re: x86/kprobes: Use int3 instead of debug trap for single-step

From: Colin Ian King
Date: Wed Mar 24 2021 - 11:49:16 EST


Hi,

Static analysis on linux-next using Coverity has detected an issue in
the following commit:

commit 6256e668b7af9d81472e03c6a171630c08f8858a
Author: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
Date: Wed Mar 3 00:25:46 2021 +0900

x86/kprobes: Use int3 instead of debug trap for single-step

The analysis is as follows:

160 switch (opcode & 0xf0) {
161 case 0x60:
162 /* can't boost "bound" */
163 return (opcode != 0x62);
164 case 0x70:
165 return 0; /* can't boost conditional jump */
166 case 0x90:
167 return opcode != 0x9a; /* can't boost call far */
168 case 0xc0:
169 /* can't boost software-interruptions */
170 return (0xc1 < opcode && opcode < 0xcc) || opcode ==
0xcf;
171 case 0xd0:
172 /* can boost AA* and XLAT */
173 return (opcode == 0xd4 || opcode == 0xd5 || opcode ==
0xd7);
174 case 0xe0:
175 /* can boost in/out and absolute jmps */
176 return ((opcode & 0x04) || opcode == 0xea);
177 case 0xf0:
178 /* clear and set flags are boostable */
179 return (opcode == 0xf5 || (0xf7 < opcode && opcode <
0xfe));

dead_error_condition: The switch governing value opcode & 0xf0 cannot
be 255.
undefined (#1 of 1): Logically dead code (DEADCODE)
dead_error_begin: Execution cannot reach this statement: case 255:

180 case 0xff:
181 /* indirect jmp is boostable */
182 return X86_MODRM_REG(insn->modrm.bytes[0]) == 4;

the case 0xff statement can never be reached because the switch
statement is acting on opcode & 0xf0.

Colin