1698:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *mcp2_prty_attn_desc[13] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1778:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswhst_int_attn_desc[18] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1841:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswhst_prty_attn_desc[18] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1921:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswhst2_int_attn_desc[5] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:1971:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswhst2_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2004:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrd_int_attn_desc[3] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2050:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrd_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2083:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrd2_int_attn_desc[5] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2133:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrd2_prty_attn_desc[36] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2263:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswwr_int_attn_desc[16] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2324:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswwr_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2357:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswwr2_int_attn_desc[19] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2421:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswwr2_prty_attn_desc[114] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2696:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrq_int_attn_desc[21] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2765:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrq_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2798:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrq2_int_attn_desc[15] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2858:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pswrq2_prty_attn_desc[11] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2914:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pglcs_int_attn_desc[2] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:2959:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *dmae_int_attn_desc[2] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3004:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *dmae_prty_attn_desc[3] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3050:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ptu_int_attn_desc[8] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3101:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ptu_prty_attn_desc[18] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3162:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tcm_int_attn_desc[41] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3306:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tcm_prty_attn_desc[51] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3434:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *mcm_int_attn_desc[41] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3575:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *mcm_prty_attn_desc[46] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3698:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ucm_int_attn_desc[47] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3845:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ucm_prty_attn_desc[54] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:3977:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xcm_int_attn_desc[49] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:4126:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xcm_prty_attn_desc[59] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:4264:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ycm_int_attn_desc[37] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:4401:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ycm_prty_attn_desc[44] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:4521:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pcm_int_attn_desc[20] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:4638:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pcm_prty_attn_desc[18] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:4702:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *qm_int_attn_desc[22] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:4771:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *qm_prty_attn_desc[109] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:5002:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tm_int_attn_desc[43] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:5118:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tm_prty_attn_desc[17] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:5178:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *dorq_int_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:5230:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *dorq_prty_attn_desc[7] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:5296:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *brb_int_attn_desc[237] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:5894:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *brb_prty_attn_desc[75] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6060:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *src_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *prs_int_attn_desc[2] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6149:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *prs_prty_attn_desc[75] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6319:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tsdm_int_attn_desc[28] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6396:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tsdm_prty_attn_desc[10] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6451:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *msdm_int_attn_desc[28] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6528:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *msdm_prty_attn_desc[11] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6584:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *usdm_int_attn_desc[28] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6661:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *usdm_prty_attn_desc[10] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6716:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xsdm_int_attn_desc[28] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6793:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xsdm_prty_attn_desc[10] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6848:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ysdm_int_attn_desc[28] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6925:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ysdm_prty_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:6977:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *psdm_int_attn_desc[28] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7054:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *psdm_prty_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7106:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tsem_int_attn_desc[46] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7259:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tsem_prty_attn_desc[23] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7396:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *msem_int_attn_desc[46] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7549:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *msem_prty_attn_desc[23] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7655:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *usem_int_attn_desc[46] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7808:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *usem_prty_attn_desc[23] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:7914:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xsem_int_attn_desc[46] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8067:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xsem_prty_attn_desc[24] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8174:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ysem_int_attn_desc[46] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8327:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ysem_prty_attn_desc[24] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8434:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *psem_int_attn_desc[46] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8587:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *psem_prty_attn_desc[23] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8724:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *rss_int_attn_desc[12] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8779:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *rss_prty_attn_desc[4] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8826:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tmld_int_attn_desc[6] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8875:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tmld_prty_attn_desc[8] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8926:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *muld_int_attn_desc[6] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:8975:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *muld_prty_attn_desc[10] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9030:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *yuld_int_attn_desc[6] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9079:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *yuld_prty_attn_desc[6] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9128:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xyld_int_attn_desc[6] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *xyld_prty_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9229:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *prm_int_attn_desc[11] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9283:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *prm_prty_attn_desc[30] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9376:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pbf_pb1_int_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9430:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pbf_pb1_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9463:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pbf_pb2_int_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9517:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pbf_pb2_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9550:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *rpb_int_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9602:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *rpb_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:9634:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *btb_int_attn_desc[139] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10082:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *btb_prty_attn_desc[36] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10183:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pbf_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10227:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pbf_prty_attn_desc[59] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10378:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *rdif_int_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10430:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *rdif_prty_attn_desc[2] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10463:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tdif_int_attn_desc[9] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10515:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tdif_prty_attn_desc[13] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10589:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cdu_int_attn_desc[8] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10640:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cdu_prty_attn_desc[5] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10688:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ccfc_int_attn_desc[2] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10733:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ccfc_prty_attn_desc[10] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10810:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tcfc_int_attn_desc[2] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10855:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tcfc_prty_attn_desc[10] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10932:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *igu_int_attn_desc[11] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:10986:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *igu_prty_attn_desc[42] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:11117:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cau_int_attn_desc[11] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:11171:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cau_prty_attn_desc[15] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:11229:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *umac_int_attn_desc[2] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:11250:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *dbg_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:11294:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *dbg_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:11338:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *nig_int_attn_desc[196] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:11755:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *nig_prty_attn_desc[113] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12013:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *wol_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12033:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *wol_prty_attn_desc[24] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12078:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *bmbn_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12098:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ipc_int_attn_desc[14] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ipc_prty_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12187:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *nwm_int_attn_desc[18] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12224:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *nwm_prty_attn_desc[72] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12334:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *nws_int_attn_desc[38] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12415:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *nws_prty_attn_desc[4] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_attn_values.h:12438:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *ms_int_attn_desc[1] = {
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_dev.c:1215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[32];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_dev.c:1337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[32];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_int.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bit_name[30];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_int.c:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[512] = {0};
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_int.c:1146:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char bit_name[30];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_l2_api.h:113:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mac[ETH_ALEN];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_l2_api.h:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mac[ECORE_MAX_MC_ADDRS][ETH_ALEN];
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_sriov.c:3427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char empty_mac[ETH_ALEN];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:827:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((u8 *)&dword, buf, sizeof(dword));
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_ver_str[16] = EMPTY_FW_VERSION_STR;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fw_img_str[16] = EMPTY_FW_IMAGE_STR;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1119:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(fw_img_str, "main");
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1122:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(fw_img_str, "unknown");
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mfw_ver_str[16] = EMPTY_FW_VERSION_STR;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char param_str[3] = "??";
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sw_platform_str[MAX_SW_PLTAFORM_STR_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2423:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2441:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(buf, "?STORM_");
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2473:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buf, "?STORM_");
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:3030:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[12] = "???_BIG_RAM";
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:3031:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type_name[8] = "???_RAM";
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:3148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[32];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:4433:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char storm_letter_str[2] = "?";
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:4539:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dump_buf + offset,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:4810:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dump_buf + offset,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:5905:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char s_temp_buf[MAX_MSG_LEN];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:5968:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *source_str = &((const char *)buf)[*offset];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6167:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6200:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6209:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6286:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6307:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6330:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6336:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6342:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6693:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vf_str[4];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6729:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(vf_str, "%d", vf_val);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6764:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	results_offset += sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6781:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parsed_addr_data[32];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6782:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parsed_wr_data[256];
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6820:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(parsed_addr_data, " vector_num = 0x%x", cmd_addr / 2);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6824:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(parsed_addr_data,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6842:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(parsed_wr_data, "prod: 0x%x, ", prod_cons);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6957:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	results_offset += sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:7026:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	results_offset += sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:7098:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:8027:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, qed_feature->dump_buf, qed_feature->buf_size);
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:237:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char ver_str[QEDE_PMD_DRV_VER_STR_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:372:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char ver_str[QEDE_PMD_DRV_VER_STR_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2145:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&rss_params.rss_key, key, len);
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2190:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(qdev->rss_conf.rss_key, key, len);
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rss_conf->rss_key, qdev->rss_conf.rss_key,
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2507:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mac_addr->addr_bytes[3], &random, 3);
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.h:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char drv_ver[QEDE_PMD_DRV_VER_STR_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.h:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dump_file[QEDE_FW_DUMP_FILE_SIZE];
data/dpdk-20.11~rc3/drivers/net/qede/qede_filter.c:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE] = {0};
data/dpdk-20.11~rc3/drivers/net/qede/qede_main.c:19:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char qede_fw_file[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/qede/qede_main.c:139:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(qede_fw_file, O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/qede/qede_main.c:479:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void qed_set_name(struct ecore_dev *edev, char name[NAME_SIZE])
data/dpdk-20.11~rc3/drivers/net/qede/qede_regs.c:220:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(dump_file, "wb+");
data/dpdk-20.11~rc3/drivers/net/qede/qede_rxtx.c:2114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ol_buf[256] = { 0 }; /* for verbose prints */
data/dpdk-20.11~rc3/drivers/net/ring/rte_eth_ring.c:401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char args_str[32];
data/dpdk-20.11~rc3/drivers/net/ring/rte_eth_ring.c:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/ring/rte_eth_ring.c:462:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rng_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/ring/rte_eth_ring.c:492:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/sfc/sfc.c:1264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	board_sn[RTE_SIZEOF_FIELD(efx_nic_board_info_t, enbi_serial)];
data/dpdk-20.11~rc3/drivers/net/sfc/sfc.h:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				log_prefix[SFC_LOG_PREFIX_MAX];
data/dpdk-20.11~rc3/drivers/net/sfc/sfc_mae.c:1150:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&supp_mask, &vtc_flow_be, sizeof(vtc_flow_be));
data/dpdk-20.11~rc3/drivers/net/sfc/sfc_mae.c:1447:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vnet_id_v + 1, &vxp->vni, sizeof(vxp->vni));
data/dpdk-20.11~rc3/drivers/net/sfc/sfc_mae.c:1450:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vnet_id_m + 1, &vxp->vni, sizeof(vxp->vni));
data/dpdk-20.11~rc3/drivers/net/softnic/parser.c:427:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, tmp, sizeof(struct rte_ether_addr));
data/dpdk-20.11~rc3/drivers/net/softnic/parser.c:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num[8];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_action.c:155:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&profile->params, params, sizeof(*params));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_action.c:415:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&profile->params, params, sizeof(*params));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:626:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(shared_shaper_id, params->shared_shaper_id.tc,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3452:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m->match.acl.ipv6.sa, saddr.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3458:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m->match.acl.ipv6.da, daddr.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3636:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipv6->sa, saddr.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3637:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipv6->da, daddr.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3684:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipv6_addr->addr, addr.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:3755:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m->match.lpm.ipv6, addr.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4336:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(a->encap.vxlan.ipv6.sa, sa.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4337:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(a->encap.vxlan.ipv6.da, da.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4411:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(a->nat.addr.ipv6, addr.s6_addr, 16);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5800:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "r");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5808:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[64];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5809:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *tokens[3];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[CMD_MAX_TOKENS];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6433:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "r");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6495:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "r");
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *tokens[CMD_MAX_TOKENS];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cryptodev.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:389:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&spec[pattern_offset], pattern, pattern_length);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:393:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mask[pattern_offset], pattern_mask, pattern_length);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:446:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(spec, item->spec, size);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:451:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mask, item->mask, size);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mask, mask_default, size);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:470:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(last, item->last, size);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:737:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rule_match->match.acl.ipv6.sa,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:740:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rule_match->match.acl.ipv6.da,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:1069:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&key.key[length], &spec, size);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:1070:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&key_mask.key[length], &mask, size);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:1109:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rule_match->match.hash.key[tpos],
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:1246:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:1362:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:1748:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&rule_action->encap.vxlan.ipv6.sa,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:1751:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&rule_action->encap.vxlan.ipv6.da,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:2123:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&flow->match, &rule_match, sizeof(rule_match));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_flow.c:2124:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&flow->action, &rule_action, sizeof(rule_action));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pipeline_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:304:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:385:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char action_profile_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char action_profile_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_internals.h:519:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_mempool.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mempool_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_meter.c:723:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stats, &s, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char resource_name[NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:211:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pipeline->params, params, sizeof(*params));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port_in->params, params, sizeof(*params));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:650:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port_out->params, params, sizeof(*params));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:807:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:862:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pp.acl.field_format,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:868:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pp.acl.field_format,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:1066:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&table->params, params, sizeof(*params));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_swq.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tap.c:88:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(TAP_DEV, O_RDWR | O_NONBLOCK);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ring_name[NAME_MAX];
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:417:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tdp, tdp_last, sizeof(*tdp));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:546:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, p_last, sizeof(*p));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:842:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->port_in_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:987:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->port_out_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1042:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1311:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_add.match, match, sizeof(*match));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1312:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_add.action, action, sizeof(*action));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1394:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_add_default.action, action, sizeof(*action));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1613:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_delete.match, match, sizeof(*match));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1727:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_rule_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1798:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_mtr_profile_add.profile, profile, sizeof(*profile));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1922:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_rule_mtr_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:1976:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_dscp_table_update.dscp_table,
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_thread.c:2048:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_rule_ttl_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:506:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cap, &tm_cap, sizeof(*cap));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:726:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cap, &tm_level_cap[level_id], sizeof(*cap));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:920:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cap, &tm_node_cap[tm_node->level], sizeof(*cap));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:1176:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p->soft.tm.params.subport_profile[subport_profile_id],
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:2197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&t->pipe_profiles[pipe_profile_id], pp, sizeof(*pp));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:2330:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst, src, sizeof(*dst));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:2403:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&t->subport_profile[subport_profile_id],
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:3065:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&p->soft.tm.params.subport_profile[subport_profile_id],
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:3302:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &nr->stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:3348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &ns->stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:3413:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &np->stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:3496:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &nt->stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_tm.c:3554:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &nq->stats, sizeof(*stats));
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pcislot_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1457:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = fopen(pcislot_path, "r");
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1492:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1621:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sze_dev_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1767:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/szedata2/rte_eth_szedata2.c:1895:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:75:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *tuntap_types[ETH_TUNTAP_TYPE_MAX] = {
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char port_name[RTE_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:153:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(TUN_TAP_DEV_PATH, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char m_copy[mbuf->data_len];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:1393:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[64];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_temp[strlen(ETH_TAP_USR_MAC_FMT) + 1], *mac_byte = NULL;
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2203:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)user_mac->addr_bytes, "\0dtap",
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tun_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_iface[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tap_name[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_iface[RTE_ETH_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remote_iface[RTE_ETH_NAME_MAX_LEN]; /* Remote netdevice name */
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN];  /* Internal Tap device name */
data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[16];
data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c:1717:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&eth_local.dst, &pmd->eth_addr, sizeof(pmd->eth_addr));
data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c:1816:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *sec_name[SEC_MAX] = {
data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c:1841:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char annotation[64];
data/dpdk-20.11~rc3/drivers/net/tap/tap_netlink.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUF_SIZE];
data/dpdk-20.11~rc3/drivers/net/tap/tap_netlink.c:304:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(RTA_DATA(rta), data, data_len);
data/dpdk-20.11~rc3/drivers/net/tap/tap_netlink.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[NLMSG_BUF];
data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_mbox.c:14:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *mbox_message[NIC_MBOX_MSG_MAX] =  {
data/dpdk-20.11~rc3/drivers/net/thunderx/base/nicvf_plat.h:50:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define ether_addr_copy(x, y) memcpy(y, x, RTE_ETHER_ADDR_LEN)
data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_ethdev.c:337:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptypes, ptypes_common, copied);
data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_ethdev.c:339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)ptypes + copied, ptypes_tunnel,
data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_ethdev.c:344:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)ptypes + copied, &ptypes_end, sizeof(ptypes_end));
data/dpdk-20.11~rc3/drivers/net/thunderx/nicvf_ethdev.c:2099:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			bytes_to_skip = atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_ethdev.h:385:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_pf.c:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char vf_mac_addr[RTE_ETHER_ADDR_LEN];
data/dpdk-20.11~rc3/drivers/net/txgbe/txgbe_pf.c:50:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vfinfo[vfn].vf_mac_addresses, vf_mac_addr,
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];			   /**< Unique name. */
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[64];		   /**< Fail-safe instance name. */
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devargs[256];		   /**< Fail-safe device arguments. */
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char if_name[IF_NAMESIZE];	   /**< NetVSC netdevice name. */
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char yield[256];		   /**< PCI sub-device arguments. */
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[sizeof(temp) + IF_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:124:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:194:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(eth_addr.addr_bytes, req.ifr_hwaddr.sa_data,
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char in[RTE_MAX(sizeof(ctx->yield), 256u)];
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_MAX(sizeof(ctx->yield), 256u)];
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:436:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->yield, addr, len + 1);
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:683:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			force = !!atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:685:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ignore = !!atoi(pair->value);
data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[VHOST_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.c:784:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.c:845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.c:940:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:351:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cvq->virtio_net_hdr_mz->addr, ctrl,
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:373:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctrl.data, &nb_queues, sizeof(uint16_t));
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:439:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vq_name[VIRTQUEUE_MAX_NAME_SZ];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vq_hdr_name[VIRTQUEUE_MAX_NAME_SZ];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:1172:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctrl.data, uc, len[0]);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:1175:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctrl.data + len[0], mc, len[1]);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:1210:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tbl->macs[tbl->entries++], addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:1243:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tbl->macs[tbl->entries++], addrs + i,
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:1255:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->mac_addr, mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:1265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctrl.data, mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:1288:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctrl.data, &vlan_id, sizeof(vlan_id));
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_packed_avx.c:435:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *addr = (char *)rx_pkts[i]->buf_addr +
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple_altivec.c:115:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		vector unsigned char desc[RTE_VIRTIO_DESC_PER_LOOP / 2];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple_altivec.c:116:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		vector unsigned char mbp[RTE_VIRTIO_DESC_PER_LOOP / 2];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_rxtx_simple_altivec.c:117:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		vector unsigned char pkt_mb[RTE_VIRTIO_DESC_PER_LOOP];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost.h:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const vhost_msg_strings[VHOST_USER_MAX];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[20] = {'\0'};
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel.c:48:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/sys/module/vhost/parameters/max_mem_regions", O_RDONLY);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel.c:160:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tapfd = open(PATH_NET_TUN, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel.c:285:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		vhostfd = open(dev->path, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel_tap.c:84:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tapfd = open(PATH_NET_TUN, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel_tap.c:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ifr.ifr_hwaddr.sa_data, mac, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_user.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char control[CMSG_SPACE(fd_size)];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_user.c:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(CMSG_DATA(cmsg), fds, fd_size);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_user.c:396:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(arg, &msg.payload.state,
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_vdpa.c:251:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dev->vhostfd = open(dev->path, O_RDWR);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/virtio_user_dev.c:246:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dev->mac_addr, &tmp, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/virtio_user_dev.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user_ethdev.c:215:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user_ethdev.c:552:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[11];
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user_ethdev.c:556:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen("/proc/devices", "r");
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:320:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->perm_addr, &mac_lo, 4);
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:321:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hw->perm_addr + 4, &mac_hi, 2);
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:508:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&val, addr, 4);
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:511:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&val, addr + 4, 2);
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:1162:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&hw->snapshot_tx_stats[i], &txStats,
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:1167:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&hw->snapshot_rx_stats[i], &rxStats,
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:1325:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vf_table, hw->shadow_vfta, VMXNET3_VFT_TABLE_SIZE);
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_ethdev.c:1406:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vf_table, hw->shadow_vfta, VMXNET3_VFT_TABLE_SIZE);
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_rxtx.c:1135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[32];
data/dpdk-20.11~rc3/drivers/net/vmxnet3/vmxnet3_rxtx.c:1379:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dev_rss_conf->hashKey[0], port_rss_conf->rss_key,
data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.c:1142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32]; /* RTE_MEMZONE_NAMESIZE = 32 */
data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.c:1169:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(name, "qdma_%d_vq", rawdev->dev_id);
data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.c:1239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[32];
data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.c:1240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[64];
data/dpdk-20.11~rc3/drivers/raw/dpaa2_qdma/dpaa2_qdma.c:1365:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&qdma_dev->vqs[i].rbp, q_config->rbp,
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_feature_dev.c:345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[MSIX_IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme.c:1177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[20];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme.c:1179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char read_buf[20] = {0,};
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.c:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shm_name[32];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.c:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shm_name[32];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.c:477:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shm_name[32];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.c:520:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shm_name[32];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.h:336:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char addr_bytes[OPAE_ETHER_ADDR_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_intel_max10.c:224:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(spi->dtb, fdt_root, *spi->dtb_sz_ptr);
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_intel_max10.c:234:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(fdt_root, spi->dtb, *spi->dtb_sz_ptr);
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_intel_max10.h:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char compatible[128];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.h:97:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tran_send[TRAN_SEND_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.h:98:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tran_resp[TRAN_RESP_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.h:99:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char packet_send[PACKET_SEND_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.h:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char packet_resp[PACKET_RESP_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.h:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bytes_send[BYTES_SEND_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_spi.h:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bytes_resp[2*BYTES_RESP_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/osdep_raw/osdep_generic.h:74:30:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define opae_memcpy(a, b, c) memcpy((a), (b), (c))
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[1024];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:197:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR);
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[1024] = "/sys/bus/pci/devices/0000:";
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link[1024], link1[1024];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:216:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[1024] = "/sys/devices/";
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sub_brg_bdf[4][16];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[1024];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:438:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDWR);
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:795:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file_fd = open(file_name, O_RDONLY);
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:1441:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:1542:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:1652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fvl_bdf[8][16];
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parent_bdf[16];
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_pci.c:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PCI_PRI_STR_SIZE];
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_pci.c:258:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char qname[32];
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_pci.c:331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PCI_PRI_STR_SIZE];
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_vdev.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_vdev.c:53:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR);
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_vdev.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sysfs_path[PATH_MAX];
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_vdev.c:123:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(sysfs_path, "r");
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_common.c:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev.c:266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev.c:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/dpdk-20.11~rc3/drivers/raw/ntb/ntb.c:1082:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		index = atoi(&attr_name[NTB_SPAD_USER_LEN]);
data/dpdk-20.11~rc3/drivers/raw/ntb/ntb.c:1176:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		index = atoi(&attr_name[NTB_SPAD_USER_LEN]);
data/dpdk-20.11~rc3/drivers/raw/ntb/ntb.c:1244:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(xstats_names, ntb_xstats_names, sizeof(ntb_xstats_names));
data/dpdk-20.11~rc3/drivers/raw/ntb/ntb.c:1436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/ntb/ntb.c:1482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_msg.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[255] = { 0 };
data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_msg.c:54:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(buff, O_WRONLY);
data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_rawdev.c:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_rawdev.c:403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/octeontx2_dma/otx2_dpi_test.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[25];
data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_rawdev.c:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_rawdev.c:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/raw/skeleton/skeleton_rawdev.c:474:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(status_info, &skeldev->fw.firmware_state,
data/dpdk-20.11~rc3/drivers/raw/skeleton/skeleton_rawdev.c:662:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*flag = atoi(value);
data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex.c:108:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(name, "mlx5_regex_%02x:%02x.%02x", pci_dev->addr.bus,
data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_REGEXDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_regex.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_REGEXDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_rxp.c:349:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, buf, len);
data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_rxp.c:365:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, buf, len);
data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_rxp.c:847:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((uint8_t *)((uint8_t *)
data/dpdk-20.11~rc3/drivers/regex/mlx5/mlx5_rxp.c:863:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((uint8_t *)((uint8_t *)
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:345:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)(qp->iq_dma_addr + offset), &inst, sizeof(inst));
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:443:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)ops->matches, (void *)match,
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:751:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data->rules, rules,
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:765:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&data->rules[data->nb_rules], rules,
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:873:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_REGEXDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/regex/octeontx2/otx2_regexdev.c:970:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_REGEXDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/drivers/vdpa/ifc/ifcvf_vdpa.c:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[RTE_DEV_NAME_MAX_LEN] = {0};
data/dpdk-20.11~rc3/drivers/vdpa/ifc/ifcvf_vdpa.c:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[MSIX_IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/drivers/vdpa/ifc/ifcvf_vdpa.c:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[MSIX_IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.c:374:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *mlx5_vdpa_stats_names[MLX5_VDPA_STATS_MAX] = {
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.c:547:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file_o = fopen(file_p, "rb");
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.c:563:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file_o = fopen(file_p, "wb");
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.c:582:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr_name[64] = {0};
data/dpdk-20.11~rc3/examples/bond/main.c:486:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[INET6_ADDRSTRLEN];
data/dpdk-20.11~rc3/examples/cmdline/commands.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[INET6_ADDRSTRLEN];
data/dpdk-20.11~rc3/examples/cmdline/commands.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[INET6_ADDRSTRLEN];
data/dpdk-20.11~rc3/examples/cmdline/parse_obj_list.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[OBJ_NAME_LEN_MAX];
data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.c:224:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp_regs = fopen(params->opt, "wb");
data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.c:255:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bytes_eeprom[EEPROM_DUMP_CHUNKSIZE];
data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.c:264:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp_eeprom = fopen(params->opt, "wb");
data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.c:313:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bytes_eeprom[EEPROM_DUMP_CHUNKSIZE];
data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.c:337:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp_eeprom = fopen(params->opt, "wb");
data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/ethapp.c:531:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	new_mtu = atoi(params->opt);
data/dpdk-20.11~rc3/examples/ethtool/ethtool-app/main.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_name[16];
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:166:33:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cdata.num_packets = (int64_t)atol(optarg);
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:171:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cdata.num_fids = (unsigned int)atoi(optarg);
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:174:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cdata.num_stages = (unsigned int)atoi(optarg);
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:177:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cdata.worker_cq_depth = (unsigned int)atoi(optarg);
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:180:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cdata.worker_cycles = (unsigned int)atoi(optarg);
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:219:31:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cdata.num_mbuf = (uint64_t)atol(optarg);
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char statname[64];
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1018:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, vec->key.data, vec->key.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1075:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, vec->key.data, vec->key.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1131:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, vec->key.data, vec->key.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1195:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iv, vec->iv.data, vec->iv.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1203:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1237:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, vec->input.data, vec->input.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1244:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst + vec->input.len, vec->digest.data, vec->digest.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iv + 1, vec->iv.data, vec->iv.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1275:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iv, vec->iv.data, vec->iv.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1299:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sym->aead.digest.data, vec->digest.data, vec->digest.len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, vec->aead.aad.data,
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1317:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, vec->aead.aad.data,
data/dpdk-20.11~rc3/examples/fips_validation/fips_dev_self_test.c:1563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[128];
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:218:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp_output[128] = {0};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp_output[128] = {0};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:242:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp_output[128] = {0};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:308:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	info.fp_rd = fopen(req_file_path, "r");
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:314:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	info.fp_wr = fopen(rsp_file_path, "w");
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:505:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val->val, tmp_val.val, val->len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:530:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char byte[3] = {src[j * 2], src[j * 2 + 1], '\0'};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.h:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *vec[MAX_LINE_PER_VECTOR];
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.h:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device_name[MAX_STRING_SIZE];
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.h:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_name[MAX_FILE_NAME_SIZE];
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_ccm.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tmp, c, value[10];
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_ccm.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char byte[3] = {src[j * 2], src[j * 2 + 1], '\0'};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:129:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp_key, val->val, val->len);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:137:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val->val, tmp_key, 24);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:147:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(val->val + 8, val->val, 8);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(val->val + 16, val->val, 8);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:152:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:159:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(val->val + 16, val->val, 8);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:163:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'};
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:171:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'};
data/dpdk-20.11~rc3/examples/fips_validation/main.c:425:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char req_path[1024];
data/dpdk-20.11~rc3/examples/fips_validation/main.c:426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char rsp_path[1024];
data/dpdk-20.11~rc3/examples/fips_validation/main.c:535:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:593:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iv, vec.iv.val, vec.iv.len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:630:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv, vec.iv.val, vec.iv.len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:655:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(env.digest, vec.cipher_auth.digest.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:676:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iv, vec.iv.val, vec.iv.len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, seg_len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1140:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, env.digest, env.digest_len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1287:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(prev_in, vec.ct.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1290:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(prev_out, val.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1294:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(vec.pt.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1297:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(vec.pt.val, vec.iv.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1299:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(vec.iv.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1305:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(vec.ct.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1308:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(vec.iv.val, vec.ct.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1310:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(vec.ct.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1319:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.pt.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1322:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.iv.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1324:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.pt.val, prev_out,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1329:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.ct.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1332:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.iv.val, vec.ct.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1334:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.ct.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1342:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prev_out, val.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1345:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(prev_prev_out, val.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1396:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.pt.val, val.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1398:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.iv.val, val.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1399:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.pt.val, prev_out, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1403:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.ct.val, val.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1405:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.iv.val, prev_out, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1406:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.ct.val, val.val, TDES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1450:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.pt.val, val.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1452:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.ct.val, val.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1457:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prev_out, val.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1533:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(prev_in, vec.ct.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1536:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(prev_out, val.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1539:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.pt.val, vec.iv.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1541:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.iv.val, val.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1544:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.ct.val, vec.iv.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1546:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vec.iv.val, prev_in,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1553:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.iv.val, val.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1554:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.pt.val, prev_out, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1556:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.iv.val, prev_in, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1557:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vec.ct.val, prev_out, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1563:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prev_out, val.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1597:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vec.iv.val, val.val, AES_BLOCK_SIZE);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[MAX_DIGEST_SIZE*2];
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1629:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(md[0].val, vec.cipher_auth.digest.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1632:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(md[1].val, vec.cipher_auth.digest.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1635:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(md[2].val, vec.cipher_auth.digest.val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1641:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vec.pt.val, md[0].val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1643:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((vec.pt.val + md[0].len), md[1].val,
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1645:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((vec.pt.val + md[0].len + md[1].len),
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1663:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(md[0].val, md[1].val, md[1].len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1665:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(md[1].val, md[2].val, md[2].len);
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1668:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(md[2].val, (val.val + vec.pt.len),
data/dpdk-20.11~rc3/examples/fips_validation/main.c:1673:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vec.cipher_auth.digest.val, md[2].val, md[2].len);
data/dpdk-20.11~rc3/examples/flow_classify/flow_classify.c:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_FLD_NUM];
data/dpdk-20.11~rc3/examples/flow_classify/flow_classify.c:662:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[LINE_MAX];
data/dpdk-20.11~rc3/examples/flow_classify/flow_classify.c:668:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fh = fopen(rule_path, "rb");
data/dpdk-20.11~rc3/examples/flow_classify/flow_classify.c:829:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(table_acl_params.field_format, ipv4_defs, sizeof(ipv4_defs));
data/dpdk-20.11~rc3/examples/flow_filtering/main.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char status_string[255]; /* to print at the top of the output */
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:646:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			nb_queues = atoi(optarg);
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:665:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ring_size = atoi(optarg);
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:699:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:778:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/examples/ip_fragmentation/main.c:581:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/ip_fragmentation/main.c:596:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/ip_fragmentation/main.c:777:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/dpdk-20.11~rc3/examples/ip_pipeline/action.c:139:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&profile->params, params, sizeof(*params));
data/dpdk-20.11~rc3/examples/ip_pipeline/action.c:384:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&profile->params, params, sizeof(*params));
data/dpdk-20.11~rc3/examples/ip_pipeline/action.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/action.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2751:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m->match.acl.ipv6.sa, saddr.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2757:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m->match.acl.ipv6.da, daddr.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2935:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipv6->sa, saddr.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2936:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipv6->da, daddr.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:2983:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ipv6_addr->addr, addr.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3054:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m->match.lpm.ipv6, addr.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3629:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(a->encap.vxlan.ipv6.sa, sa.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3630:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(a->encap.vxlan.ipv6.da, da.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3704:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(a->nat.addr.ipv6, addr.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4845:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "w");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5636:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "r");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5644:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[64];
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5645:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *tokens[3];
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[CMD_MAX_TOKENS];
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6717:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "r");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6790:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "r");
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6798:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *tokens[CMD_MAX_TOKENS];
data/dpdk-20.11~rc3/examples/ip_pipeline/cryptodev.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/cryptodev.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/kni.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/link.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/main.c:114:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			app.conn.port = (uint16_t) atoi(optarg);
data/dpdk-20.11~rc3/examples/ip_pipeline/mempool.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/parser.c:410:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, tmp, sizeof(struct rte_ether_addr));
data/dpdk-20.11~rc3/examples/ip_pipeline/parser.c:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num[8];
data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msgq_name[NAME_MAX];
data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.c:361:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port_in->params, params, sizeof(*params));
data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.c:782:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_MAX];
data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.c:836:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pp.acl.field_format,
data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.c:842:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pp.acl.field_format,
data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.c:1041:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&table->params, params, sizeof(*params));
data/dpdk-20.11~rc3/examples/ip_pipeline/pipeline.h:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/swq.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/tap.c:72:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(TAP_DEV, O_RDWR | O_NONBLOCK);
data/dpdk-20.11~rc3/examples/ip_pipeline/tap.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[NAME_MAX];
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:388:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tdp, tdp_last, sizeof(*tdp));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:515:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, p_last, sizeof(*p));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:818:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->port_in_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:960:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->port_out_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1014:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1357:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rule->match, match, sizeof(*match));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1358:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rule->action, action, sizeof(*action));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1420:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_add.match, match, sizeof(*match));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1421:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_add.action, action, sizeof(*action));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1469:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rule->action, action, sizeof(*action));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1519:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_add_default.action, action, sizeof(*action));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1706:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_rule_delete.match, match, sizeof(*match));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1834:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_rule_stats_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:1882:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_mtr_profile_add.profile, profile, sizeof(*profile));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:2008:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_rule_mtr_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:2056:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req->table_dscp_table_update.dscp_table,
data/dpdk-20.11~rc3/examples/ip_pipeline/thread.c:2131:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &rsp->table_rule_ttl_read.stats, sizeof(*stats));
data/dpdk-20.11~rc3/examples/ip_pipeline/tmgr.c:131:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&subport_profile[n_subport_profiles],
data/dpdk-20.11~rc3/examples/ip_pipeline/tmgr.c:148:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pipe_profile[n_pipe_profiles],
data/dpdk-20.11~rc3/examples/ip_pipeline/tmgr.c:194:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&subport_params, &subport_params_default,
data/dpdk-20.11~rc3/examples/ip_pipeline/tmgr.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/ip_reassembly/main.c:697:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/ip_reassembly/main.c:712:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/ip_reassembly/main.c:853:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/examples/ip_reassembly/main.c:900:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/dpdk-20.11~rc3/examples/ipsec-secgw/esp.c:76:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&icb->iv, iv, 8);
data/dpdk-20.11~rc3/examples/ipsec-secgw/esp.c:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(aad, iv - sizeof(struct rte_esp_hdr), 8);
data/dpdk-20.11~rc3/examples/ipsec-secgw/esp.c:111:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&icb->iv, iv, 8);
data/dpdk-20.11~rc3/examples/ipsec-secgw/esp.c:390:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(aad, esp, 8);
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1074:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&link_cache[index], link, single_link_size);
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char print_buf[256] = { 0 };
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1256:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(print_buf,
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char print_buf[256] = { 0 };
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1282:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(print_buf,
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1294:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1302:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(print_buf,
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1309:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1313:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char print_buf[256] = { 0 };
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1334:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(print_buf,
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1346:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1355:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(print_buf,
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1362:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char print_buf[256] = { 0 };
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1383:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(print_buf,
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1392:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1395:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/flow.c:64:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mask, &rte_flow_item_ipv4_mask.hdr.src_addr, sizeof(ip));
data/dpdk-20.11~rc3/examples/ipsec-secgw/flow.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mask, &rte_flow_item_ipv6_mask.hdr.src_addr, sizeof(ip));
data/dpdk-20.11~rc3/examples/ipsec-secgw/flow.c:114:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(spec, ip.s6_addr, sizeof(struct in6_addr));
data/dpdk-20.11~rc3/examples/ipsec-secgw/flow.c:190:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rule->port = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/flow.c:199:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rule->queue = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipip.h:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&outip6->ip6_src.s6_addr, src, 16);
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipip.h:57:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&outip6->ip6_dst.s6_addr, dst, 16);
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:509:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ethhdr->s_addr, &ethaddr_tbl[port].src,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:511:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ethhdr->d_addr, &ethaddr_tbl[port].dst,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:1000:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dst_ip[lpm_pkts][0], ip6_dst, 16);
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:1487:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:1497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:1817:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:1845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:2345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:2371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mp_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec-secgw.c:2402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:32:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)&tunnel->ipv4.src_ip,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:35:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)&tunnel->ipv4.dst_ip,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:44:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)&tunnel->ipv6.src_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:47:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uint8_t *)&tunnel->ipv6.dst_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:239:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sa->ipv6_spec.hdr.dst_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:241:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sa->ipv6_spec.hdr.src_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:450:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sa->ipv6_spec.hdr.dst_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec.c:452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sa->ipv6_spec.hdr.src_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec_worker.c:47:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ethhdr->s_addr, &ethaddr_tbl[portid].src, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec_worker.c:48:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ethhdr->d_addr, &ethaddr_tbl[portid].dst, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/examples/ipsec-secgw/ipsec_worker.c:161:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dst_ip[0], ip6_dst, 16);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[INET_ADDRSTRLEN] = {0};
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:61:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*mask = atoi(pch);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[256] = {0};
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:91:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*mask = atoi(pch);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num_str[20];
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:130:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			range_low = atoi(num_str);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:139:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	range_high = atoi(num_str);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[32];
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[32];
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[32];
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[32];
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:431:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(cfg_filename, "r");
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[1024] = {0}, *get_s = NULL;
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char oneline[1024];
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.h:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parse_msg[256];
data/dpdk-20.11~rc3/examples/ipsec-secgw/rt.c:101:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(route_ipv6->ip, ip.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ipsec-secgw/rt.c:114:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				route_ipv4->if_out = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/rt.c:116:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				route_ipv6->if_out = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/rt.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PATH_MAX];
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sub_str[3] = {0};
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:322:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (atoi(tokens[1]) == INVALID_SPI)
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:324:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	rule->spi = atoi(tokens[1]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:418:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&rule->salt,
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:534:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&rule->salt,
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:572:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(rule->src.ip.ip6.ip6_b,
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:615:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(rule->dst.ip.ip6.ip6_b, ip.s6_addr, 16);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:668:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				rule->portid = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:669:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			else if (rule->portid != atoi(tokens[ti])) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:729:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					rule->portid = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:730:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				else if (rule->portid != atoi(tokens[ti])) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:739:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				rule->fdir_qid = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:913:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[PATH_MAX];
data/dpdk-20.11~rc3/examples/ipsec-secgw/sad.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sad_name[RTE_IPSEC_SAD_NAMESIZE];
data/dpdk-20.11~rc3/examples/ipsec-secgw/sad.h:126:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v6[nb_v6].dip, ipv6->dst_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/sad.h:128:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v6[nb_v6].sip, ipv6->src_addr,
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp4.c:211:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tv = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp4.c:275:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rule_ipv4->data.priority = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp4.c:475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[PATH_MAX];
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp4.c:508:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&acl_build_param.defs, ip4_defs, sizeof(ip4_defs));
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp6.c:261:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tv = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp6.c:325:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rule_ipv6->data.priority = atoi(tokens[ti]);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp6.c:606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[PATH_MAX];
data/dpdk-20.11~rc3/examples/ipsec-secgw/sp6.c:639:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&acl_build_param.defs, ip6_defs, sizeof(ip6_defs));
data/dpdk-20.11~rc3/examples/ipv4_multicast/main.c:538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/ipv4_multicast/main.c:575:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/kni/main.c:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256], *end;
data/dpdk-20.11~rc3/examples/kni/main.c:401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/kni/main.c:664:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/kni/main.c:717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/kni/main.c:912:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/l2fwd-cat/cat.c:693:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cpustr[PQOS_MAX_CORES * 3] = {0};
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string_type[MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:635:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/urandom", O_RDONLY);
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1537:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string_cipher_op[MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string_auth_op[MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1539:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string_aead_op[MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1542:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_cipher_op, "Encrypt");
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1544:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_cipher_op, "Decrypt");
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1547:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_auth_op, "Auth generate");
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1549:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_auth_op, "Auth verify");
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1552:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_aead_op, "Authenticated encryption");
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1554:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_aead_op, "Authenticated decryption");
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:1737:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:2287:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char mp_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:2311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char mp_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/examples/l2fwd-event/l2fwd_common.h:105:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char name[RTE_MEMZONE_NAMESIZE] = "rsrc";
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:130:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s, p, size);
data/dpdk-20.11~rc3/examples/l2fwd-event/main.c:366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c:689:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd-jobstats/main.c:746:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_JOBSTATS_NAMESIZE];
data/dpdk-20.11~rc3/examples/l2fwd-keepalive/main.c:453:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l2fwd/main.c:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/l2fwd/main.c:345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l2fwd/main.c:361:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s, p, size);
data/dpdk-20.11~rc3/examples/l2fwd/main.c:571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:466:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapped[NB_SOCKETS];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:797:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_ipv6_addr(const char *in, const char **end, uint32_t v[IPV6_ADDR_U32],
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:797:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_ipv6_addr(const char *in, const char **end, uint32_t v[IPV6_ADDR_U32],
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:822:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_ipv6_net(const char *in, struct rte_acl_field field[4])
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:855:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_FLD_NUM];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:952:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *sp, *in[CB_FLD_NUM];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1033:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[LINE_MAX];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1034:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fh = fopen(rule_path, "rb");
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PATH_MAX];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1239:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&acl_build_param.defs, ipv6 ? ipv6_defs : ipv4_defs,
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1367:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eh, &port_l2hdr[port], sizeof(eh->d_addr) + sizeof(eh->s_addr));
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1607:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char alg[PATH_MAX];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1679:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1890:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1900:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd-acl/main.c:1945:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node_name[RTE_NODE_NAMESIZE];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_GRAPH_NAMESIZE];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:334:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s, p, size);
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:540:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:550:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:599:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:1001:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(node_patterns, default_patterns,
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:1051:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char route_str[INET6_ADDRSTRLEN * 4];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:1052:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char abuf[INET6_ADDRSTRLEN];
data/dpdk-20.11~rc3/examples/l3fwd-graph/main.c:1080:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rewrite_data, val_eth + dst_port, rewrite_len);
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:596:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key.ip_dst, ipv6_hdr->dst_addr, IPV6_ADDR_LEN);
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:597:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key.ip_src, ipv6_hdr->src_addr, IPV6_ADDR_LEN);
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1651:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1661:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1707:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1712:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[3];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1959:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:1986:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:2043:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:2086:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:2142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/l3fwd-power/main.c:2465:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *ptr_strings[NUM_TELSTATS];
data/dpdk-20.11~rc3/examples/l3fwd-power/perf_core.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l3fwd-power/perf_core.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_em.c:898:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_event.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_lpm.c:466:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd/l3fwd_lpm.c:467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char abuf[INET6_ADDRSTRLEN];
data/dpdk-20.11~rc3/examples/l3fwd/main.c:367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/l3fwd/main.c:377:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/l3fwd/main.c:740:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/l3fwd/main.c:751:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/l3fwd/main.c:810:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/link_status_interrupt/main.c:445:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/link_status_interrupt/main.c:474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/init.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/main.c:63:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char err_address[32];
data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/mp_server/main.c:64:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char addresses[RTE_MAX_ETHPORTS][32];
data/dpdk-20.11~rc3/examples/multi_process/client_server_mp/shared/common.h:50:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[sizeof(MP_CLIENT_RXQ_NAME) + 2];
data/dpdk-20.11~rc3/examples/multi_process/hotplug_mp/commands.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[RTE_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/examples/multi_process/symmetric_mp/main.c:138:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				num_procs = atoi(optarg);
data/dpdk-20.11~rc3/examples/multi_process/symmetric_mp/main.c:140:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				proc_id = atoi(optarg);
data/dpdk-20.11~rc3/examples/multi_process/symmetric_mp/main.c:312:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msgbuf[256];
data/dpdk-20.11~rc3/examples/multi_process/symmetric_mp/main.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:232:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(res->filepath, "r");
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:355:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filepath[RECV_FILE_LEN];
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:369:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(filepath, "w");
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:732:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1166:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			n = atoi(optarg);
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1173:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			n = atoi(optarg);
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1194:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			n = atoi(optarg);
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1203:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			n = atoi(optarg);
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1211:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			n = atoi(optarg);
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/examples/ntb/ntb_fwd.c:1245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_cond.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_COND_NAME_SIZE];
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_int.h:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char funcname[MAX_LTHREAD_NAME_SIZE];	/* thread func name */
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_mutex.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[MAX_MUTEX_NAME_SIZE];
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_objcache.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[LT_MAX_NAME_SIZE];
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_pool.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[LT_MAX_NAME_SIZE];
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_queue.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[LT_MAX_NAME_SIZE];
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_tls.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_LTHREAD_NAME_SIZE];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:2546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:2711:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:2722:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:2769:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:2778:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:3034:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:3241:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:3300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:3383:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[64];
data/dpdk-20.11~rc3/examples/performance-thread/l3fwd-thread/main.c:3433:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/pipeline/cli.c:757:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	spec = fopen(tokens[3], "r");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:842:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file_add = fopen(file_name_add, "r");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:851:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file_delete = fopen(file_name_delete, "r");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:860:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file_default = fopen(file_name_default, "r");
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[CMD_MAX_TOKENS];
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1397:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "r");
data/dpdk-20.11~rc3/examples/pipeline/main.c:101:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			app.conn.port = (uint16_t) atoi(optarg);
data/dpdk-20.11~rc3/examples/pipeline/obj.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/pipeline/obj.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/pipeline/obj.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/pipeline/obj.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_SIZE];
data/dpdk-20.11~rc3/examples/pipeline/thread.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[NAME_MAX];
data/dpdk-20.11~rc3/examples/pipeline/thread.c:341:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tdp, tdp_last, sizeof(*tdp));
data/dpdk-20.11~rc3/examples/pipeline/thread.c:459:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, p_last, sizeof(*p));
data/dpdk-20.11~rc3/examples/qos_sched/args.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/examples/qos_sched/args.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[MAX_OPT_VALUES];
data/dpdk-20.11~rc3/examples/qos_sched/args.c:152:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		opt_vals[i] = (uint32_t)atol(tokens[i]);
data/dpdk-20.11~rc3/examples/qos_sched/args.c:356:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					app_main_core = (uint32_t)atoi(optarg);
data/dpdk-20.11~rc3/examples/qos_sched/args.c:376:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					mp_size = atoi(optarg);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:36:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		port_params->frame_overhead = (uint32_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:40:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		port_params->n_subports_per_port = (uint32_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pipe_name[32];
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:65:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tb_rate = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:69:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tb_size = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:73:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_period = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:77:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[0] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:81:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[1] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:85:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[2] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:89:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[3] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:93:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[4] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:97:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[5] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:101:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[6] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:105:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[7] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:109:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[8] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:113:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[9] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:117:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[10] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:121:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[11] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:125:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_rate[12] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:129:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pipe_params[j].tc_ov_weight = (uint8_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sec_name[32];
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:166:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tb_rate = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:170:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tb_size = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:174:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_period = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:178:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[0] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:182:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[1] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:186:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[2] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:190:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[3] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:194:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[4] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:198:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[5] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:202:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[6] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:206:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[7] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:210:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[8] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:214:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[9] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:218:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[10] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:222:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[11] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:226:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			subport_profile[i].tc_rate[12] = (uint64_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:246:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sec_name[CFG_NAME_LEN];
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:254:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[32];
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sec_name[CFG_NAME_LEN];
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:329:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					(uint32_t)atoi(entry);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:365:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char *tokens[2] = {NULL, NULL};
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:369:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					profile = atoi(entries[j].value);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:373:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					begin =  atoi(tokens[0]);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:375:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						end = atoi(tokens[1]);
data/dpdk-20.11~rc3/examples/qos_sched/cfg_file.c:383:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char profile_name[CFG_NAME_LEN];
data/dpdk-20.11~rc3/examples/qos_sched/init.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/qos_sched/init.c:302:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char port_name[32]; /* static as referenced from global port_params*/
data/dpdk-20.11~rc3/examples/qos_sched/init.c:374:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[MAX_NAME_LEN];
data/dpdk-20.11~rc3/examples/qos_sched/init.c:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[MAX_NAME_LEN];
data/dpdk-20.11~rc3/examples/qos_sched/main.c:165:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rx_stats[i], &stats, sizeof(stats));
data/dpdk-20.11~rc3/examples/qos_sched/main.c:172:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tx_stats[i], &stats, sizeof(stats));
data/dpdk-20.11~rc3/examples/server_node_efd/node/node.c:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/examples/server_node_efd/server/init.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/server_node_efd/server/main.c:72:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char addresses[RTE_MAX_ETHPORTS][sizeof(err_address)];
data/dpdk-20.11~rc3/examples/server_node_efd/shared/common.h:62:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[sizeof(MP_NODE_RXQ_NAME) + 2];
data/dpdk-20.11~rc3/examples/service_cores/main.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/dpdk-20.11~rc3/examples/vdpa/main.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[MAX_PATH_LEN];
data/dpdk-20.11~rc3/examples/vdpa/main.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char iface[MAX_PATH_LEN];
data/dpdk-20.11~rc3/examples/vdpa/main.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[MAX_PATH_LEN];
data/dpdk-20.11~rc3/examples/vdpa/main.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ifname[MAX_PATH_LEN];
data/dpdk-20.11~rc3/examples/vhost/ioat.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ptrs[2];
data/dpdk-20.11~rc3/examples/vhost/ioat.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/dpdk-20.11~rc3/examples/vhost/ioat.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *dma_arg[MAX_VHOST_DEVICE];
data/dpdk-20.11~rc3/examples/vhost/main.c:101:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char dma_type[MAX_LONG_OPT_SZ];
data/dpdk-20.11~rc3/examples/vhost_blk/blk.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, len);
data/dpdk-20.11~rc3/examples/vhost_blk/blk.c:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, size);
data/dpdk-20.11~rc3/examples/vhost_blk/blk.c:58:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bdev->data + offset, task->iovs[i].iov_base,
data/dpdk-20.11~rc3/examples/vhost_blk/blk.c:61:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(task->iovs[i].iov_base, bdev->data + offset,
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char dev_pathname[PATH_MAX] = "";
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.c:599:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.c:683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.c:780:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cwd[PATH_MAX];
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char product_name[256];
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk_compat.c:63:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(config, &blkcfg, RTE_MIN(len, sizeof(blkcfg)));
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk_compat.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/examples/vhost_blk/vhost_blk_compat.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *socket_files[MAX_NB_SOCKETS];
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[NB_SOCKET_FIELDS];
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *str_fld[_NUM_FLD];
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:466:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[128];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CHANNEL_MGR_MAX_NAME_LEN];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char channel_mask[RTE_MAX_LCORE];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:237:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sock_addr.sun_path, info->channel_path,
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:290:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	info->fd = open(info->channel_path, O_RDWR | O_RSYNC);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char socket_name[PATH_MAX];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char socket_path[PATH_MAX];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:560:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char socket_path[PATH_MAX];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:647:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mask[RTE_MAX_LCORE];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:663:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mask, (char *)vm_info->channel_mask, RTE_MAX_LCORE);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:774:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mask[RTE_MAX_LCORE];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:787:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mask, (char *)vm_info->channel_mask, RTE_MAX_LCORE);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:792:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(info->channels[channel_num].channel_path,
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:807:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(info->name, vm_info->name, sizeof(vm_info->name));
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:1007:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mask[RTE_MAX_LCORE];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:1014:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mask, (char *)vm_info->channel_mask, RTE_MAX_LCORE);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char channel_path[UNIX_PATH_MAX]; /**< Path to host socket */
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CHANNEL_MGR_MAX_NAME_LEN];          /**< VM name */
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:50:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char json_data[MAX_JSON_STRING_LEN];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:160:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	result = atoi(&vm_name[off]);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:203:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char command[32];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:217:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char command[32];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:233:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char command[32];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char mac[32];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:283:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char unit[32];
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:610:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char time_string[40];
data/dpdk-20.11~rc3/examples/vm_power_manager/main.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_x86.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char proc_file[UNIX_PATH_MAX];
data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_x86.c:154:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ci->cd[core].msr_fd = open(proc_file, O_RDWR | O_SYNC);
data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_x86.c:188:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ci->cd[core].msr_fd = open(proc_file, O_RDONLY);
data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_x86.c:205:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char proc_file[UNIX_PATH_MAX];
data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_x86.c:220:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ci->cd[core].msr_fd = open(proc_file, O_RDWR | O_SYNC);
data/dpdk-20.11~rc3/kernel/freebsd/contigmem/contigmem.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char index_string[8], description[32];
data/dpdk-20.11~rc3/kernel/freebsd/nic_uio/nic_uio.c:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bdf_str[256];
data/dpdk-20.11~rc3/kernel/freebsd/nic_uio/nic_uio.c:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bdf_str[256];
data/dpdk-20.11~rc3/kernel/linux/kni/compat.h:69:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define ether_addr_copy(dst, src) memcpy(dst, src, ETH_ALEN)
data/dpdk-20.11~rc3/kernel/linux/kni/kni_dev.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_KNI_NAMESIZE]; /* Network device name */
data/dpdk-20.11~rc3/kernel/linux/kni/kni_misc.c:400:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(net_dev->dev_addr, dev_info.mac_addr, ETH_ALEN);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(kni->sync_kva, req, sizeof(struct rte_kni_request));
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:142:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req, kni->sync_kva, sizeof(struct rte_kni_request));
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:310:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data_kva, skb->data, len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:390:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(skb_put(skb, len), data_kva, len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:396:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(skb_put(skb, kva->data_len),
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:492:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(alloc_data_kva, data_kva, len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:563:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(skb_put(skb, len), data_kva, len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:576:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(skb_put(skb, len), data_kva, len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:582:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(skb_put(skb, kva->data_len),
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:709:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth->h_source, saddr ? saddr : dev->dev_addr, dev->addr_len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:710:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth->h_dest,   daddr ? daddr : dev->dev_addr, dev->addr_len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:726:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth->h_source, dev->dev_addr, dev->addr_len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:727:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eth->h_dest, dev->dev_addr, dev->addr_len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:754:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req.mac_addr, addr->sa_data, netdev->addr_len);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_net.c:755:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(netdev->dev_addr, addr->sa_data, netdev->addr_len);
data/dpdk-20.11~rc3/lib/librte_acl/acl.h:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char            transitions[RTE_ACL_QUAD_SIZE];
data/dpdk-20.11~rc3/lib/librte_acl/acl.h:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                name[RTE_ACL_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_acl/acl_bld.c:276:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptrs, node->ptrs,
data/dpdk-20.11~rc3/lib/librte_acl/acl_bld.c:421:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(next->mrt, node->mrt, sizeof(*next->mrt));
data/dpdk-20.11~rc3/lib/librte_acl/acl_bld.c:1390:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(config, rule_sets[n]->config, sizeof(*config));
data/dpdk-20.11~rc3/lib/librte_acl/acl_bld.c:1487:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->data_indexes + ofs, ctx->trie[i].data_index,
data/dpdk-20.11~rc3/lib/librte_acl/acl_gen.c:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst + node->dfa_gr64[i] * RTE_ACL_DFA_GR64_SIZE,
data/dpdk-20.11~rc3/lib/librte_acl/acl_gen.c:373:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(match + index->match_index, node->mrt,
data/dpdk-20.11~rc3/lib/librte_acl/rte_acl.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[sizeof(ctx->name)];
data/dpdk-20.11~rc3/lib/librte_acl/rte_acl.c:445:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pos, rules, num * ctx->rule_sz);
data/dpdk-20.11~rc3/lib/librte_bbdev/rte_bbdev.c:539:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stored_conf,
data/dpdk-20.11~rc3/lib/librte_bbdev/rte_bbdev.h:421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_BBDEV_NAME_MAX_LEN]; /**< Unique identifier name */
data/dpdk-20.11~rc3/lib/librte_bpf/bpf_load.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + bsz, prm->xsym, xsz);
data/dpdk-20.11~rc3/lib/librte_bpf/bpf_load.c:46:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + bsz + xsz, prm->ins, insz);
data/dpdk-20.11~rc3/lib/librte_bpf/bpf_load_elf.c:309:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_bpf/bpf_validate.c:2149:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(st, bvf->evst, sizeof(*st));
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CFG_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[CFG_NAME_LEN + CFG_VALUE_LEN + 4];
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:177:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(filename, "r");
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:220:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *split[2] = {NULL};
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:426:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(filename, "w");
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CFG_NAME_LEN]; /**< Name */
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[CFG_VALUE_LEN]; /**< Value */
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[RDLINE_PROMPT_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:41:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cbuf->buf + cbuf->start - n + e, c, n);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cbuf->buf, c  + n - (cbuf->start + e) , cbuf->start + e);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:49:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cbuf->buf + cbuf->maxlen - n + (cbuf->start + e), c,
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cbuf->buf + cbuf->end + !e, c, n);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cbuf->buf + cbuf->end + !e, c, cbuf->maxlen -
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cbuf->buf, c + cbuf->maxlen - cbuf->end - 1 + e,
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:338:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(c, cbuf->buf + cbuf->start , n);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:344:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c, cbuf->buf + cbuf->start , n);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:351:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c, cbuf->buf + cbuf->start , cbuf->maxlen - cbuf->start);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:352:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c + cbuf->maxlen - cbuf->start, cbuf->buf,
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:376:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(c, cbuf->buf + cbuf->end - n + 1, n);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:382:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c, cbuf->buf + cbuf->end - n + 1, n);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:389:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c + cbuf->maxlen - cbuf->start,
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_cirbuf.c:391:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c, cbuf->buf + cbuf->maxlen - n + cbuf->end +1,
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse.c:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[CMDLINE_PARSE_RESULT_BUFSIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpbuf[CMDLINE_BUFFER_SIZE], comp_buf[CMDLINE_BUFFER_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_etheraddr.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ether_str[RTE_ETHER_ADDR_FMT_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_etheraddr.c:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(res, &tmp, sizeof(tmp));
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_ipaddr.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[INET6_ADDRSTRLEN+4+1]; /* '+4' is for prefixlen (if any) */
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_ipaddr.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(res, &ipaddr, sizeof(ipaddr));
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_ipaddr.c:92:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(res, &ipaddr, sizeof(ipaddr));
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_portlist.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char portlist_str[PORTLIST_TOKEN_SIZE+1];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.c:188:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dstbuf, s, len);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.h:22:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char cmdline_fixed_string_t[STR_TOKEN_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_parse_string.h:24:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char cmdline_multi_string_t[STR_MULTI_TOKEN_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_private.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[RDLINE_PROMPT_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rdl->prompt, prompt, rdl->prompt_size);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.c:127:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rdl->left_buf+len_l, rdl->right_buf, len_r);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.c:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp_buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char left_buf[RDLINE_BUF_SIZE+2]; /* reserve 2 chars for the \n\0 */
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char right_buf[RDLINE_BUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[RDLINE_PROMPT_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kill_buf[RDLINE_BUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_rdline.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char history_buf[RDLINE_HISTORY_BUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_socket.c:20:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open _open
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_socket.c:32:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY, 0);
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_vt100.h:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMDLINE_VT100_BUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev.c:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev_internal.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev_pmd.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_COMPRESSDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev.c:656:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev.c:690:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev.h:887:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev_pmd.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_CRYPTODEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_distributor/distributor_private.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad[RTE_CACHE_LINE_SIZE*3];
data/dpdk-20.11~rc3/lib/librte_distributor/distributor_private.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_DISTRIBUTOR_NAMESIZE];  /**< Name of the ring. */
data/dpdk-20.11~rc3/lib/librte_distributor/distributor_private.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_DISTRIBUTOR_NAMESIZE];  /**< Name of the ring. */
data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor.c:719:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_distributor/rte_distributor_single.c:388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((dst), (src), (n)) :          \
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:260:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 16);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:266:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 32);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:272:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 48);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:278:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 64);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:284:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 128);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:290:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 256);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_32.h:296:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(dst, src, n);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:302:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		return memcpy(dst, src, n);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:323:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		return memcpy(dst, src, n);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:331:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 16);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:337:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 32);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:343:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 48);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:349:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 64);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:355:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 128);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:361:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, 256);
data/dpdk-20.11~rc3/lib/librte_eal/arm/include/rte_memcpy_64.h:364:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define rte_memcpy(d, s, n)	memcpy((d), (s), (n))
data/dpdk-20.11~rc3/lib/librte_eal/arm/rte_cpuflags.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CPU_FLAG_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_bus.c:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_config.c:21:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char runtime_dir[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_fbarray.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_fbarray.c:713:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_fbarray.c:839:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_fbarray.c:981:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_hexdump.c:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[LINE_LEN];	/* space needed 8+16*3+3+16 == 75 */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_hexdump.c:31:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(line + out, "   ");
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_hexdump.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[LINE_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_lcore.c:430:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cpuset[RTE_CPU_AFFINITY_STR_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memalloc.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEM_EVENT_CALLBACK_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memalloc.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEM_ALLOC_VALIDATOR_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memory.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_FBARRAY_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memzone.c:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:383:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sopath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:425:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static __thread char last_dir_checked[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char copy[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1555:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		conf->memory = atoi(optarg);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1562:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		conf->force_nchannel = atoi(optarg);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1570:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		conf->force_nrank = atoi(optarg);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1813:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cpuset, &lcore_config[rte_get_main_lcore()].cpuset,
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mp_filter[PATH_MAX];   /* Filter for secondary process sockets */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mp_dir_path[PATH_MAX]; /* The directory path for all mp sockets */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char peer_name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char action_name[RTE_MP_MAX_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dst[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:152:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		config_fd = open(config_file_path, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:157:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		config_fd = open(path, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char control[CMSG_SPACE(sizeof(m->msg.fds))];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:334:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pending_req->reply, msg, sizeof(*msg));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:445:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&user_msgs[reply->nb_received],
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:575:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:588:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:612:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dir_fd = open(mp_dir_path, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:670:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char control[CMSG_SPACE(fd_size)];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:673:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&m.msg, msg, sizeof(*msg));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:696:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(CMSG_DATA(cmsg), msg->fds, fd_size);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:755:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:957:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tmp[reply->nb_received], &msg, sizeof(msg));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:1027:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:1104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(copy, req, sizeof(*copy));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:1171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_ctf.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(RTE_PTR_ADD(ptr, count), str, rc);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_ctf.c:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uustr[RTE_UUID_STRLEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_ctf.c:317:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	rc = sprintf(str, "%20"PRIu64"", rte_get_timer_hz());
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_ctf.c:341:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	rc = sprintf(str, "%20"PRIu64"", offset_s);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_ctf.c:344:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	rc = sprintf(str, "%20"PRIu64"", offset);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char session[TRACE_DIR_STR_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:380:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "w");
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:411:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "w");
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_uuid.c:51:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out+10, uu->node, 6);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_uuid.c:77:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(uu->node, ptr, 6);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_uuid.c:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[3];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_filesystem.h:39:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[PATH_MAX]; /* static so auto-zeroed */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_filesystem.h:51:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[PATH_MAX]; /* static so auto-zeroed */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_filesystem.h:71:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[PATH_MAX]; /* static so auto-zeroed */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_filesystem.h:83:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[PATH_MAX]; /* static so auto-zeroed */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_hugepages.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filepath[MAX_HUGEPAGE_PATH]; /**< path to backing file on filesystem */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_internal_cfg.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hugedir[PATH_MAX];    /**< dir where hugetlbfs is mounted */
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_trace.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[TRACE_POINT_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_trace.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.c:73:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(resp, req, sizeof(*req));
data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.c:295:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(resp, req, sizeof(*resp));
data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.c:318:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(resp, req, sizeof(*resp));
data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.c:374:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mp_req.param, req, sizeof(*req));
data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.c:402:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mp_req.param, req, sizeof(*req));
data/dpdk-20.11~rc3/lib/librte_eal/common/hotplug_mp.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devargs[EAL_DEV_MP_DEV_ARGS_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_heap.c:1109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbarray_name[RTE_FBARRAY_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_heap.c:1343:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char heap_name[RTE_HEAP_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_heap.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_HEAP_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_mp.c:328:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&entry->user_req, m, sizeof(*m));
data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_mp.c:682:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg_req, user_req, sizeof(*msg_req));
data/dpdk-20.11~rc3/lib/librte_eal/common/malloc_mp.c:690:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&entry->user_req, user_req, sizeof(*user_req));
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char run_dir[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:149:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((f = fopen(filename, "r")) == NULL) {
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:205:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		mem_cfg_fd = open(pathname, O_RDWR | O_CREAT, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:253:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rte_mem_cfg_addr, config->mem_config, sizeof(struct rte_mem_config));
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:278:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		mem_cfg_fd = open(pathname, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:365:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (((mem_cfg_fd = open(pathname, O_RDWR)) >= 0) &&
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:647:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open("/dev/io", O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cpuset[RTE_CPU_AFFINITY_STR_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal.c:670:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char thread_name[RTE_MAX_THREAD_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_alarm.c:59:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	intr_handle.fd = open("/dev/zero", O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_hugepage_info.c:27:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(filename, flags, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_hugepage_info.c:88:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(CONTIGMEM_DEV, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_hugepage_info.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_hpi, hpi, sizeof(internal_conf->hugepage_info));
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_hugepage_info.c:157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hpi, tmp_hpi, sizeof(internal_conf->hugepage_info));
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_interrupts.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char charbuf[16];                /* for others */
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_memory.c:124:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char physaddr_str[64];
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_memory.c:270:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd_hugepage = open(cur_hpi->hugedir, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_thread.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cpuset[RTE_CPU_AFFINITY_STR_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_devargs.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_DEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_eal.h:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MP_MAX_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_fbarray.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_FBARRAY_NAME_LEN]; /**< name associated with an array */
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_memzone.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE];  /**< Name of the memory zone. */
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_service_component.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SERVICE_NAME_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_tailq.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_TAILQ_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_tailq.h:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char name[RTE_TAILQ_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_trace_point.h:286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char thread_name[__RTE_TRACE_EMIT_STRING_LEN_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_trace_point.h:365:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mem, &(in), sizeof(in)); \
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_uuid.h:24:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char rte_uuid_t[16];
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_uuid.h:60:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(rte_uuid_t));
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_version.h:44:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char version[32];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char run_dir[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:239:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((f = fopen(filename, "r")) == NULL) {
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:295:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		mem_cfg_fd = open(pathname, O_RDWR | O_CREAT, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:343:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rte_mem_cfg_addr, config->mem_config, sizeof(struct rte_mem_config));
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:370:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		mem_cfg_fd = open(pathname, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:457:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (((mem_cfg_fd = open(pathname, O_RDWR)) >= 0) &&
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:561:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char * arg[RTE_MAX_NUMA_NODES];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:965:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char logid[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:966:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cpuset[RTE_CPU_AFFINITY_STR_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:967:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char thread_name[RTE_MAX_THREAD_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal.c:1397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sysfs_mod_name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_cpuflags.c:52:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int auxv_fd = open("/proc/self/auxv", O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_dev.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char action[EAL_UEV_MSG_ELEM_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_dev.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subsystem[EAL_UEV_MSG_ELEM_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_dev.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pci_slot_name[EAL_UEV_MSG_ELEM_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_dev.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[EAL_UEV_MSG_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:50:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(filename, flags, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX], socketpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:183:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fd = fopen(proc_meminfo, "r");
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *splitstr[_FIELDNAME_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:216:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:221:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fd = fopen(proc_mounts, "r");
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:448:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		hpi->lock_descriptor = open(hpi->hugedir, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:521:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_hpi, hpi, sizeof(internal_conf->hugepage_info));
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_hugepage_info.c:552:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hpi, tmp_hpi, sizeof(internal_conf->hugepage_info));
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char charbuf[16];                /* for others */
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[MSIX_IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:298:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fd_ptr[RTE_INTR_VEC_RXTX_OFFSET], intr_handle->efds,
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[MSIX_IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char irq_set_buf[IRQ_SET_BUF_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_lcore.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char segname[250]; /* as per manpage, limit is 249 bytes plus null */
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:309:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(path, O_CREAT | O_RDWR, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:347:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(path, O_CREAT | O_RDWR, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:505:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:852:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dir_fd = open(wa->hi->hugedir, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:959:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dir_fd = open(wa->hi->hugedir, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:1323:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dir_fd = open(hi->hugedir, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memalloc.c:1417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:110:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/proc/self/pagemap", O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:208:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int retval, fd = open(RANDOMIZE_VA_SPACE_FILE, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:338:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(hf->filepath, O_CREAT | O_RDWR, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hugedir_str[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:430:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("/proc/self/numa_maps", "r");
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:542:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_CREAT | O_RDWR, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:571:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dst[dst_pos], &src[src_pos], sizeof(struct hugepage_file));
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:733:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(hfile->filepath, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:1522:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_hugepage = open(eal_hugepage_data_path(), O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:1557:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(hf->filepath, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_thread.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cpuset[RTE_CPU_AFFINITY_STR_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_thread.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char truncated[16];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_timer.c:154:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(DEV_HPET, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:252:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(dst, src, sizeof(*src));
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:278:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		vfio_group_fd = open(filename, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:291:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			vfio_group_fd = open(filename, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:910:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char vf_token_str[RTE_UUID_STRLEN];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:911:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dev[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1236:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		vfio_container_fd = open(VFIO_CONTAINER_PATH, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linkname[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tok[16], *group_tok, *end;
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1941:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(VFIO_NOIOMMU_MODE, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/ppc/include/rte_memcpy.h:79:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((dst), (src), (n)) :          \
data/dpdk-20.11~rc3/lib/librte_eal/ppc/rte_cpuflags.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CPU_FLAG_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/unix/eal_file.c:35:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ret = open(path, sys_flags, 0600);
data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_debug.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR)];
data/dpdk-20.11~rc3/lib/librte_eal/windows/eal_thread.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cpuset[RTE_CPU_AFFINITY_STR_LEN];
data/dpdk-20.11~rc3/lib/librte_eal/windows/getopt.c:106:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			((char **) nargv)[pos] = nargv[cstart];
data/dpdk-20.11~rc3/lib/librte_eal/windows/getopt.c:108:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			((char **)nargv)[cstart] = swap;
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/dirent.h:70:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t d_name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/dirent.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d_name[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/dirent.h:391:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t wname[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/rte_os.h:86:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[128];
data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_cpuflags.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CPU_FLAG_NAME_MAX_LEN];       /**< String for printing */
data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_cycles.c:36:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/cpu/0/msr", O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_hypervisor.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[13];
data/dpdk-20.11~rc3/lib/librte_eal/x86/rte_hypervisor.c:30:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(name + (reg - 1) * 4, &regs[reg], 4);
data/dpdk-20.11~rc3/lib/librte_efd/rte_efd.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_EFD_NAMESIZE]; /**< Name of the efd table. */
data/dpdk-20.11~rc3/lib/librte_efd/rte_efd.c:507:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_efd/rte_efd.c:826:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&(table->chunks[i][chunk_id].groups[group_id]),
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:1312:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&orig_conf, &dev->data->dev_conf, sizeof(dev->data->dev_conf));
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:4548:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:4582:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char z_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:5598:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	port_id = atoi(params);
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.h:1601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[RTE_ETH_BURST_MODE_INFO_SIZE]; /**< burst mode information */
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.h:1636:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE]; /**< The statistic name. */
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.h:1801:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_MAX_OWNER_NAME_LEN]; /**< The owner name. */
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev_core.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_NAME_MAX_LEN]; /**< Unique identifier name */
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_crypto_adapter.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[CRYPTO_ADAPTER_MEM_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_crypto_adapter.c:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[CRYPTO_ADAPTER_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_rx_adapter.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[ETH_RX_ADAPTER_MEM_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_rx_adapter.c:1259:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char thread_name[RTE_MAX_THREAD_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_rx_adapter.c:1927:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[ETH_RX_ADAPTER_SERVICE_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_tx_adapter.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[TXA_MEM_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_tx_adapter.c:328:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(txa_ethdev, txa->txa_ethdev,
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_tx_adapter.c:642:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[TXA_SERVICE_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[DATA_MZ_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DATA_MZ_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:800:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char swtim_name[SWTIM_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_timer_adapter.c:819:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[SWTIM_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_EVENTDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1463:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_EVENTDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1607:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char qid_name[32];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.h:1320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_EVENTDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.h:1891:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_EVENT_DEV_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev_pmd_pci.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eventdev_name[RTE_EVENTDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev_pmd_pci.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eventdev_name[RTE_EVENTDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_fib/dir24_8.c:502:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[DIR24_8_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_fib/rte_fib.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[RTE_FIB_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_fib/rte_fib.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dp_name[sizeof(void *)];
data/dpdk-20.11~rc3/lib/librte_fib/rte_fib.c:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[RTE_FIB_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_fib/rte_fib6.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[FIB6_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_fib/rte_fib6.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dp_name[sizeof(void *)];
data/dpdk-20.11~rc3/lib/librte_fib/rte_fib6.c:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[FIB6_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_fib/trie.c:612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[TRIE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_flow_classify/rte_flow_classify.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_FLOW_CLASSIFIER_MAX_NAME_SZ];
data/dpdk-20.11~rc3/lib/librte_flow_classify/rte_flow_classify.c:405:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&table->ops, params->ops, sizeof(struct rte_table_ops));
data/dpdk-20.11~rc3/lib/librte_flow_classify/rte_flow_classify.c:470:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rule->u.key.key_del.field_value[PROTO_FIELD_IPV4],
data/dpdk-20.11~rc3/lib/librte_graph/graph_populate.c:61:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(graph->name, _graph->name, RTE_GRAPH_NAMESIZE);
data/dpdk-20.11~rc3/lib/librte_graph/graph_populate.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(node->name, graph_node->node->name, RTE_GRAPH_NAMESIZE);
data/dpdk-20.11~rc3/lib/librte_graph/graph_populate.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(node->parent, parent, RTE_GRAPH_NAMESIZE);
data/dpdk-20.11~rc3/lib/librte_graph/graph_private.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_NODE_NAMESIZE]; /**< Name of the node. */
data/dpdk-20.11~rc3/lib/librte_graph/graph_private.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_GRAPH_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_graph/graph_stats.c:172:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cluster->stat.name, graph_node->node->name, RTE_NODE_NAMESIZE);
data/dpdk-20.11~rc3/lib/librte_graph/rte_graph.h:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_NODE_NAMESIZE];	/**< Name of the node. */
data/dpdk-20.11~rc3/lib/librte_graph/rte_graph.h:428:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_NODE_NAMESIZE]; /**< Name of the node. */
data/dpdk-20.11~rc3/lib/librte_graph/rte_graph_worker.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_GRAPH_NAMESIZE];	/**< Name of the graph. */
data/dpdk-20.11~rc3/lib/librte_graph/rte_graph_worker.h:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parent[RTE_NODE_NAMESIZE];	/**< Parent node name. */
data/dpdk-20.11~rc3/lib/librte_graph/rte_graph_worker.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_NODE_NAMESIZE];	/**< Name of the node. */
data/dpdk-20.11~rc3/lib/librte_gro/rte_gro.c:302:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pkts[i], unprocess_pkts,
data/dpdk-20.11~rc3/lib/librte_gro/rte_gro.c:371:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pkts, unprocess_pkts, sizeof(struct rte_mbuf *) *
data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.c:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ext_ring_name[RTE_RING_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.c:1080:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_k->key, key, h->key_len);
data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.c:1516:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcu_dq_name[RTE_RCU_QSBR_DQ_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[0];
data/dpdk-20.11~rc3/lib/librte_hash/rte_cuckoo_hash.h:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_HASH_NAMESIZE];   /**< Name of the hash. */
data/dpdk-20.11~rc3/lib/librte_hash/rte_fbk_hash.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash_name[RTE_FBK_HASH_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_hash/rte_fbk_hash.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_FBK_HASH_NAMESIZE];	/**< Name of the hash. */
data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_IPSEC_SAD_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash_name[RTE_HASH_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c:259:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sad_name[RTE_IPSEC_SAD_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c:297:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sad->name, sad_name, sizeof(sad_name));
data/dpdk-20.11~rc3/lib/librte_ipsec/ipsec_sad.c:387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sad_name[RTE_IPSEC_SAD_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ipsec/sa.c:345:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sa->hdr, prm->tun.hdr, sa->hdr_len);
data/dpdk-20.11~rc3/lib/librte_jobstats/rte_jobstats.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_JOBSTATS_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_KNI_NAMESIZE];        /**< KNI interface name */
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:110:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		kni_fd = open("/dev/" KNI_DEVICE, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:255:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&kni->ops, ops, sizeof(struct rte_kni_ops));
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:268:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dev_info.mac_addr, conf->mac_addr, RTE_ETHER_ADDR_LEN);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:765:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&kni->ops, ops, sizeof(struct rte_kni_ops));
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:785:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:786:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char old_carrier[2];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:797:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_KNI_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_common.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad1[2];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_common.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad4[2];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_common.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad2[4];
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_common.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_KNI_NAMESIZE];  /**< Network device name for KNI */
data/dpdk-20.11~rc3/lib/librte_latencystats/rte_latencystats.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_ETH_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_latencystats/rte_latencystats.c:222:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *ptr_strings[NUM_LATENCY_STATS] = {0};
data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_LPM_NAMESIZE];        /**< Name of the lpm. */
data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[RTE_LPM_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm.c:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcu_dq_name[RTE_RCU_QSBR_DQ_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm6.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_LPM6_NAMESIZE];    /**< Name of the lpm. */
data/dpdk-20.11~rc3/lib/librte_lpm/rte_lpm6.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[RTE_LPM6_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf.c:69:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mbp_priv, user_mbp_priv, sizeof(*mbp_priv));
data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_dyn.c:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(params, &mbuf_dynfield->params, sizeof(*params));
data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_dyn.c:396:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(params, &mbuf_dynflag->params, sizeof(*params));
data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_dyn.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MBUF_DYN_NAMESIZE]; /**< Name of the field. */
data/dpdk-20.11~rc3/lib/librte_mbuf/rte_mbuf_dyn.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MBUF_DYN_NAMESIZE]; /**< Name of the dynamic flag. */
data/dpdk-20.11~rc3/lib/librte_member/rte_member.h:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMBER_NAMESIZE]; /* Name of this set summary. */
data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.c:474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.c:786:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.h:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE]; /**< Name of mempool. */
data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool.h:615:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMPOOL_OPS_NAMESIZE]; /**< Name of mempool ops struct. */
data/dpdk-20.11~rc3/lib/librte_metrics/rte_metrics.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_METRICS_MAX_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_metrics/rte_metrics.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_METRICS_MAX_NAME_LEN];
data/dpdk-20.11~rc3/lib/librte_metrics/rte_metrics_telemetry.c:382:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *stat_names[num_stat_names];
data/dpdk-20.11~rc3/lib/librte_net/net_crc_neon.c:154:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer, data, data_len);
data/dpdk-20.11~rc3/lib/librte_net/net_crc_sse.c:182:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer, data, data_len);
data/dpdk-20.11~rc3/lib/librte_node/ethdev_ctrl.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_NODE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_node/ethdev_rx.c:190:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ctx, &elem->ctx, sizeof(ethdev_rx_node_ctx_t));
data/dpdk-20.11~rc3/lib/librte_node/ip4_lookup.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char abuf[INET6_ADDRSTRLEN];
data/dpdk-20.11~rc3/lib/librte_node/ip4_lookup.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[RTE_LPM_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_node/ip4_rewrite.c:326:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(nh->rewrite_data, rewrite_data, rewrite_len);
data/dpdk-20.11~rc3/lib/librte_pdump/rte_pdump.c:42:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char device[DEVICE_ID_SIZE];
data/dpdk-20.11~rc3/lib/librte_pdump/rte_pdump.c:49:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char device[DEVICE_ID_SIZE];
data/dpdk-20.11~rc3/lib/librte_pdump/rte_pdump.c:490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DEVICE_ID_SIZE];
data/dpdk-20.11~rc3/lib/librte_pdump/rte_pdump.c:534:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[DEVICE_ID_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_PIPELINE_MAX_NAME_SZ];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.c:371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&table->ops, params->ops, sizeof(struct rte_table_ops));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.c:442:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(table->default_entry, default_entry, table->entry_size);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.c:472:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry, table->default_entry, table->entry_size);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.c:835:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port->ops, params->ops, sizeof(struct rte_port_in_ops));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_pipeline.c:885:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&port->ops, params->ops, sizeof(struct rte_port_out_ops));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_port_in_action.c:75:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data->port_id, cfg->port_id, sizeof(cfg->port_id));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_port_in_action.c:86:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data->port_id, p->port_id, sizeof(p->port_id));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_port_in_action.c:151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, action_cfg, action_cfg_size(type));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_port_in_action.c:344:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&action->cfg, &profile->cfg, sizeof(profile->cfg));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_port_in_action.c:345:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&action->data, &profile->data, sizeof(profile->data));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:324:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_entry->key, entry->key, table->params.key_size);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:338:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new_entry->key_mask,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:368:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new_entry->action_data,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:698:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ts_next->default_action_data,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1172:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ts_next->default_action_data,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[RTE_SWX_CTL_ENTRY_TOKENS_MAX];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1414:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&entry->key[(mf->offset - table->mf[0].offset) / 8],
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1459:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&entry->action_data[arg_offset],
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_CTL_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.h:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_CTL_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.h:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_CTL_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.h:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char args[RTE_SWX_CTL_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:542:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:543:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char jmp_label[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:581:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:582:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char args[RTE_SWX_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1189:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&elem->ops, ops, sizeof(*ops));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:1351:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&elem->ops, ops, sizeof(*ops));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:2553:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->ptr - offset, h0->ptr, h0->n_bytes);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:2572:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&t->header_out_storage[offset], h->ptr, h->n_bytes);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:2577:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->ptr - offset, t->header_out_storage, offset);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:3352:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, n_bytes);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:5313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tokens[RTE_SWX_INSTRUCTION_TOKENS_MAX];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:5939:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&instructions[pos], instr, sizeof(*instr));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:5940:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&instruction_data[pos], data, sizeof(*data));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:6378:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&elem->ops, ops, sizeof(*ops));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:6554:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->default_action_data,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:6671:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ts->default_action_data,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline.c:7156:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(table_ops, &t->type->ops, sizeof(*table_ops));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[RTE_SWX_INSTRUCTION_SIZE], *instr;
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:1008:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[RTE_SWX_INSTRUCTION_SIZE], *instr;
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:1094:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[MAX_LINE_LENGTH];
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:1095:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *tokens[MAX_TOKENS], *ptr = line;
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:876:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->ipv6.src_addr,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:879:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->ipv6.dst_addr,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:911:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->ipv6.src_addr,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:914:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->ipv6.dst_addr,
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:2296:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, action_cfg, action_cfg_size(type));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:2396:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ap->cfg.common, common, sizeof(*common));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:2520:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&action->cfg, &profile->cfg, sizeof(profile->cfg));
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_table_action.c:2521:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&action->data, &profile->data, sizeof(profile->data));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_ethdev.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_ethdev.c:277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_ethdev.c:490:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_eventdev.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_eventdev.c:310:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_eventdev.c:550:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_fd.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_fd.c:299:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_fd.c:484:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.c:140:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pkts, &p->frags[p->pos_frags], n_pkts * sizeof(void *));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.c:147:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pkts, &p->frags[p->pos_frags], p->n_frags * sizeof(void *));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.c:209:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst, src, p->metadata_size);
data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.c:218:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pkts[n_pkts_out], p->frags,
data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.c:226:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&pkts[n_pkts_out], p->frags,
data/dpdk-20.11~rc3/lib/librte_port/rte_port_frag.c:254:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_kni.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_kni.c:271:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_kni.c:481:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_ras.c:305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_ring.c:127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_ring.c:395:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_ring.c:728:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_sched.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_sched.c:269:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_source_sink.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pcap_errbuf[PCAP_ERRBUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_port/rte_port_source_sink.c:295:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_source_sink.c:594:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_sym_crypto.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_sym_crypto.c:305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_port_sym_crypto.c:517:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_ethdev.c:160:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_ethdev.c:294:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_source_sink.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pcap_errbuf[PCAP_ERRBUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_source_sink.c:194:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_port/rte_swx_port_source_sink.c:323:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &p->stats, sizeof(p->stats));
data/dpdk-20.11~rc3/lib/librte_power/channel_commands.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vm_name[VM_MAX_NAME_SZ];
data/dpdk-20.11~rc3/lib/librte_power/channel_commands.h:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vm_name[VM_MAX_NAME_SZ];
data/dpdk-20.11~rc3/lib/librte_power/channel_commands.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vm_name[VM_MAX_NAME_SZ];
data/dpdk-20.11~rc3/lib/librte_power/guest_channel.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char glob_path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/guest_channel.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fd_path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/guest_channel.c:77:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fd_path, O_RDWR);
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char governor_ori[32];               /**< Original governor name */
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:147:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "rw+");
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *freqs[RTE_MAX_LCORE_FREQS];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:203:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "r");
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:271:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "rw+");
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:380:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_acpi_cpufreq.c:387:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "rw+");
data/dpdk-20.11~rc3/lib/librte_power/power_common.c:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_common.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readbuf[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_common.c:29:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "r");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char governor_ori[32];               /**< Original governor name */
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:126:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fullpath, O_RDONLY);
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath_min[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath_max[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath_base[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf_base[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:170:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_min = fopen(fullpath_min, "rw+");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:176:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_max = fopen(fullpath_max, "rw+");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:188:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_base = fopen(fullpath_base, "r");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:338:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:345:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "rw+");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:393:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:400:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fullpath, "rw+");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf_min[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:443:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf_max[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath_min[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:445:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath_max[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:457:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_min = fopen(fullpath_min, "r");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:460:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_max = fopen(fullpath_max, "r");
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:543:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf_cur[BUFSIZ];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath_cur[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:552:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_cur = fopen(fullpath_cur, "r");
data/dpdk-20.11~rc3/lib/librte_rawdev/rte_rawdev.h:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAWDEV_NAME_MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_rawdev/rte_rawdev.h:456:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_RAW_DEV_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_rcu/rte_rcu_qsbr.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[dq->esize];
data/dpdk-20.11~rc3/lib/librte_rcu/rte_rcu_qsbr.c:392:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dq_elem->elem, e, dq->esize - __RTE_QSBR_TOKEN_SIZE);
data/dpdk-20.11~rc3/lib/librte_rcu/rte_rcu_qsbr.c:438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[dq->esize];
data/dpdk-20.11~rc3/lib/librte_regexdev/rte_regexdev.h:1096:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_REGEXDEV_XSTATS_NAME_SIZE];
data/dpdk-20.11~rc3/lib/librte_regexdev/rte_regexdev_core.h:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_name[RTE_REGEXDEV_NAME_MAX_LEN]; /**< Unique identifier name */
data/dpdk-20.11~rc3/lib/librte_reorder/rte_reorder.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_REORDER_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_reorder/rte_reorder.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_REORDER_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_rib/rte_rib.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[RTE_RIB_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_rib/rte_rib.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[RTE_RIB_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_rib/rte_rib6.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[RTE_RIB6_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_rib/rte_rib6.c:456:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mem_name[RTE_RIB6_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring.c:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_core.h:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_MEMZONE_NAMESIZE] __rte_cache_aligned;
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:195:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(ring + idx),
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:199:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(ring + idx),
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:204:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(ring + idx),
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:208:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(ring + idx),
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:329:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(obj + i), (void *)(ring + idx), 32);
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:332:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(obj + i), (void *)(ring + idx), 16);
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:336:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(obj + i), (void *)(ring + idx), 16);
data/dpdk-20.11~rc3/lib/librte_ring/rte_ring_elem.h:339:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)(obj + i), (void *)(ring + idx), 16);
data/dpdk-20.11~rc3/lib/librte_sched/rte_sched.c:1168:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s->qsize, params->qsize, sizeof(params->qsize));
data/dpdk-20.11~rc3/lib/librte_sched/rte_sched.c:1627:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &s->stats, sizeof(struct rte_sched_subport_stats));
data/dpdk-20.11~rc3/lib/librte_sched/rte_sched.c:1680:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, &qe->stats, sizeof(struct rte_sched_queue_stats));
data/dpdk-20.11~rc3/lib/librte_stack/rte_stack.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mz_name[RTE_MEMZONE_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_stack/rte_stack.h:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_STACK_NAMESIZE] __rte_cache_aligned;
data/dpdk-20.11~rc3/lib/librte_table/rte_swx_table_em.c:341:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&bkt_data[1],
data/dpdk-20.11~rc3/lib/librte_table/rte_swx_table_em.c:362:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&bkt_data[1],
data/dpdk-20.11~rc3/lib/librte_table/rte_swx_table_em.c:430:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&t->params, params, sizeof(*params));
data/dpdk-20.11~rc3/lib/librte_table/rte_swx_table_em.c:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->key_mask, params->key_mask0, params->key_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[2][RTE_ACL_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:128:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&acl->cfg.defs[0], &p->field_format[0],
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:264:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&acl_rule.field[0],
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:290:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*entry_ptr, entry, acl->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:307:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rule_location, &acl_rule, acl->acl_params.rule_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:328:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*entry_ptr, entry, acl->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:409:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry, &acl->memory[pos * acl->entry_size],
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:496:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&acl_rule.field[0],
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:522:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(entries_ptr[i], entries[i], acl->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:542:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rule_location, &acl_rule, acl->acl_params.rule_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:590:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entries_ptr[i], entries[i], acl->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:709:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(entries[i], &acl->memory[rule_pos[i] * acl->entry_size],
data/dpdk-20.11~rc3/lib/librte_table/rte_table_acl.c:781:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &acl->stats, sizeof(acl->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_array.c:135:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(table_entry, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_array.c:190:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &array->stats, sizeof(array->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_cuckoo.c:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(existing_entry, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_cuckoo.c:192:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_entry, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_cuckoo.c:221:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(entry, entry_ptr, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_cuckoo.c:306:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_ext.c:272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->key_mask, p->key_mask, p->key_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_ext.c:327:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(data, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_ext.c:360:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(data, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_ext.c:391:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_ext.c:433:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(entry, data, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_ext.c:994:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:277:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:295:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:308:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&bucket->data[pos * f->entry_size], entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:346:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(entry, bucket_data, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:489:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:509:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:528:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&bucket->data[0], entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:570:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(entry, bucket_data, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key16.c:1159:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:285:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:303:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:316:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&bucket->data[pos * f->entry_size], entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:354:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(entry, bucket_data, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:503:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:525:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:545:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&bucket->data[0], entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:587:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(entry, bucket_data, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key32.c:1192:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:266:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:283:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:295:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&bucket->data[pos * f->entry_size], entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:332:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(entry, bucket_data, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:474:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:496:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bucket_data, entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:516:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&bucket->data[0], entry, f->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:559:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(entry, bucket_data,
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_key8.c:1126:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_lru.c:245:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->key_mask, p->key_mask, p->key_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_lru.c:301:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_lru.c:331:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_lru.c:350:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, entry, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_lru.c:389:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(entry, data, t->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_hash_lru.c:942:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm.c:226:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nht_entry, entry, lpm->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm.c:296:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry, &lpm->nht[nht_pos * lpm->entry_size],
data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm.c:349:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm_ipv6.c:224:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nht_entry, entry, lpm->entry_size);
data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm_ipv6.c:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry, &lpm->nht[nht_pos * lpm->entry_size],
data/dpdk-20.11~rc3/lib/librte_table/rte_table_lpm_ipv6.c:351:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_table/rte_table_stub.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stats, &t->stats, sizeof(t->stats));
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[MAX_CMD_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char help[MAX_HELP_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[sizeof(((struct sockaddr_un *)0)->sun_path)];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char telemetry_log_error[1024]; /* Will contain error on init failure */
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_buf[MAX_OUTPUT_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char temp[buf_len];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char temp[buf_len];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char out_buf[MAX_CMD_LEN + 10];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info_str[1024];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:371:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char path[PATH_MAX];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_data.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[RTE_TEL_MAX_STRING_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_data.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_TEL_MAX_STRING_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_data.h:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[RTE_TEL_MAX_SINGLE_STRING_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_json.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char action[MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[MAX_LEN];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[BUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:95:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, &data[strlen(":\"")], strlen(data));
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_buf[100000];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_buf[100000];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer_recv[BUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[BUF_SIZE];
data/dpdk-20.11~rc3/lib/librte_vhost/fd_man.c:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char charbuf[16];
data/dpdk-20.11~rc3/lib/librte_vhost/iotlb.c:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pool_name[RTE_MEMPOOL_NAMESIZE];
data/dpdk-20.11~rc3/lib/librte_vhost/rte_vdpa.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[RTE_VDPA_STATS_NAME_SIZE]; /**< The statistic name */
data/dpdk-20.11~rc3/lib/librte_vhost/socket.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char control[CMSG_SPACE(max_fds * sizeof(int))];
data/dpdk-20.11~rc3/lib/librte_vhost/socket.c:141:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fds, CMSG_DATA(cmsg), got_fds * sizeof(int));
data/dpdk-20.11~rc3/lib/librte_vhost/socket.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char control[CMSG_SPACE(fdsize)];
data/dpdk-20.11~rc3/lib/librte_vhost/socket.c:183:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(CMSG_DATA(cmsg), fds, fdsize);
data/dpdk-20.11~rc3/lib/librte_vhost/vhost.c:888:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(m->regions, dev->mem->regions, size);
data/dpdk-20.11~rc3/lib/librte_vhost/vhost.h:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ifname[IF_NAME_SZ];
data/dpdk-20.11~rc3/lib/librte_vhost/vhost.h:529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char packet[VHOST_MAX_PRINT_BUFF]; \
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_crypto.c:1432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[128];
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_crypto.c:1571:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[128];
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *vhost_message_str[VHOST_USER_MAX] = {
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:509:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vq, old_vq, sizeof(*vq));
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:563:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dev, old_dev, sizeof(*dev));
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:809:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&vq->ring_addrs, addr, sizeof(*addr));
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:1336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fname[20] = "/tmp/memfd-XXXXXX";
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:1345:9:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
		mfd = mkstemp(fname);
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:2158:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dev->mac.addr_bytes, mac, 6);
data/dpdk-20.11~rc3/app/proc-info/main.c:195:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(host_id)) {
data/dpdk-20.11~rc3/app/proc-info/main.c:390:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    (strncmp(cnt_name, "rx_", strlen("rx_")) == 0)) {
data/dpdk-20.11~rc3/app/proc-info/main.c:391:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(type_end, "_errors", strlen("_errors")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:393:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_dropped", strlen("_dropped")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:395:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_bytes", strlen("_bytes")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:397:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_packets", strlen("_packets")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:400:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen("_placement")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:402:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_buff", strlen("_buff")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:408:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strncmp(cnt_name, "tx_", strlen("tx_"))) == 0) {
data/dpdk-20.11~rc3/app/proc-info/main.c:409:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(type_end, "_errors", strlen("_errors")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:411:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_dropped", strlen("_dropped")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:413:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_bytes", strlen("_bytes")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:415:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_packets", strlen("_packets")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:421:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   (strncmp(cnt_name, "flow_", strlen("flow_"))) == 0) {
data/dpdk-20.11~rc3/app/proc-info/main.c:422:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(type_end, "_filters", strlen("_filters")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:424:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_errors", strlen("_errors")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:426:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncmp(type_end, "_filters", strlen("_filters")) == 0)
data/dpdk-20.11~rc3/app/proc-info/main.c:429:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   (strncmp(cnt_name, "mac_", strlen("mac_"))) == 0) {
data/dpdk-20.11~rc3/app/proc-info/main.c:430:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(type_end, "_errors", strlen("_errors")) == 0)
data/dpdk-20.11~rc3/app/test-bbdev/main.c:209:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			TEST_ASSERT(strlen(optarg) > 0,
data/dpdk-20.11~rc3/app/test-bbdev/main.c:214:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			TEST_ASSERT(strlen(optarg) > 0,
data/dpdk-20.11~rc3/app/test-bbdev/main.c:226:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ret = rte_strsplit(optarg, strlen(optarg),
data/dpdk-20.11~rc3/app/test-bbdev/main.c:250:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			TEST_ASSERT(strlen(optarg) > 0,
data/dpdk-20.11~rc3/app/test-bbdev/main.c:258:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			TEST_ASSERT(strlen(optarg) > 0,
data/dpdk-20.11~rc3/app/test-bbdev/main.c:263:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			TEST_ASSERT(strlen(optarg) > 0,
data/dpdk-20.11~rc3/app/test-bbdev/main.c:268:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			TEST_ASSERT(strlen(optarg) > 0,
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:36:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (end = start + strlen(start); end > start + 1; end--) {
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:51:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strncmp(pre, str, strlen(pre)) == 0;
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:96:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*data_length = *data_length + (strlen(tok) - strlen("0x"))/2;
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:96:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*data_length = *data_length + (strlen(tok) - strlen("0x"))/2;
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:405:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (sscanf(key_token + strlen(prefix), "%u", &id) != 1) {
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1382:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		entry = realloc(entry, strlen(line) + 1);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1384:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			printf("Fail to realloc %zu bytes\n", strlen(line) + 1);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1392:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (entry[strlen(entry) - 1] == ','
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1393:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			|| entry[strlen(entry) - 1] == '=') {
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1399:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(line) +
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1400:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(entry) + 1);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1404:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							strlen(line) +
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1405:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							strlen(entry) + 1);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1412:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strcpy(&entry[strlen(entry)], line);
data/dpdk-20.11~rc3/app/test-bbdev/test_bbdev_vector.c:1414:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (entry[strlen(entry) - 1] != ',')
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options_parse.c:423:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(arg) > (sizeof(test_data->driver_name) - 1))
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options_parse.c:435:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(arg) > (sizeof(test_data->input_file) - 1))
data/dpdk-20.11~rc3/app/test-compress-perf/comp_perf_options_parse.c:607:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(lgopts[opt_idx].name)) == 0)
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:420:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(arg) > (sizeof(opts->device_type) - 1))
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:423:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(opts->device_type, arg, sizeof(opts->device_type) - 1);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:508:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sizeof(char) * (strlen(arg) + 3), 0);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:509:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(test_name, strlen(arg) + 3, "[%s]", arg);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:885:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(opts->device_type, "crypto_aesni_mb",
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_options_parsing.c:970:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(lgopts[opt_idx].name)) == 0)
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:197:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (end = start + strlen(start); end > start + 1; end--) {
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:461:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t read;
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:485:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (line[0] == '[' && line[strlen(line) - 1] == ']' && tc_found)
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:488:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (line[0] == '[' && line[strlen(line) - 1] == ']')
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:505:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					sizeof(char) * strlen(line) + 1, 0);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:512:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (entry[strlen(entry) - 1] == ','
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:513:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			|| entry[strlen(entry) - 1] == '=') {
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:520:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						* (strlen(line) + strlen(entry))
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:520:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						* (strlen(line) + strlen(entry))
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:527:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strcpy(&entry[strlen(entry)], line);
data/dpdk-20.11~rc3/app/test-crypto-perf/cperf_test_vector_parsing.c:529:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (entry[strlen(entry) - 1] != ',')
data/dpdk-20.11~rc3/app/test-eventdev/evt_options.c:25:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(opt->test_name, "order_queue", EVT_TEST_NAME_MAX_LEN);
data/dpdk-20.11~rc3/app/test-eventdev/evt_options.c:397:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(lgopts[opt_idx].name)) == 0)
data/dpdk-20.11~rc3/app/test-eventdev/evt_test.c:28:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strncmp(entry->test.name, name, strlen(name)))
data/dpdk-20.11~rc3/app/test-eventdev/parser.c:289:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src);
data/dpdk-20.11~rc3/app/test-eventdev/parser.c:323:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(corelist);
data/dpdk-20.11~rc3/app/test-fib/main.c:232:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (in[strlen(in) - 1] == '%') {
data/dpdk-20.11~rc3/app/test-fib/main.c:233:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			in[strlen(in) - 1] = 0;
data/dpdk-20.11~rc3/app/test-flow-perf/main.c:1074:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf[strlen(buf) - 1] = '\0';
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:2370:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	key_len = strlen(res->key);
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:7841:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cmdline_fixed_string_t read;
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:7857:55:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	TOKEN_STRING_INITIALIZER(struct cmd_read_reg_result, read, "read");
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:7880:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cmdline_fixed_string_t read;
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:7899:65:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	TOKEN_STRING_INITIALIZER(struct cmd_read_reg_bit_field_result, read,
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:7935:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cmdline_fixed_string_t read;
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:7952:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	TOKEN_STRING_INITIALIZER(struct cmd_read_reg_bit_result, read, "read");
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:8140:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cmdline_fixed_string_t read;
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:8161:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	TOKEN_STRING_INITIALIZER(struct cmd_read_rxd_txd_result, read, "read");
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:11850:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	key_len = strlen(res->key) / 2;
data/dpdk-20.11~rc3/app/test-pmd/cmdline.c:13702:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	file_num = rte_strsplit(filepath, strlen(filepath), file_fld, 2, ',');
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:4372:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(full) <= partial_len)
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6559:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, str, len);
data/dpdk-20.11~rc3/app/test-pmd/cmdline_flow.c:6734:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = parse_int(ctx, token, str, strlen(str), buf, size);
data/dpdk-20.11~rc3/app/test-pmd/config.c:618:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strncmp(da.name, dev->name, strlen(dev->name)))
data/dpdk-20.11~rc3/app/test-pmd/config.c:2275:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (file_name && strlen(file_name)) {
data/dpdk-20.11~rc3/app/test-pmd/config.c:2289:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (file_name && strlen(file_name))
data/dpdk-20.11~rc3/app/test-pmd/config.c:4081:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen (fwd_modes) == 0) {
data/dpdk-20.11~rc3/app/test-pmd/config.c:4083:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
			strncat(fwd_modes, fwd_eng->fwd_mode_name,
data/dpdk-20.11~rc3/app/test-pmd/config.c:4084:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					sizeof(fwd_modes) - strlen(fwd_modes) - 1);
data/dpdk-20.11~rc3/app/test-pmd/config.c:4085:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
			strncat(fwd_modes, separator,
data/dpdk-20.11~rc3/app/test-pmd/config.c:4086:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					sizeof(fwd_modes) - strlen(fwd_modes) - 1);
data/dpdk-20.11~rc3/app/test-pmd/config.c:4088:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwd_modes[strlen(fwd_modes) - strlen(separator)] = '\0';
data/dpdk-20.11~rc3/app/test-pmd/config.c:4088:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwd_modes[strlen(fwd_modes) - strlen(separator)] = '\0';
data/dpdk-20.11~rc3/app/test-pmd/config.c:4102:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(fwd_modes) == 0) {
data/dpdk-20.11~rc3/app/test-pmd/config.c:4106:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
			strncat(fwd_modes, fwd_eng->fwd_mode_name,
data/dpdk-20.11~rc3/app/test-pmd/config.c:4108:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(fwd_modes) - 1);
data/dpdk-20.11~rc3/app/test-pmd/config.c:4109:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
			strncat(fwd_modes, separator,
data/dpdk-20.11~rc3/app/test-pmd/config.c:4111:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(fwd_modes) - 1);
data/dpdk-20.11~rc3/app/test-pmd/config.c:4113:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwd_modes[strlen(fwd_modes) - strlen(separator)] = '\0';
data/dpdk-20.11~rc3/app/test-pmd/config.c:4113:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwd_modes[strlen(fwd_modes) - strlen(separator)] = '\0';
data/dpdk-20.11~rc3/app/test-pmd/config.c:5190:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, pkg_size);
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:3973:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cmdline_filename) != 0)
data/dpdk-20.11~rc3/app/test-pmd/testpmd.c:4016:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = read(0, &c, 1);
data/dpdk-20.11~rc3/app/test-regex/main.c:88:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(rules_file, optarg, MAX_FILE_NAME - 1);
data/dpdk-20.11~rc3/app/test-regex/main.c:96:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(data_file, optarg, MAX_FILE_NAME - 1);
data/dpdk-20.11~rc3/app/test/commands.c:368:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		commands_len += strlen(t->command) + 1;
data/dpdk-20.11~rc3/app/test/test.c:101:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (extra_args != NULL && strlen(extra_args) > 0) {
data/dpdk-20.11~rc3/app/test/test.c:110:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		eargc = rte_strsplit(extra_args, strlen(extra_args),
data/dpdk-20.11~rc3/app/test/test.c:174:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (dpdk_test && strlen(dpdk_test)) {
data/dpdk-20.11~rc3/app/test/test.c:177:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (cmdline_in(cl, buf, strlen(buf)) < 0) {
data/dpdk-20.11~rc3/app/test/test_cfgfile.c:225:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	TEST_ASSERT(strlen(value) == 0, "key unexpected value: %s", value);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:210:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(compress_test_bufs[i]) + 1);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:821:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(DEQUEUE_WAIT_TIME);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:889:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data_size = strlen(test_bufs[0]) + 1;
data/dpdk-20.11~rc3/app/test/test_compressdev.c:932:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data_size = strlen(test_bufs[i]) + 1;
data/dpdk-20.11~rc3/app/test/test_compressdev.c:943:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data_size = strlen(test_bufs[i]) + 1;
data/dpdk-20.11~rc3/app/test/test_compressdev.c:1020:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data_size = strlen(test_bufs[i]) * ratio_val;
data/dpdk-20.11~rc3/app/test/test_compressdev.c:1024:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data_size = strlen(test_bufs[priv_data->orig_idx]) + 1;
data/dpdk-20.11~rc3/app/test/test_compressdev.c:1847:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (compare_buffers(buf1, strlen(buf1) + 1,
data/dpdk-20.11~rc3/app/test/test_compressdev.c:1933:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(buf1) + 1;
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3112:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data_len = RTE_MAX(data_len, strlen(compress_test_bufs[i]) + 1);
data/dpdk-20.11~rc3/app/test/test_compressdev.c:3141:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data_len = strlen(compress_test_bufs[i]) + 1;
data/dpdk-20.11~rc3/app/test/test_distributor.c:407:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(100);
data/dpdk-20.11~rc3/app/test/test_distributor_perf.c:159:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:28:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text, strlen(text), "Invalid default link status string");
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:37:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text, strlen(text), "Invalid default link status "
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:45:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text, strlen(text), "Invalid default link status "
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:53:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text, strlen(text), "Invalid default link status "
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:82:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text, strlen(text), "Invalid default link status string");
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:104:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text, strlen(text), "Incorrect invalid link status string");
data/dpdk-20.11~rc3/app/test/test_ethdev_link.c:141:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			speed, strlen(speed_str_map[i].value),
data/dpdk-20.11~rc3/app/test/test_kni.c:619:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strncmp(buf, "lo_mode_fifo", strlen("lo_mode_fifo")) ||
data/dpdk-20.11~rc3/app/test/test_kni.c:621:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  strlen("lo_mode_fifo_skb"))) {
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1495:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1505:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1516:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1526:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1553:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1564:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1575:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:1585:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = strlen(buf);
data/dpdk-20.11~rc3/app/test/test_mbuf.c:2026:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(data_copy) != MBUF_TEST_DATA_LEN2 - 5)
data/dpdk-20.11~rc3/app/test/test_mbuf.c:2049:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(data_copy) != MBUF_TEST_DATA_LEN2)
data/dpdk-20.11~rc3/app/test/test_ring_stress_impl.h:362:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(run_time * US_PER_S);
data/dpdk-20.11~rc3/app/test/test_service_cores.c:248:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	TEST_ASSERT_EQUAL(0, equal, "Error: Service name not correct");
data/dpdk-20.11~rc3/app/test/test_string_fns.c:144:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	LOG("dst = '%s', strlen(dst) = %zu\n", dst, strlen(dst));
data/dpdk-20.11~rc3/app/test/test_string_fns.c:145:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	LOG("src = '%s', strlen(src) = %zu\n", src, strlen(src));
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:51:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(sock, REQUEST_CMD, strlen(REQUEST_CMD)) < 0) {
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:56:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes = read(sock, buf, sizeof(buf) - 1);
data/dpdk-20.11~rc3/app/test/test_telemetry_data.c:329:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes = read(sock, buf, sizeof(buf) - 1);
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:27:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (used != (int)strlen(expected))
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:45:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (used != (int)strlen(expected))
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:66:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (used != (int)strlen(expected))
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:88:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (used != (int)strlen(expected))
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:105:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(buf) != 0;
data/dpdk-20.11~rc3/app/test/test_telemetry_json.c:120:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(buf) != 0;
data/dpdk-20.11~rc3/app/test/test_timer_perf.c:31:20:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
#define do_delay() usleep(10)
data/dpdk-20.11~rc3/app/test/test_timer_racecond.c:46:24:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
#define usec_delay(us) usleep(us)
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:61:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n = read(STDIN_FILENO, buffer, sizeof(buffer));
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:65:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = read(STDIN_FILENO, buffer, sizeof(buffer));
data/dpdk-20.11~rc3/buildtools/pmdinfogen/pmdinfogen.c:110:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strncmp(n, name, strlen(name)))
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:45:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:773:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4266:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4270:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4362:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(ACC100_LONG_WAIT * 100);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4372:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4377:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4379:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4400:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/acc100/rte_acc100_pmd.c:4710:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ACC100_LONG_WAIT);
data/dpdk-20.11~rc3/drivers/baseband/fpga_5gnr_fec/rte_fpga_5gnr_fec.c:350:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(FPGA_TIMEOUT_CHECK_INTERVAL);
data/dpdk-20.11~rc3/drivers/baseband/fpga_5gnr_fec/rte_fpga_5gnr_fec.c:630:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(FPGA_TIMEOUT_CHECK_INTERVAL);
data/dpdk-20.11~rc3/drivers/baseband/fpga_lte_fec/fpga_lte_fec.c:901:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(FPGA_TIMEOUT_CHECK_INTERVAL);
data/dpdk-20.11~rc3/drivers/bus/dpaa/dpaa_bus.c:755:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dev_name = dup + strlen("name=");
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c:259:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     strlen(RTE_STR(FSLMC_BUS_NAME))) ||
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c:260:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   (!strncmp(name, "name", strlen("name")))) {
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_bus.c:632:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dev_name = dup + strlen("name=");
data/dpdk-20.11~rc3/drivers/bus/fslmc/fslmc_vfio.c:88:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(container) >= FSLMC_CONTAINER_MAX_LEN) {
data/dpdk-20.11~rc3/drivers/bus/pci/bsd/pci.c:173:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	maps[map_idx].path = rte_malloc(NULL, strlen(devname) + 1, 0);
data/dpdk-20.11~rc3/drivers/bus/pci/linux/pci.c:720:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strncmp(left, pci_id, strlen(pci_id))) {
data/dpdk-20.11~rc3/drivers/bus/vdev/vdev.c:124:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(driver->driver.name)) == 0)
data/dpdk-20.11~rc3/drivers/bus/vdev/vdev.c:128:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(driver->driver.alias)) == 0)
data/dpdk-20.11~rc3/drivers/bus/vdev/vdev.c:418:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(devname) == 0) {
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_bus.c:197:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(map_names[i], mapname, strlen(map_names[i])) != 0) {
data/dpdk-20.11~rc3/drivers/bus/vmbus/linux/vmbus_uio.c:43:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cc = read(dev->intr_handle.fd, &count, sizeof(count));
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.c:75:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	f->len = read(fd, f->buf, OF_FILE_BUF_MAX);
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaa_of.c:287:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(c);
data/dpdk-20.11~rc3/drivers/common/dpaax/dpaax_iova_table.c:108:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, file_data, statbuf.st_size > MEM_NODE_FILE_LEN ?
data/dpdk-20.11~rc3/drivers/common/iavf/iavf_type.h:375:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/common/iavf/iavf_type.h:405:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:51:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(line);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:56:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				int ret = fgetc(file);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:142:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    (size_t)(end - port_name_in) == strlen(port_name_in)) {
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:231:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ifname, match, IF_NAMESIZE);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:256:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(path);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_common_os.c:314:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = path[i] + strlen(path[i]);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1472:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int name_size = strlen(name) + 1;
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1600:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nl_attr_put(nlh, DEVLINK_ATTR_DEV_NAME, pci_addr, strlen(pci_addr) + 1);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1653:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nl_attr_put(nlh, DEVLINK_ATTR_DEV_NAME, pci_addr, strlen(pci_addr) + 1);
data/dpdk-20.11~rc3/drivers/common/mlx5/linux/mlx5_nl.c:1708:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nl_attr_put(nlh, DEVLINK_ATTR_DEV_NAME, pci_addr, strlen(pci_addr) + 1);
data/dpdk-20.11~rc3/drivers/common/octeontx2/otx2_mbox.h:880:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	uint8_t __otx2_io read;
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:125:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			arg2 = arg + strlen(param);
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:175:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name+strlen(name), QAT_DEV_NAME_MAX_LEN-strlen(name), "_qat");
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:175:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name+strlen(name), QAT_DEV_NAME_MAX_LEN-strlen(name), "_qat");
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:264:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name+strlen(name), QAT_DEV_NAME_MAX_LEN-strlen(name), "_qat");
data/dpdk-20.11~rc3/drivers/common/qat/qat_device.c:264:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name+strlen(name), QAT_DEV_NAME_MAX_LEN-strlen(name), "_qat");
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:68:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(h->name) >= sizeof(ops->name) - 1) {
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:105:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(dirpath) > sizeof(fsdev->dirname)) {
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:110:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(devname) > sizeof(fsdev->name)) {
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/bcmfs_device.c:251:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(dev_table[i].name)) {
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs4_rm.c:650:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs4_rm.c:664:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs5_rm.c:581:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/crypto/bcmfs/hw/bcmfs5_rm.c:595:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_hw.c:163:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(usleep_interval);
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_hw.c:183:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(usleep_interval);
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:118:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (sscanf(filename + strlen(match), "%d", number) <= 0)
data/dpdk-20.11~rc3/drivers/crypto/caam_jr/caam_jr_uio.c:152:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, line, SEC_UIO_MAX_DEVICE_FILE_NAME_LENGTH);
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_dev.c:720:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100000);
data/dpdk-20.11~rc3/drivers/crypto/ccp/ccp_pci.c:34:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen(uio_module_names[i]))) {
data/dpdk-20.11~rc3/drivers/crypto/ccp/rte_ccp_pmd.c:72:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(value) >= RTE_CRYPTODEV_NAME_MAX_LEN - 1) {
data/dpdk-20.11~rc3/drivers/crypto/ccp/rte_ccp_pmd.c:79:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(params->name, value, RTE_CRYPTODEV_NAME_MAX_LEN);
data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd.c:874:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(value) >= RTE_CRYPTODEV_NAME_MAX_LEN - 1) {
data/dpdk-20.11~rc3/drivers/crypto/mvsam/rte_mrvl_pmd.c:880:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(params->name, value, RTE_CRYPTODEV_NAME_MAX_LEN);
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c:757:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name + strlen(name), RTE_CRYPTODEV_NAME_MAX_LEN - strlen(name),
data/dpdk-20.11~rc3/drivers/crypto/nitrox/nitrox_sym.c:757:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(name + strlen(name), RTE_CRYPTODEV_NAME_MAX_LEN - strlen(name),
data/dpdk-20.11~rc3/drivers/crypto/octeontx/otx_cryptodev_mbox.c:100:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(sleep_ms * 1000);
data/dpdk-20.11~rc3/drivers/crypto/scheduler/rte_cryptodev_scheduler.c:439:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(scheduler->name) > RTE_CRYPTODEV_NAME_MAX_LEN - 1) {
data/dpdk-20.11~rc3/drivers/crypto/scheduler/rte_cryptodev_scheduler.c:447:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(scheduler->description) >
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:140:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(init_params->mode_param_str) > 0) {
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:210:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sched_ctx->init_worker_names[
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:300:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(value);
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:365:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(value) >= RTE_CRYPTODEV_NAME_MAX_LEN - 1) {
data/dpdk-20.11~rc3/drivers/crypto/scheduler/scheduler_pmd.c:389:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(param->worker_names[param->nb_workers++], value,
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:218:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/crypto/virtio/virtio_cryptodev.c:1032:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/event/dpaa/dpaa_eventdev.c:125:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ssize_t sjunk = read(qman_thread_fd(), &junk, sizeof(junk));
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev.c:1620:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(value))
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_evdev_stats.h:278:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(xstats_names[i].name, xstats_names_copy[xidx].name,
data/dpdk-20.11~rc3/drivers/event/octeontx2/otx2_tim_evdev.c:594:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(value))
data/dpdk-20.11~rc3/drivers/event/opdl/opdl_evdev.c:730:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_len = strlen(name);
data/dpdk-20.11~rc3/drivers/event/sw/event_ring.h:90:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	const uint32_t items = write - read;
data/dpdk-20.11~rc3/drivers/event/sw/event_ring.h:93:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	*re = r->ring[read & mask];
data/dpdk-20.11~rc3/drivers/net/af_packet/rte_eth_af_packet.c:683:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ifnamelen = strlen(pair->value);
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:1603:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(rte_vdev_device_args(dev)) == 0) {
data/dpdk-20.11~rc3/drivers/net/af_xdp/rte_eth_af_xdp.c:1629:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(if_name) == 0) {
data/dpdk-20.11~rc3/drivers/net/ark/ark_ddm.c:52:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/ark/ark_ddm.c:69:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:587:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:973:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size += strlen(line);
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev.c:981:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(args, line, ARK_MAX_ARG_LEN);
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev_rx.c:633:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/net/ark/ark_ethdev_tx.c:361:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/net/ark/ark_mpu.c:75:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/ark/ark_mpu.c:79:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktchkr.c:131:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktchkr.c:199:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktgen.c:127:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/net/ark/ark_pktgen.c:200:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/net/ark/ark_udm.c:40:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/ark/ark_udm.c:55:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/avp/avp_ethdev.c:262:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(AVP_REQUEST_DELAY_USECS);
data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_common.h:95:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	volatile unsigned int read; /**< Next position to be read */
data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_fifo.h:55:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	unsigned int fifo_read = fifo->read;
data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_fifo.h:78:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	unsigned int new_read = fifo->read;
data/dpdk-20.11~rc3/drivers/net/avp/rte_avp_fifo.h:102:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return (fifo->len + fifo->write - fifo->read) & (fifo->len - 1);
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_dev.c:808:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			desc->read.baddr =
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_dev.c:812:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			AXGMAC_SET_BITS_LE(desc->read.desc3,
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c:577:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   AXGBE_BEL_FUSE_VENDOR, strlen(AXGBE_BEL_FUSE_VENDOR)))
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_phy_impl.c:581:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    AXGBE_BEL_FUSE_PARTNO, strlen(AXGBE_BEL_FUSE_PARTNO))) {
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.c:297:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		desc->read.baddr =
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.c:299:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		memset((void *)(&desc->read.desc2), 0, 8);
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.c:300:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		AXGMAC_SET_BITS_LE(desc->read.desc3, RX_NORMAL_DESC3, OWN, 1);
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.c:410:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		desc->read.baddr =
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.c:412:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		memset((void *)(&desc->read.desc2), 0, 8);
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.c:413:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		AXGMAC_SET_BITS_LE(desc->read.desc3, RX_NORMAL_DESC3, OWN, 1);
data/dpdk-20.11~rc3/drivers/net/axgbe/axgbe_rxtx.h:50:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:3599:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ether_stat->version, BNX2X_DRIVER_VERSION,
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x.c:9681:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(f, sc->firmware, st.st_size) != st.st_size) {
data/dpdk-20.11~rc3/drivers/net/bnx2x/bnx2x_vfpf.c:306:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(sc->fw_ver, sc_resp.fw_ver, sizeof(sc->fw_ver));
data/dpdk-20.11~rc3/drivers/net/bnx2x/ecore_init.h:87:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	struct op_read		read;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:185:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_eth *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:185:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_eth *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:192:7:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	    (umask && !rte_is_zero_ether_addr(&umask->src)))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:198:7:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	    (umask && !rte_is_zero_ether_addr(&umask->dst))) {
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:204:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (spec->type || (umask && umask->type))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:220:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_phy_port *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:220:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_phy_port *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:230:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->index || (umask && umask->index))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:246:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_vlan *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:246:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_vlan *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:272:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			if (spec->tci || (umask && umask->tci))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:281:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			if (spec->tci || (umask && umask->tci))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:289:36:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (spec && (spec->inner_type || (umask && umask->inner_type)))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:322:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_vf *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:322:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_vf *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:335:18:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->id || (umask && umask->id))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:350:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_udp *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:350:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_udp *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:361:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.src_port || (umask && umask->hdr.src_port))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:365:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.dst_port || (umask && umask->hdr.dst_port))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:381:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_tcp *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:381:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_tcp *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:394:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.src_port || (umask && umask->hdr.src_port))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:398:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.dst_port || (umask && umask->hdr.dst_port))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:414:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_ipv4 *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:414:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_ipv4 *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:429:33:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.next_proto_id || (umask && umask->hdr.next_proto_id))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:433:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.dst_addr || (umask && umask->hdr.dst_addr))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:437:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.src_addr || (umask && umask->hdr.src_addr))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:441:35:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.type_of_service || (umask && umask->hdr.type_of_service))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:459:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_ipv6 *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:459:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mask = umask ? umask : (const struct rte_flow_item_ipv6 *)dmask;
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:478:25:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.proto || (umask && umask->hdr.proto))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:482:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	if (val->hdr.vtc_flow || (umask && umask->hdr.vtc_flow))
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:490:7:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	    (umask &&
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_flow.c:496:7:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	    (umask &&
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:748:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strncmp(key, CXGBE_DEVARG_CMN_KEEP_OVLAN, strlen(key)) ||
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:749:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    !strncmp(key, CXGBE_DEVARG_CMN_TX_MODE_LATENCY, strlen(key)) ||
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:750:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    !strncmp(key, CXGBE_DEVARG_VF_FORCE_LINK_UP, strlen(key))) {
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:758:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strncmp(key, CXGBE_DEVARG_PF_FILTER_MODE, strlen(key)) ||
data/dpdk-20.11~rc3/drivers/net/cxgbe/cxgbe_main.c:759:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    !strncmp(key, CXGBE_DEVARG_PF_FILTER_MASK, strlen(key))) {
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:391:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes_read = read(intr_handle->fd, &buf, sizeof(uint64_t));
data/dpdk-20.11~rc3/drivers/net/dpaa/dpaa_ethdev.c:1499:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	temp1 = read(rxq->q_fd, &temp, sizeof(temp));
data/dpdk-20.11~rc3/drivers/net/dpaa/fmlib/fm_lib.c:35:32:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#warning FMD and FMLIB version mismatch
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82540.c:476:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_SERDES_AMPLITUDE, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82540.c:568:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PHY_CLASS_WORD, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82540.c:670:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, offset, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82541.c:151:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = nvm->ops.read(hw, NVM_CFG, 1, &size);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82542.c:547:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, offset, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82543.c:1001:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, NVM_INIT_CONTROL2_REG, 1, &data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82571.c:1435:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_INIT_CONTROL2_REG, 1, &data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82571.c:1792:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ID_LED_SETTINGS, 1, data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82571.c:1884:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = nvm->ops.read(hw, 0x10, 1, &data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82571.c:1896:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = nvm->ops.read(hw, 0x23, 1, &data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:1602:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret_val = hw->nvm.ops.read(hw, NVM_COMPAT, 1, &data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:1847:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ID_LED_SETTINGS, 1, data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:2252:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_INIT_CONTROL3_PORT_A +
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:2405:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, i, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:2442:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, i, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:2476:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_COMPATIBILITY_REG_3, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:2516:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_COMPATIBILITY_REG_3, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:2607:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				  u16 *data, bool read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_82575.c:2617:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_api.c:1274:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->nvm.ops.read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_api.c:1275:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return hw->nvm.ops.read(hw, offset, words, data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_base.h:21:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_base.h:89:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_hw.h:379:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_hw.h:409:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_hw.h:751:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s32  (*read)(struct e1000_hw *, u16, u16, u16 *);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_hw.h:874:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s32 (*read)(struct e1000_hw *, u32 *, u16,  u16);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_i210.c:582:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		read_op_ptr = hw->nvm.ops.read;
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_i210.c:795:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ID_LED_SETTINGS, 1, data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.c:825:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					 u16 *data, bool read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.c:835:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.c:2281:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, (word_addr + i * 2), 1,
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.c:2286:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, (word_addr + i * 2 + 1),
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.c:4327:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, word, 1, &data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_ich8lan.c:4755:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ID_LED_SETTINGS, 1, data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.c:381:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_COMPAT, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.c:395:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ALT_MAC_ADDR_PTR, 1,
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.c:416:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, offset, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.c:937:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw,
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.c:942:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw,
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mac.c:1793:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ID_LED_SETTINGS, 1, data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mbx.c:59:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (mbx->ops.read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mbx.c:60:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = mbx->ops.read(hw, msg, size, mbx_id);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mbx.c:229:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!mbx->ops.read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_mbx.c:236:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = mbx->ops.read(hw, msg, size, mbx_id);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:771:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_0, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:777:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_1, 1, &pba_ptr);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:822:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, pba_ptr, 1, &length);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:843:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, pba_ptr + offset, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:878:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_0, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:884:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_1, 1, &pba_ptr);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:896:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, pba_ptr, 1, &length);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:930:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_0, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:940:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_1, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1184:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, i, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1217:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, i, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1278:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_HIWORD, 1, &etrack_test);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1283:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			hw->nvm.ops.read(hw, NVM_VERSION, 1, &fw_version);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1299:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_HIWORD, 1, &etrack_test);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1301:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_COMB_VER_PTR, 1, &comb_offset);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1305:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			hw->nvm.ops.read(hw, (NVM_COMB_VER_OFF + comb_offset
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1307:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			hw->nvm.ops.read(hw, (NVM_COMB_VER_OFF + comb_offset),
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1327:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_HIWORD, 1, &etrack_test);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1330:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->nvm.ops.read(hw, NVM_VERSION, 1, &fw_version);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1352:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_WORD, 1, &eeprom_verl);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1353:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, (NVM_ETRACK_WORD + 1), 1, &eeprom_verh);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1357:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_WORD, 1, &eeprom_verh);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_nvm.c:1358:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, (NVM_ETRACK_WORD + 1), 1, &eeprom_verl);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:9:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read, bool page_set);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:12:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read);
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:3415:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read, bool page_set)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:3448:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read) {
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:3770:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:3794:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:4252:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				    u8 dev_addr, u16 *data, bool read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_phy.c:4271:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read)
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.c:536:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (mbx->ops.read(hw, &in_msg, 1, 0))
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.h:58:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.h:95:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/e1000/base/e1000_vf.h:200:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s32 (*read)(struct e1000_hw *, u32 *, u16,  u16);
data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c:2960:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (mbx->ops.read(hw, &in_msg, 1, 0))
data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c:5015:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((nvm->ops.read) == NULL)
data/dpdk-20.11~rc3/drivers/net/e1000/igb_ethdev.c:5018:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return nvm->ops.read(hw, first, length, data);
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:581:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.buffer_addr =
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:583:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.cmd_type_len =
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:585:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.olinfo_status =
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:597:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txd->read.cmd_type_len |=
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:909:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:910:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:1103:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma;
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:1104:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:2268:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/e1000/igb_rxtx.c:2269:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_dev.c:339:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_rq.c:113:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/enic/base/vnic_wq.c:140:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/net/enic/enic_main.c:1167:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/net/enic/enic_main.c:1661:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe.c:333:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(rte_vdev_device_args(vdev)) == 0) {
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_args.c:99:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(cmdline) + 1;
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_eal.c:21:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_eal.c:105:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   da->name, strlen(da->name)) != 0) {
data/dpdk-20.11~rc3/drivers/net/failsafe/failsafe_ops.c:535:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (read(rxq->event_fd, &u64, sizeof(uint64_t)) >  0)
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_api_cmd.c:729:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	node->read.hw_wb_resp_paddr = 0;
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_api_cmd.h:207:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		} read;
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:290:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pool->name, name, (sizeof(pool->name) - 1));
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:892:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(type_str, fault_type[event->type], FAULT_SHOW_STR_LEN);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:894:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		strncpy(type_str, "unknown", FAULT_SHOW_STR_LEN);
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:910:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(level_str, fault_level[err_level],
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:913:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
			strncpy(level_str, "unknown",
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:1448:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(tmp_str + strlen(tmp_str),
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_hwdev.c:1449:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 sizeof(tmp_str) - strlen(tmp_str),
data/dpdk-20.11~rc3/drivers/net/hinic/base/hinic_pmd_mgmt.c:741:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
				usleep(1000);
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c:791:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (fw_size < strlen(fw_ver) + 1)
data/dpdk-20.11~rc3/drivers/net/hinic/hinic_pmd_ethdev.c:792:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return (strlen(fw_ver) + 1);
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_type.h:784:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/i40e/base/i40e_type.h:814:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_ethdev.c:11971:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name[strlen(name) - 1] = '\0';
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:557:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:558:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:719:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:720:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:838:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:839:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:2750:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:2751:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:2753:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd1 = 0;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx.c:2754:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd2 = 0;
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_altivec.c:47:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				       (vector unsigned long *)&rxdp[i].read);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_altivec.c:87:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		vec_st(dma_addr0, 0, (vector unsigned long *)&rxdp++->read);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_altivec.c:88:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		vec_st(dma_addr1, 0, (vector unsigned long *)&rxdp++->read);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_avx2.c:41:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				_mm_store_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_avx2.c:77:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_avx2.c:78:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_avx2.c:121:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm256_store_si256((__m256i *)&rxdp->read, dma_addr0_1);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_avx2.c:122:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm256_store_si256((__m256i *)&(rxdp + 2)->read, dma_addr2_3);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_neon.c:42:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				vst1q_u64((uint64_t *)&rxdp[i].read, zero);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_neon.c:59:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		vst1q_u64((uint64_t *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_neon.c:63:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		vst1q_u64((uint64_t *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_sse.c:44:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				_mm_store_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_sse.c:75:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/i40e/i40e_rxtx_vec_sse.c:76:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:261:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:262:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:264:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd1 = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:265:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd2 = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1170:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1171:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1275:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1276:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1369:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1370:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1522:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1523:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1834:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.c:1835:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:69:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:95:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:498:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	       rxq->queue_id, rx_id, rx_desc->read.pkt_addr,
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:499:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	       rx_desc->read.hdr_addr);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:505:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	       rx_id, rx_desc->read.pkt_addr, rx_desc->read.hdr_addr,
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:505:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	       rx_id, rx_desc->read.pkt_addr, rx_desc->read.hdr_addr,
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:506:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	       rx_desc->read.rsvd1, rx_desc->read.rsvd2);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx.h:506:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	       rx_desc->read.rsvd1, rx_desc->read.rsvd2);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx2.c:34:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				_mm_store_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx2.c:70:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx2.c:71:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx2.c:116:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm256_store_si256((__m256i *)&rxdp->read, dma_addr0_1);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx2.c:117:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm256_store_si256((__m256i *)&(rxdp + 2)->read, dma_addr2_3);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_avx512.c:52:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					_mm_storeu_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_sse.c:41:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				_mm_store_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_sse.c:72:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/iavf/iavf_rxtx_vec_sse.c:73:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_flex_pipe.c:483:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(tnls[i].label_prefix);
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_lan_tx_rx.h:14:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_lan_tx_rx.h:40:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_lan_tx_rx.h:424:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/ice/base/ice_lan_tx_rx.h:450:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_ethdev.c:255:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_ethdev.c:256:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_ethdev.c:258:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd1 = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_ethdev.c:259:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd2 = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_dcf_parent.c:115:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ICE_DCF_VSI_UPDATE_SERVICE_INTERVAL);
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1719:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy((char *)dv.driver_string, "dpdk", sizeof(dv.driver_string));
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1780:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pkg_file, ICE_PKG_FILE_SEARCH_PATH_UPDATES,
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1785:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pkg_file, ICE_PKG_FILE_SEARCH_PATH_DEFAULT,
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1791:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pkg_file, ICE_PKG_FILE_UPDATES, ICE_MAX_PKG_FILENAME_SIZE);
data/dpdk-20.11~rc3/drivers/net/ice/ice_ethdev.c:1794:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pkg_file, ICE_PKG_FILE_DEFAULT, ICE_MAX_PKG_FILENAME_SIZE);
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:379:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:380:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:382:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd1 = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:383:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.rsvd2 = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:1622:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:1623:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:1777:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:1778:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:2229:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx.c:2230:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx2.c:34:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				_mm_store_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx2.c:70:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx2.c:71:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx2.c:116:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm256_store_si256((__m256i *)&rxdp->read, dma_addr0_1);
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx2.c:117:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm256_store_si256((__m256i *)&(rxdp + 2)->read, dma_addr2_3);
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_avx512.c:45:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_sse.c:55:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				_mm_store_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_sse.c:86:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/ice/ice_rxtx_vec_sse.c:87:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_api.c:1755:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->nvm.ops.read)
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_api.c:1756:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return hw->nvm.ops.read(hw, offset, words, data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_base.h:21:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_base.h:89:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_hw.h:391:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_hw.h:421:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_hw.h:765:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s32  (*read)(struct igc_hw *hw, u16 offset, u16 words, u16 *data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_i225.c:708:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		read_op_ptr = hw->nvm.ops.read;
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_i225.c:1194:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ID_LED_SETTINGS, 1, data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.c:379:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_COMPAT, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.c:393:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ALT_MAC_ADDR_PTR, 1,
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.c:414:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, offset, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.c:935:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw,
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.c:940:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw,
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_mac.c:1668:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_ID_LED_SETTINGS, 1, data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:762:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_0, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:768:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_1, 1, &pba_ptr);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:813:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, pba_ptr, 1, &length);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:834:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, pba_ptr + offset, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:869:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_0, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:875:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_1, 1, &pba_ptr);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:887:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, pba_ptr, 1, &length);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:921:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_0, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:931:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->nvm.ops.read(hw, NVM_PBA_OFFSET_1, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1175:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, i, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1208:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->nvm.ops.read(hw, i, 1, &nvm_data);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1264:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_HIWORD, 1, &etrack_test);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1266:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_COMB_VER_PTR, 1, &comb_offset);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1268:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			hw->nvm.ops.read(hw, NVM_COMB_VER_OFF + comb_offset + 1,
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1270:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			hw->nvm.ops.read(hw, NVM_COMB_VER_OFF + comb_offset,
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1290:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_HIWORD, 1, &etrack_test);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1293:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->nvm.ops.read(hw, NVM_VERSION, 1, &fw_version);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1314:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_WORD, 1, &eeprom_verl);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1315:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, (NVM_ETRACK_WORD + 1), 1, &eeprom_verh);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1319:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, NVM_ETRACK_WORD, 1, &eeprom_verh);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_nvm.c:1320:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->nvm.ops.read(hw, (NVM_ETRACK_WORD + 1), 1, &eeprom_verl);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:9:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read, bool page_set);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:12:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read);
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:3458:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read, bool page_set)
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:3491:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read) {
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:3814:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  u16 *data, bool read)
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:3838:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read)
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:4361:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				    u8 dev_addr, u16 *data, bool read)
data/dpdk-20.11~rc3/drivers/net/igc/base/igc_phy.c:4380:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read)
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:446:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:447:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr =
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:590:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:591:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr =
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:819:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:820:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:1821:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.buffer_addr =
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:1823:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.cmd_type_len =
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:1825:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.olinfo_status =
data/dpdk-20.11~rc3/drivers/net/igc/igc_txrx.c:1837:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txd->read.cmd_type_len |=
data/dpdk-20.11~rc3/drivers/net/ionic/ionic_main.c:280:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ident->drv.driver_ver_str, IONIC_DRV_VERSION,
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:564:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(5);
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:593:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(5);
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:1371:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(5);
data/dpdk-20.11~rc3/drivers/net/ipn3ke/ipn3ke_representor.c:1400:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(5);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82598.c:1312:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, IXGBE_PCIE_GENERAL_PTR, &pci_gen);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82598.c:1315:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->eeprom.ops.read(hw, pci_gen + IXGBE_PCIE_CTRL2, &pci_ctrl2);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:165:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (hw->eeprom.ops.read(hw, ++data_offset, &data_value))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:170:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (hw->eeprom.ops.read(hw, ++data_offset, &data_value))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:2288:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, IXGBE_FW_PTR, &fw_offset)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:2298:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, (fw_offset +
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:2312:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, (fw_ptp_cfg_offset +
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:2343:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, IXGBE_FW_PTR, &fw_offset);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:2350:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, (fw_offset +
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_82599.c:2359:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, (fw_lesm_param_offset +
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_api.c:840:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return ixgbe_call_func(hw, hw->eeprom.ops.read, (hw, offset, data),
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:619:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->eeprom.ops.read(hw, IXGBE_PBANUM0_PTR, &data);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:625:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->eeprom.ops.read(hw, IXGBE_PBANUM1_PTR, &pba_ptr);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:671:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->eeprom.ops.read(hw, pba_ptr, &length);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:693:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->eeprom.ops.read(hw, pba_ptr + offset, &data);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:720:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->eeprom.ops.read(hw, IXGBE_PBANUM0_PTR, &data);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:730:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->eeprom.ops.read(hw, IXGBE_PBANUM1_PTR, &data);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:905:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret_val = hw->eeprom.ops.read(hw, pba_word[1] + 0,
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:1056:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		hw->eeprom.ops.read(hw, IXGBE_EEPROM_CTRL_4, &ee_ctrl_4);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:2185:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (hw->eeprom.ops.read(hw, i, &word)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:2194:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (hw->eeprom.ops.read(hw, i, &pointer)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:2203:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (hw->eeprom.ops.read(hw, pointer, &length)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:2212:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (hw->eeprom.ops.read(hw, j, &word)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:2246:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, 0, &checksum);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:2258:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, IXGBE_EEPROM_CHECKSUM, &read_checksum);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:2292:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, 0, &checksum);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:3526:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->eeprom.ops.read(hw, IXGBE_SAN_MAC_ADDR_PTR,
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:3569:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->eeprom.ops.read(hw, san_mac_offset,
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4256:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, offset, &alt_san_mac_blk_offset))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4265:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, offset, &caps))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4272:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, offset, wwnn_prefix)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4278:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, offset, wwpn_prefix))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4309:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, offset, &caps);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4317:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, IXGBE_ISCSI_FCOE_BLK_PTR, &offset);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4326:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, offset, &flags);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4399:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, IXGBE_DEVICE_CAPS, device_caps);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4854:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, IXGBE_ETS_CFG, &ets_offset);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4863:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, ets_offset, &ets_cfg);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4878:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		status = hw->eeprom.ops.read(hw, (ets_offset + 1 + i),
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4933:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, offset, &ets_offset))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4939:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, offset, &ets_cfg))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4951:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (hw->eeprom.ops.read(hw, offset, &ets_sensor)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:4998:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, NVM_OROM_OFFSET, &offset);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5004:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, offset + NVM_OROM_BLK_HI, &eeprom_cfg_blkh);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5005:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, offset + NVM_OROM_BLK_LOW, &eeprom_cfg_blkl);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5035:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, NVM_OEM_PROD_VER_PTR, &offset);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5042:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, offset, &mod_len);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5043:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, offset + NVM_OEM_PROD_VER_CAP_OFF, &cap);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5050:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, offset + NVM_OEM_PROD_VER_OFF_L, &prod_ver);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5051:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	hw->eeprom.ops.read(hw, offset + NVM_OEM_PROD_VER_OFF_H, &rel_num);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5076:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, NVM_ETK_OFF_LOW, &etk_id_l))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_common.c:5078:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, NVM_ETK_OFF_HI, &etk_id_h))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_mbx.c:28:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (mbx->ops.read)
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_mbx.c:29:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = mbx->ops.read(hw, msg, size, mbx_id);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_mbx.c:201:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!mbx->ops.read)
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_mbx.c:208:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = mbx->ops.read(hw, msg, size, mbx_id);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1153:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret_val = hw->eeprom.ops.read(hw, data_offset, &block_crc);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1159:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = hw->eeprom.ops.read(hw, data_offset, &eword);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1174:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret_val = hw->eeprom.ops.read(hw, data_offset,
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1180:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				ret_val = hw->eeprom.ops.read(hw, data_offset,
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1848:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, IXGBE_PHY_INIT_OFFSET_NL, list_offset)) {
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1865:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (hw->eeprom.ops.read(hw, *list_offset, &sfp_id))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1871:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (hw->eeprom.ops.read(hw, *list_offset, data_offset))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_phy.c:1881:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (hw->eeprom.ops.read(hw, *list_offset, &sfp_id))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_type.h:3288:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_type.h:3311:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read;
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_type.h:3910:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s32 (*read)(struct ixgbe_hw *, u16, u16 *);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_type.h:4143:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s32  (*read)(struct ixgbe_hw *, u32 *, u16,  u16);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_vf.c:616:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (mbx->ops.read(hw, &in_msg, 1, 0))
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x540.c:555:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, 0, &checksum);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x540.c:616:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, 0, &checksum);
data/dpdk-20.11~rc3/drivers/net/ixgbe/base/ixgbe_x550.c:3504:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = hw->eeprom.ops.read(hw, 0, &checksum);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_ethdev.c:4078:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (mbx->ops.read(hw, &in_msg, 1, 0))
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:164:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txdp->read.buffer_addr = rte_cpu_to_le_64(buf_dma_addr);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:166:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txdp->read.cmd_type_len =
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:169:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txdp->read.olinfo_status =
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:187:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	txdp->read.buffer_addr = rte_cpu_to_le_64(buf_dma_addr);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:188:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	txdp->read.cmd_type_len =
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:190:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	txdp->read.olinfo_status =
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:277:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		tx_r[txq->tx_next_rs].read.cmd_type_len |=
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:296:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		tx_r[txq->tx_next_rs].read.cmd_type_len |=
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:722:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txp->read.cmd_type_len |=
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:902:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.buffer_addr =
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:904:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.cmd_type_len =
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:906:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			txd->read.olinfo_status =
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:936:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txd->read.cmd_type_len |= rte_cpu_to_le_32(cmd_type_len);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:942:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txp->read.cmd_type_len |= rte_cpu_to_le_32(IXGBE_TXD_CMD_RS);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:1617:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:1618:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp[i].read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:1849:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:1850:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxdp->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:2150:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			rxdp->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:2151:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			rxdp->read.pkt_addr = dma;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:4465:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.hdr_addr = 0;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx.c:4466:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rxd->read.pkt_addr = dma_addr;
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_neon.c:39:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				vst1q_u64((uint64_t *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_neon.c:63:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		vst1q_u64((uint64_t *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_neon.c:68:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		vst1q_u64((uint64_t *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_neon.c:469:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	vst1q_u64((uint64_t *)&txdp->read, descriptor);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_neon.c:535:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txq->tx_ring[txq->tx_next_rs].read.cmd_type_len |=
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c:44:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				_mm_store_si128((__m128i *)&rxdp[i].read,
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c:79:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr0);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c:80:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		_mm_store_si128((__m128i *)&rxdp++->read, dma_addr1);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c:642:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	_mm_store_si128((__m128i *)&txdp->read, descriptor);
data/dpdk-20.11~rc3/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c:709:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		txq->tx_ring[txq->tx_next_rs].read.cmd_type_len |=
data/dpdk-20.11~rc3/drivers/net/kni/rte_eth_kni.c:115:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(500 * MS);
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c:328:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		size = read(mq->intr_handle.fd, &b, sizeof(b));
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c:463:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		size = read(mq->intr_handle.fd, &b, sizeof(b));
data/dpdk-20.11~rc3/drivers/net/memif/rte_eth_memif.c:1652:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(filename) >= MEMIF_SOCKET_UN_SIZE) {
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:477:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(line);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:483:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				ret = fgetc(file);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:1174:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(path);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4.c:1234:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = path[i] + strlen(path[i]);
data/dpdk-20.11~rc3/drivers/net/mlx4/mlx4_ethdev.c:130:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(*ifname, match, sizeof(*ifname));
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:613:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
				usleep(0);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:811:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
				usleep(0);
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_ethdev_os.c:1129:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!if_indextoname(pf_ifindex, name) || !strlen(name)) {
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:1716:7:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		if (fscanf(file, "%32s", tmp_str) == 1)
data/dpdk-20.11~rc3/drivers/net/mlx5/linux/mlx5_os.c:2424:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ssize_t n = read(fd, buf, sizeof(buf));
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:919:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(sh->ibdev_name, mlx5_os_get_ctx_device_name(sh->ctx),
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:921:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(sh->ibdev_path, mlx5_os_get_ctx_device_path(sh->ctx),
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:1330:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5.c:1338:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_stats.c:281:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(xstats_names[i].name,
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_trigger.c:1173:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000 * priv->rxqs_n);
data/dpdk-20.11~rc3/drivers/net/mlx5/mlx5_txpp.c:1219:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(xstats_names[i + n_used].name,
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:84:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(string);
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:118:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rte_cfgfile_num_sections(file, sec_name, strlen(sec_name)) <= 0)
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:125:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(MRVL_TOK_SCHED_MODE_SP))) {
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:129:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(MRVL_TOK_SCHED_MODE_WRR))) {
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:243:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nb_tokens = rte_strsplit(entry_cpy, strlen(entry_cpy),
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:258:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(tokens[i]), rng_tokens,
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:324:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rte_cfgfile_num_sections(file, sec_name, strlen(sec_name)) <= 0)
data/dpdk-20.11~rc3/drivers/net/mvpp2/mrvl_qos.c:527:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(sec_name)) <= 0) {
data/dpdk-20.11~rc3/drivers/net/nfb/nfb_ethdev.c:453:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(dev->device->devargs->args) > 0) {
data/dpdk-20.11~rc3/drivers/net/nfp/nfp_net.c:3555:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes = read(fw_f, fw_buf, fsize);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:399:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int read;
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:426:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (priv->width.read > 0 &&
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:427:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    priv->width.write > 0 && priv->width.read != priv->width.write)
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:430:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (priv->width.read > 0)
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:431:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		priv->width.bar = priv->width.read;
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:527:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	width = priv->width.read;
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:690:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lockfile = calloc(strlen(home_path) + strlen(lockname) + 1,
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cpp_pcie_ops.c:690:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lockfile = calloc(strlen(home_path) + strlen(lockname) + 1,
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cppcore.c:154:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      strlen(name) + 1);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cppcore.c:160:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(area->name, name, strlen(name) + 1);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_cppcore.c:672:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_hwinfo.c:40:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     key = val + strlen(val) + 1) {
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_hwinfo.c:41:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		val = key + strlen(key) + 1;
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_hwinfo.c:47:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (val + strlen(val) + 1 > end) {
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_hwinfo.c:191:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     key = val + strlen(val) + 1) {
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_hwinfo.c:192:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		val = key + strlen(key) + 1;
data/dpdk-20.11~rc3/drivers/net/nfp/nfpcore/nfp_resource.c:166:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(res->name, name, NFP_RESOURCE_ENTRY_NAME_SZ);
data/dpdk-20.11~rc3/drivers/net/octeontx/octeontx_ethdev.c:1511:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(rte_vdev_device_args(dev)) == 0) {
data/dpdk-20.11~rc3/drivers/net/octeontx2/otx2_stats.c:265:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(xstats_names[i].name, xstats_names_copy[ids[i]].name,
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.h:432:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define OSAL_STRLEN(string) strlen(string)
data/dpdk-20.11~rc3/drivers/net/qede/base/bcm_osal.h:434:40:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define OSAL_STRNCPY(dst, string, len) strncpy(dst, string, len)
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_hsi_init_tool.h:379:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	struct init_read_op read /* read init operation */;
data/dpdk-20.11~rc3/drivers/net/qede/base/ecore_init_ops.c:503:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ecore_init_cmd_rd(p_hwfn, p_ptt, &cmd->read);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:1019:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (u32)strlen(str) + 1;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2443:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strcpy(buf + strlen(buf), name);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:2475:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(buf + strlen(buf), mem_group);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:3042:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:3043:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:5997:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	offset += strlen(*param_name) + 1;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6004:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		offset += strlen(*param_str_val) + 1;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6062:20:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
	results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6157:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			parsing_str += strlen(parsing_str) + 1;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6163:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		parsing_str += strlen(parsing_str) + 1;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6191:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				parsing_str += strlen(parsing_str) + 1;
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6205:8:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
			    sprintf(qed_get_buf_ptr(results_buf,
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6214:10:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
					    sprintf(qed_get_buf_ptr
data/dpdk-20.11~rc3/drivers/net/qede/qede_debug.c:6221:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
		    sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:250:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(ver_str);
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:262:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(ver_str);
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:274:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(ver_str);
data/dpdk-20.11~rc3/drivers/net/qede/qede_ethdev.c:2600:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy((char *)params.name, QEDE_PMD_VER_PREFIX,
data/dpdk-20.11~rc3/drivers/net/qede/qede_main.c:159:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, edev->firmware, st.st_size) != st.st_size) {
data/dpdk-20.11~rc3/drivers/net/ring/rte_eth_ring.c:589:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ret == 0 || (size_t)n != strlen(value)) {
data/dpdk-20.11~rc3/drivers/net/sfc/sfc.c:1232:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t lt_prefix_str_size = strlen(lt_prefix_str);
data/dpdk-20.11~rc3/drivers/net/sfc/sfc.c:1248:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(lt_str, lt_prefix_str, lt_prefix_str_size);
data/dpdk-20.11~rc3/drivers/net/sfc/sfc_ethdev.c:1878:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(str) + 1;
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:119:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(conn->welcome, p->welcome, CONN_WELCOME_LEN_MAX);
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:120:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(conn->prompt, p->prompt, CONN_PROMPT_LEN_MAX);
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:193:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->welcome));
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:201:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->prompt));
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:218:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	len = read(fd_client,
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:243:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			n = strlen(conn->msg_out);
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:259:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(MSG_CMD_TOO_LONG));
data/dpdk-20.11~rc3/drivers/net/softnic/conn.c:270:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->prompt));
data/dpdk-20.11~rc3/drivers/net/softnic/parser.c:290:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src);
data/dpdk-20.11~rc3/drivers/net/softnic/parser.c:397:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(token) >= INET_ADDRSTRLEN)
data/dpdk-20.11~rc3/drivers/net/softnic/parser.c:409:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(token) >= INET6_ADDRSTRLEN)
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:37:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(in) && index("!#%;", in[0])) ||
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4538:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[4]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4552:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[6]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4613:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[10]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4694:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[4]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4708:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[6]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:4723:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[8]);
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:5834:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(strlen(tokens[2]) != 1)) {
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6418:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(file_name) == 0) ||
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6453:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(msg_out))
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_cli.c:6481:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(file_name) == 0) ||
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:266:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(params->action_profile_name)) {
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_pipeline.c:839:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(params->action_profile_name)) {
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_swq.c:43:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((strncmp(swq->name, "RXQ", strlen("RXQ")) == 0) ||
data/dpdk-20.11~rc3/drivers/net/softnic/rte_eth_softnic_swq.c:44:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(strncmp(swq->name, "TXQ", strlen("TXQ")) == 0))
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2021:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(remote_iface)) {
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2078:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(remote_iface)) {
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2170:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char mac_temp[strlen(ETH_TAP_USR_MAC_FMT) + 1], *mac_byte = NULL;
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2179:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(strlen(mac_byte) <= 2) &&
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2180:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(strlen(mac_byte) == strspn(mac_byte,
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2199:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strncasecmp(ETH_TAP_MAC_FIXED, value, strlen(ETH_TAP_MAC_FIXED))) {
data/dpdk-20.11~rc3/drivers/net/tap/rte_eth_tap.c:2243:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(params) == 0) {
data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c:927:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(adata->id) + 1, adata->id);
data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c:950:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(adata->bpf.annotation) + 1,
data/dpdk-20.11~rc3/drivers/net/tap/tap_flow.c:1921:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tap_nlattr_add(&msg->nh, TCA_BPF_NAME, strlen(annotation) + 1,
data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_mbx.c:29:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (mbx->read)
data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_mbx.c:30:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret_val = mbx->read(hw, msg, size, mbx_id);
data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_osdep.h:35:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
#define usleep(x)     rte_delay_us(x)
data/dpdk-20.11~rc3/drivers/net/txgbe/base/txgbe_type.h:628:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s32  (*read)(struct txgbe_hw *hw, u32 *msg, u16 size, u16 vf_number);
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:132:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = len == (int)strlen(NETVSC_CLASS_ID);
data/dpdk-20.11~rc3/drivers/net/vdev_netvsc/vdev_netvsc.c:405:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(addr);
data/dpdk-20.11~rc3/drivers/net/vhost/rte_eth_vhost.c:1437:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	internal->iface_name = rte_malloc_socket(name, strlen(iface_name) + 1,
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:214:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_ethdev.c:292:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel.c:52:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, buf, sizeof(buf) - 1) > 0)
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel_tap.c:117:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(ifr.ifr_name, *p_ifname, IFNAMSIZ - 1);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user/vhost_kernel_tap.c:119:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		strncpy(ifr.ifr_name, "tap%d", IFNAMSIZ - 1);
data/dpdk-20.11~rc3/drivers/net/virtio/virtio_user_ethdev.c:565:8:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		if ((sscanf(stripped, "%u %10s", &num, name) == 2) &&
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme.c:1182:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	opae_memcpy(buf, string, strlen(string));
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme.c:1185:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(u8 *)buf, strlen(string));
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme.c:1192:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(u8 *)read_buf, strlen(string));
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/ifpga_fme.c:1198:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (memcmp(buf, read_buf, strlen(string))) {
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.c:103:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (acc->ops && acc->ops->read)
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.c:104:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return acc->ops->read(acc, region_idx, offset, byte, data);
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_hw_api.h:164:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int (*read)(struct opae_accelerator *acc, unsigned int region_idx,
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_i2c.c:292:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read, finish = false;
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_i2c.c:307:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} else if (read && (status & ALTERA_I2C_ISR_RXOF)) {
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_i2c.c:314:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} else if (read && (status & ALTERA_I2C_ISR_RXRDY)) {
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_i2c.c:319:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} else if (!read && (status & ALTERA_I2C_ISR_TXRDY)) {
data/dpdk-20.11~rc3/drivers/raw/ifpga/base/opae_intel_max10.c:307:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(string) + 1;
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:238:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	point = strlen(link);
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:248:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	point = strlen(link1);
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:271:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(entry->d_name) > 12)
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:300:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(entry->d_name) > 12)
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:824:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (buffer_size != read(file_fd, (void *)buffer, buffer_size)) {
data/dpdk-20.11~rc3/drivers/raw/ifpga/ifpga_rawdev.c:1633:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(value) + 1;
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_vdev.c:77:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read != 2 || bytes != (int)strlen(value)) {
data/dpdk-20.11~rc3/drivers/raw/ioat/idxd_vdev.c:77:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (read != 2 || bytes != (int)strlen(value)) {
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev_test.c:69:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(10);
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev_test.c:122:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/raw/ioat/ioat_rawdev_test.c:181:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dpdk-20.11~rc3/drivers/raw/ioat/rte_ioat_rawdev_fns.h:335:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	count = (end_read - (read & mask)) & mask;
data/dpdk-20.11~rc3/drivers/raw/ioat/rte_ioat_rawdev_fns.h:351:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		__m128i hdls0 = _mm_load_si128(&ioat->hdls[read & mask]);
data/dpdk-20.11~rc3/drivers/raw/ioat/rte_ioat_rawdev_fns.h:360:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		uintptr_t *hdls = (uintptr_t *)&ioat->hdls[read & mask];
data/dpdk-20.11~rc3/drivers/raw/ioat/rte_ioat_rawdev_fns.h:366:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ioat->next_read = read;
data/dpdk-20.11~rc3/drivers/raw/octeontx2_ep/otx2_ep_test.c:145:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(10000);
data/dpdk-20.11~rc3/drivers/raw/skeleton/skeleton_rawdev_test.c:375:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffers[0].buf_addr = malloc(strlen(TEST_DEV_NAME) + 3);
data/dpdk-20.11~rc3/drivers/raw/skeleton/skeleton_rawdev_test.c:378:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(buffers[0].buf_addr, strlen(TEST_DEV_NAME) + 2, "%s%d",
data/dpdk-20.11~rc3/drivers/vdpa/ifc/ifcvf_vdpa.c:477:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				nbytes = read(kickfd, &buf, 8);
data/dpdk-20.11~rc3/drivers/vdpa/ifc/ifcvf_vdpa.c:775:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				nbytes = read(fd, &buf, 8);
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.c:266:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(MLX5_VDPA_USEC);
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa.c:601:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(MLX5_VDPA_USEC);
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_event.c:263:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(priv->timer_delay_us);
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_virtq.c:27:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nbytes = read(virtq->intr_handle.fd, &buf, 8);
data/dpdk-20.11~rc3/drivers/vdpa/mlx5/mlx5_vdpa_virtq.c:70:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
				usleep(MLX5_VDPA_INTR_RETRIES_USEC);
data/dpdk-20.11~rc3/examples/distributor/main.c:922:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/examples/eventdev_pipeline/main.c:69:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(coremask);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:31:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((ret = fgetc(fp)) != EOF) {
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:67:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(info.one_line_text);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:98:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(info.vec[0]);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:271:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *tmp = path + strlen(path) - 3;
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:516:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src += strlen(key);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:518:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src) / 2;
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:547:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *data = src + strlen(key);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:548:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t data_len = strlen(data);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:589:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str += strlen(key);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation.c:676:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(info.vec[0], strlen(info.vec[0]) + 4, "%s%u", cb->key,
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_aes.c:151:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp += strlen(ALGO_STR);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_aes.c:170:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp += strlen(KEY_SIZE_STR);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_ccm.c:50:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp += strlen(key);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_ccm.c:73:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src += strlen(key) + val->len * 2;
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_ccm.c:90:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src += strlen(key);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:124:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src += strlen(key);
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_tdes.c:126:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src) / 2;
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_xts.c:101:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp += (strlen(KEY_SIZE_STR) + strlen("AES"));
data/dpdk-20.11~rc3/examples/fips_validation/fips_validation_xts.c:101:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp += (strlen(KEY_SIZE_STR) + strlen("AES"));
data/dpdk-20.11~rc3/examples/ioat/ioatfwd.c:137:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(int)(37 - strlen(names_xstats[ids_xstats[i]].name)),
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:46:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(in) && index("!#%;", in[0])) ||
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:319:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			out_size = out_size - strlen(out);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:320:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			out = &out[strlen(out)];
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:326:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out_size = out_size - strlen(out);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:327:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out = &out[strlen(out)];
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3831:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[4]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3845:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[6]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3906:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[10]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:3987:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[4]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4001:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[6]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:4016:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tokens[8]);
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:5670:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(strlen(tokens[2]) != 1)) {
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6702:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(file_name) == 0) ||
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6736:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(msg_out))
data/dpdk-20.11~rc3/examples/ip_pipeline/cli.c:6764:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(file_name) == 0) ||
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:118:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(conn->welcome, p->welcome, CONN_WELCOME_LEN_MAX);
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:119:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(conn->prompt, p->prompt, CONN_PROMPT_LEN_MAX);
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:191:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->welcome));
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:199:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->prompt));
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:216:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	len = read(fd_client,
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:240:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			n = strlen(conn->msg_out);
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:256:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(MSG_CMD_TOO_LONG));
data/dpdk-20.11~rc3/examples/ip_pipeline/conn.c:267:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->prompt));
data/dpdk-20.11~rc3/examples/ip_pipeline/main.c:90:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(optarg)) {
data/dpdk-20.11~rc3/examples/ip_pipeline/main.c:109:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(optarg)) {
data/dpdk-20.11~rc3/examples/ip_pipeline/main.c:124:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(optarg)) {
data/dpdk-20.11~rc3/examples/ip_pipeline/parser.c:273:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src);
data/dpdk-20.11~rc3/examples/ip_pipeline/parser.c:380:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(token) >= INET_ADDRSTRLEN)
data/dpdk-20.11~rc3/examples/ip_pipeline/parser.c:392:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(token) >= INET6_ADDRSTRLEN)
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1261:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1288:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1291:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1294:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1306:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1309:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1313:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1340:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1343:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1346:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1359:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1362:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1389:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1392:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/event_helper.c:1395:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(print_buf + strlen(print_buf),
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:67:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(ip_str) >= INET_ADDRSTRLEN)
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:98:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(ip_str) >= INET6_ADDRSTRLEN)
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:136:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(num_str) == 0)
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:462:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(oneline) > 1022) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:480:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (pos != oneline+strlen(oneline) - 2) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:489:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(oneline) + strlen(str) > 1022) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:489:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(oneline) + strlen(str) > 1022) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:496:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strcpy(str + strlen(str), oneline);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:501:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(oneline) + strlen(str) > 1022) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:501:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(oneline) + strlen(str) > 1022) {
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:507:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(str + strlen(str), oneline);
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.c:509:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str[strlen(str)] = '\n';
data/dpdk-20.11~rc3/examples/ipsec-secgw/parser.h:42:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = 0; i < strlen(str); i++)
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:240:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(pt_start) > 2)
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:242:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(sub_str, pt_start, 2);
data/dpdk-20.11~rc3/examples/ipsec-secgw/sa.c:247:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(sub_str, pt_start, pt_end - pt_start);
data/dpdk-20.11~rc3/examples/l2fwd-crypto/main.c:639:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, key, length);
data/dpdk-20.11~rc3/examples/l3fwd-power/perf_core.c:192:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(corelist);
data/dpdk-20.11~rc3/examples/multi_process/hotplug_mp/commands.c:86:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(dev_name) > 0)
data/dpdk-20.11~rc3/examples/multi_process/simple_mp/main.c:64:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(5);
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread.c:466:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(lt->funcname, f, sizeof(lt->funcname));
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_cond.c:60:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		strncpy(c->name, "no name", sizeof(c->name));
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_cond.c:62:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(c->name, name, sizeof(c->name));
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_mutex.c:55:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		strncpy(m->name, "no name", sizeof(m->name));
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_mutex.c:57:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(m->name, name, sizeof(m->name));
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_objcache.h:61:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(c->name, name, LT_MAX_NAME_SIZE);
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_pool.h:93:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(p->name, name, LT_MAX_NAME_SIZE);
data/dpdk-20.11~rc3/examples/performance-thread/common/lthread_queue.h:77:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(new_queue->name, name, sizeof(new_queue->name));
data/dpdk-20.11~rc3/examples/pipeline/cli.c:146:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(in) && index("!#%;", in[0])) ||
data/dpdk-20.11~rc3/examples/pipeline/cli.c:425:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			out_size = out_size - strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:426:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			out = &out[strlen(out)];
data/dpdk-20.11~rc3/examples/pipeline/cli.c:432:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out_size = out_size - strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:433:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out = &out[strlen(out)];
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1035:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	out_size -= strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1036:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	out += strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1048:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out_size -= strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1049:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out += strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1053:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	out_size -= strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1054:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	out += strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1065:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out_size -= strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1066:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		out += strlen(out);
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1382:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(file_name) == 0) ||
data/dpdk-20.11~rc3/examples/pipeline/cli.c:1417:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(msg_out))
data/dpdk-20.11~rc3/examples/pipeline/conn.c:119:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(conn->welcome, p->welcome, CONN_WELCOME_LEN_MAX);
data/dpdk-20.11~rc3/examples/pipeline/conn.c:120:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(conn->prompt, p->prompt, CONN_PROMPT_LEN_MAX);
data/dpdk-20.11~rc3/examples/pipeline/conn.c:193:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->welcome));
data/dpdk-20.11~rc3/examples/pipeline/conn.c:201:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->prompt));
data/dpdk-20.11~rc3/examples/pipeline/conn.c:218:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	len = read(fd_client,
data/dpdk-20.11~rc3/examples/pipeline/conn.c:243:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			n = strlen(conn->msg_out);
data/dpdk-20.11~rc3/examples/pipeline/conn.c:259:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(MSG_CMD_TOO_LONG));
data/dpdk-20.11~rc3/examples/pipeline/conn.c:270:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(conn->prompt));
data/dpdk-20.11~rc3/examples/pipeline/main.c:77:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(optarg)) {
data/dpdk-20.11~rc3/examples/pipeline/main.c:96:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(optarg)) {
data/dpdk-20.11~rc3/examples/pipeline/main.c:111:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(optarg)) {
data/dpdk-20.11~rc3/examples/qos_sched/stats.c:46:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(qavg_period);
data/dpdk-20.11~rc3/examples/qos_sched/stats.c:102:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(qavg_period);
data/dpdk-20.11~rc3/examples/qos_sched/stats.c:149:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(qavg_period);
data/dpdk-20.11~rc3/examples/qos_sched/stats.c:219:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(qavg_period);
data/dpdk-20.11~rc3/examples/qos_sched/stats.c:273:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(qavg_period);
data/dpdk-20.11~rc3/examples/vhost/ioat.c:27:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *input = strndup(value, strlen(value) + 1);
data/dpdk-20.11~rc3/examples/vhost/ioat.c:55:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	args_nr = rte_strsplit(substr, strlen(substr),
data/dpdk-20.11~rc3/examples/vhost/ioat.c:59:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rte_strsplit(arg_temp, strlen(arg_temp), ptrs, 2, '@');
data/dpdk-20.11~rc3/examples/vhost/ioat.c:171:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		unsigned short read, write;
data/dpdk-20.11~rc3/examples/vhost/ioat.c:184:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read &= mask;
data/dpdk-20.11~rc3/examples/vhost/ioat.c:187:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (n_seg >= cb_tracker[dev_id].size_track[read]) {
data/dpdk-20.11~rc3/examples/vhost/ioat.c:188:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				n_seg -= cb_tracker[dev_id].size_track[read];
data/dpdk-20.11~rc3/examples/vhost/ioat.c:195:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		cb_tracker[dev_id].next_read = read;
data/dpdk-20.11~rc3/examples/vhost_blk/blk.c:33:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src);
data/dpdk-20.11~rc3/examples/vhost_crypto/main.c:95:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rte_strsplit(arg, strlen(arg), str_fld, NB_SOCKET_FIELDS, ',') !=
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:238:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(info->channel_path)+1);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_manager.c:869:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(new_domain->name, vm_name, sizeof(new_domain->name));
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:997:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n_bytes = read(chan_info->fd,
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:1036:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n_bytes = read(chan_info->fd, &json_data[idx], 1);
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:1053:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(json_data) == 0)
data/dpdk-20.11~rc3/examples/vm_power_manager/channel_monitor.c:1080:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				start += strlen(CHANNEL_MGR_FIFO_PATTERN_NAME);
data/dpdk-20.11~rc3/examples/vm_power_manager/oob_monitor_x86.c:275:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(INTERVAL);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_fifo.h:27:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	uint32_t fifo_read = smp_load_acquire(&fifo->read);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_fifo.h:50:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	uint32_t new_read = fifo->read;
data/dpdk-20.11~rc3/kernel/linux/kni/kni_fifo.h:60:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	smp_store_release(&fifo->read, new_read);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_fifo.h:72:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	uint32_t fifo_read = smp_load_acquire(&fifo->read);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_fifo.h:83:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	uint32_t fifo_read = smp_load_acquire(&fifo->read);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_misc.c:348:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(kni->name, dev_info.name, RTE_KNI_NAMESIZE);
data/dpdk-20.11~rc3/kernel/linux/kni/kni_misc.c:459:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(dev_info.name) == 0)
data/dpdk-20.11~rc3/lib/librte_bbdev/rte_bbdev.c:151:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(rte_bbdev_data[data_id].name) == 0) {
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:233:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			_strip(split[0], strlen(split[0]));
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:234:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			_strip(split[1], strlen(split[1]));
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:235:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char *end = memchr(split[1], '\\', strlen(split[1]));
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:237:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t split_len = strlen(split[1]) + 1;
data/dpdk-20.11~rc3/lib/librte_cfgfile/rte_cfgfile.c:244:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				end = memchr(end, '\\', strlen(end));
data/dpdk-20.11~rc3/lib/librte_cmdline/cmdline_os_unix.c:46:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read(cl->s_in, c, 1);
data/dpdk-20.11~rc3/lib/librte_compressdev/rte_compressdev.c:158:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(driver_name));
data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev.c:618:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(driver_name) + 1);
data/dpdk-20.11~rc3/lib/librte_cryptodev/rte_cryptodev.c:1984:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(driver_name, name, strlen(driver_name) + 1) == 0)
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_bus.c:23:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	RTE_VERIFY(bus->name && strlen(bus->name));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_class.c:19:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	RTE_VERIFY(class->name && strlen(class->name));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_devargs.c:97:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(layers[i].key, s, strlen(layers[i].key)) &&
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_devargs.c:174:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strncmp(bus->name, name, strlen(bus->name));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_devargs.c:194:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		devname = dev + strlen(bus->name) + 1;
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_memzone.c:82:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(name) > sizeof(mz->name) - 1) {
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:254:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	optlen = strlen(optarg) + 1;
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:566:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(coremask);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:686:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(coremask);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:731:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(corelist);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1201:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(level);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1880:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(internal_cfg->hugefile_prefix) < 1) {
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1885:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(internal_cfg->hugepage_dir) < 1) {
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_options.c:1890:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(internal_cfg->user_mbuf_pool_ops_name) < 1) {
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_proc.c:140:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(name) > 0)
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_ctf.c:413:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memmove(p, p + 1, strlen(p));
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:213:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(val);
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_trace_utils.c:251:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(val) >= sizeof(trace->dir) - 1) {
data/dpdk-20.11~rc3/lib/librte_eal/common/eal_common_uuid.c:120:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(in) != 36)
data/dpdk-20.11~rc3/lib/librte_eal/common/rte_service.c:252:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (spec->callback == NULL || strlen(spec->name) == 0)
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_interrupts.c:490:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			bytes_read = read(event_fd, &buf, bytes_read);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_thread.c:57:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n = read(w2m, &c, 1);
data/dpdk-20.11~rc3/lib/librte_eal/freebsd/eal_thread.c:107:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = read(m2w, &c, 1);
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_string_fns.h:75:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return l + strlen(src);
data/dpdk-20.11~rc3/lib/librte_eal/include/rte_version.h:47:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(RTE_VER_SUFFIX) == 0)
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_cpuflags.c:59:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (read(auxv_fd, &auxv, sizeof(auxv)) == sizeof(auxv)) {
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:880:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			int r = read(intr_pipe.readfd, buf.charbuf,
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:940:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			bytes_read = read(events[n].data.fd, &buf, bytes_read);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_interrupts.c:1207:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nbytes = read(fd, &buf, bytes_read);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:126:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	retval = read(fd, &page, PFN_MASK_SIZE);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_memory.c:211:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	retval = read(fd, &c, 1);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_thread.c:57:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n = read(w2m, &c, 1);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_thread.c:107:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			n = read(m2w, &c, 1);
data/dpdk-20.11~rc3/lib/librte_eal/linux/eal_vfio.c:1955:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cnt = read(fd, &c, 1);
data/dpdk-20.11~rc3/lib/librte_eal/windows/getopt.c:138:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		current_argv_len = strlen(current_argv);
data/dpdk-20.11~rc3/lib/librte_eal/windows/getopt.c:146:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(long_options[i].name) == current_argv_len) {
data/dpdk-20.11~rc3/lib/librte_eal/windows/include/dirent.h:183:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		n = wcslen(dirname);
data/dpdk-20.11~rc3/lib/librte_ethdev/ethdev_private.c:54:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_start = &str[strlen(str) - 1];
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:221:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(iter_anybus_str)) == 0) {
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:222:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		iter->cls_str = devargs_str + strlen(iter_anybus_str);
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:235:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_size = strlen(devargs.args) + 2;
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:265:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_size = strlen(bus_param_key) + strlen(devargs.name) + 2;
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:265:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_size = strlen(bus_param_key) + strlen(devargs.name) + 2;
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:5595:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:5635:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_ethdev/rte_ethdev.c:5685:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_event_eth_tx_adapter.c:668:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(txa->mem_name, mem_name, TXA_SERVICE_NAME_LEN);
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1526:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1554:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1584:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1592:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (p_param == NULL || strlen(p_param) == 0 || !isdigit(*p_param))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1694:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1720:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1730:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (p_param == NULL || strlen(p_param) == 0 || !isdigit(*p_param))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1754:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_eventdev/rte_eventdev.c:1764:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (p_param == NULL || strlen(p_param) == 0 || !isdigit(*p_param))
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:440:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni.c:803:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, old_carrier, 2);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_common.h:62:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	unsigned read;               /**< Next position to be read */
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_common.h:65:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	volatile unsigned read;      /**< Next position to be read */
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_fifo.h:62:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	unsigned fifo_read = __KNI_LOAD_ACQUIRE(&fifo->read);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_fifo.h:83:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	unsigned new_read = fifo->read;
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_fifo.h:93:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	__KNI_STORE_RELEASE(&fifo->read, new_read);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_fifo.h:104:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	unsigned fifo_read = __KNI_LOAD_ACQUIRE(&fifo->read);
data/dpdk-20.11~rc3/lib/librte_kni/rte_kni_fifo.h:115:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	uint32_t fifo_read = __KNI_LOAD_ACQUIRE(&fifo->read);
data/dpdk-20.11~rc3/lib/librte_kvargs/rte_kvargs.c:51:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			while (str[strlen(str) - 1] != ']') {
data/dpdk-20.11~rc3/lib/librte_kvargs/rte_kvargs.c:55:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				str[strlen(str)] = ',';
data/dpdk-20.11~rc3/lib/librte_mempool/rte_mempool_ops.c:47:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(h->name) >= sizeof(ops->name) - 1) {
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1295:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100);
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1438:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (strlen(arg_val) < 4) ||
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1441:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (arg_val[strlen(arg_val) - 1] != ')'))
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_ctl.c:1447:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		arg_val[strlen(arg_val) - 1] = 0; /* Remove the ')'. */
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:184:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    (strlen(p) < 6) ||
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:189:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    (p[strlen(p) - 1] != '>')) {
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:198:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p[strlen(p) - 1] = 0;
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:458:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(buffer, " ");
data/dpdk-20.11~rc3/lib/librte_pipeline/rte_swx_pipeline_spec.c:1022:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(buffer, " ");
data/dpdk-20.11~rc3/lib/librte_port/rte_port_fd.c:92:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n_bytes = read(p->fd, pkt_data, (size_t) p->mtu);
data/dpdk-20.11~rc3/lib/librte_power/guest_channel.c:193:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(global_fds[lcore_id],
data/dpdk-20.11~rc3/lib/librte_power/power_pstate_cpufreq.c:197:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(buf_base))
data/dpdk-20.11~rc3/lib/librte_rawdev/rte_rawdev.c:583:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (params == NULL || strlen(params) == 0 || !isdigit(*params))
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:66:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cmd) >= MAX_CMD_LEN || fn == NULL || cmd[0] != '/'
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:67:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			|| strlen(help) >= MAX_HELP_LEN)
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:307:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(s, info_str, strlen(info_str)) < 0) {
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:313:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int bytes = read(s, buffer, sizeof(buffer) - 1);
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:321:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (cmd && strlen(cmd) < MAX_CMD_LEN) {
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:332:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytes = read(s, buffer, sizeof(buffer) - 1);
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry.c:373:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(runtime_dir) ? runtime_dir : "/tmp", version);
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:95:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(data, &data[strlen(":\"")], strlen(data));
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:95:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(data, &data[strlen(":\"")], strlen(data));
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:192:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char action_sep = action_ptr[strlen(callbacks[i].action)];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:193:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char cmd_sep = cmd_ptr[strlen(callbacks[i].cmd)];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:200:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data_sep = data_ptr[strlen(callbacks[i].data)];
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:205:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data = data_ptr + strlen(DATA_REQ_LABEL);
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:228:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int bytes = read(s, buffer_recv, sizeof(buffer_recv) - 1);
data/dpdk-20.11~rc3/lib/librte_telemetry/telemetry_legacy.c:245:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytes = read(s, buffer_recv, sizeof(buffer_recv) - 1);
data/dpdk-20.11~rc3/lib/librte_vhost/fd_man.c:320:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int r = read(readfd, charbuf, sizeof(charbuf));
data/dpdk-20.11~rc3/lib/librte_vhost/socket.c:357:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(un->sun_path, vsocket->path, sizeof(un->sun_path));
data/dpdk-20.11~rc3/lib/librte_vhost/vhost.c:734:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dev->ifname, if_name, len);
data/dpdk-20.11~rc3/lib/librte_vhost/vhost.c:852:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, dev->ifname, len);
data/dpdk-20.11~rc3/lib/librte_vhost/vhost_user.c:2556:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(sockfd, &msg->payload, msg->size);

ANALYSIS SUMMARY:

Hits = 7155
Lines analyzed = 2090716 in approximately 44.27 seconds (47230 lines/second)
Physical Source Lines of Code (SLOC) = 1482257
Hits@level = [0] 9447 [1] 1120 [2] 4277 [3] 137 [4] 1614 [5]   7
Hits@level+ = [0+] 16602 [1+] 7155 [2+] 6035 [3+] 1758 [4+] 1621 [5+]   7
Hits/KSLOC@level+ = [0+] 11.2005 [1+] 4.8271 [2+] 4.07149 [3+] 1.18603 [4+] 1.0936 [5+] 0.00472253
Dot directories skipped = 2 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.