Lines Matching refs:branch

137  * insn, the register holding that pointer in the true branch changes state to

139 * branch. See check_cond_jmp_op().
153 * passes through a NULL-check conditional. For the branch wherein the state is
163 /* verifier_state + insn_idx are pushed to stack when branch is encountered */
983 * 1. speculative states will bump 'branches' for non-branch
1757 /* for any branch, call, exit record the history of jmps in the given state */
2726 * branch.
5714 struct bpf_verifier_state *branch;
5717 branch = push_stack(env, next_idx, curr_idx, true);
5718 if (branch && insn) {
5719 regs = branch->frame[branch->curframe]->regs;
5727 return branch;
7386 /* compute branch direction of the expression "if (reg opcode val) goto target;"
7388 * 1 - branch will be taken and "goto target" will be executed
7389 * 0 - branch will not be taken and fall-through to next insn
7401 * use this to direct branch taken.
7710 /* regs[regno] is in the " == NULL" branch.
7897 * the fall-through branch for simulation under speculative
7906 /* Only follow the fall-through branch, since that's where the
7907 * program will go. If needed, push the goto branch for
7965 /* Mark all identical registers in each branch as either
8312 * 0x12 - discovered and fall-through and branch edges labelled
8366 /* mark branch target for state pruning */
8493 /* all other non-branch instructions with single
8942 * Since the verifier pushes the branch states as it sees them while exploring
8943 * the program the condition of walking the branch instruction for the second
8944 * time means that all states below this branch were already explored and
8953 * Important note here that walking the same branch instruction in the callee
9193 * branch doesn't need to be explored further, since verifier already
9637 * for one branch accessing the pointer, but not ok for the other branch:
9783 * src_reg == ctx in one branch and
9784 * src_reg == stack|map in some other branch.
11375 * conditional branch in the interpeter for every normal