Hi,

Static analysis on linux-next using Coverity has detected an issue in
the following commit:

commit 6256e668b7af9d81472e03c6a171630c08f8858a
Author: Masami Hiramatsu <mhira...@kernel.org>
Date:   Wed Mar 3 00:25:46 2021 +0900

    x86/kprobes: Use int3 instead of debug trap for single-step

The analysis is as follows:

160        switch (opcode & 0xf0) {
161        case 0x60:
162                /* can't boost "bound" */
163                return (opcode != 0x62);
164        case 0x70:
165                return 0; /* can't boost conditional jump */
166        case 0x90:
167                return opcode != 0x9a;  /* can't boost call far */
168        case 0xc0:
169                /* can't boost software-interruptions */
170                return (0xc1 < opcode && opcode < 0xcc) || opcode ==
0xcf;
171        case 0xd0:
172                /* can boost AA* and XLAT */
173                return (opcode == 0xd4 || opcode == 0xd5 || opcode ==
0xd7);
174        case 0xe0:
175                /* can boost in/out and absolute jmps */
176                return ((opcode & 0x04) || opcode == 0xea);
177        case 0xf0:
178                /* clear and set flags are boostable */
179                return (opcode == 0xf5 || (0xf7 < opcode && opcode <
0xfe));

   dead_error_condition: The switch governing value opcode & 0xf0 cannot
be 255.
  undefined (#1 of 1): Logically dead code (DEADCODE)
  dead_error_begin: Execution cannot reach this statement: case 255:

180        case 0xff:
181                /* indirect jmp is boostable */
182               return X86_MODRM_REG(insn->modrm.bytes[0]) == 4;

the case 0xff statement can never be reached because the switch
statement is acting on opcode & 0xf0.

Colin

Reply via email to