Indirect branch

An indirect branch (also known as a computed jump, indirect jump and register-indirect jump) is a type of program control instruction present in some machine language instruction sets. Rather than specifying the address of the next instruction to execute, as in a direct branch, the argument specifies where the address is located. An example is 'jump indirect on the r1 register', which means that the next instruction to be executed is at the address in register r1. The address to be jumped to is not known until the instruction is executed. Indirect branches can also depend on the value of a memory location.

An indirect branch can be useful to make a conditional branch, especially a multiway branch. For instance, based on program input, a value could be looked up in a jump table of pointers to code for handling the various cases implied by the data value. The data value could be added to the address of the table, with the result stored in a register. An indirect jump could then be made based on the value of that register, efficiently dispatching program control to the code appropriate to the input.

In a similar manner, subroutine call instructions can be indirect, with the address of the subroutine to be called specified in memory. Function Pointers are typically implemented with indirect subroutine calls.

Indirect branches were one of the attack surfaces of Spectre. To mitigate the attack GCC 8.1 introduced the following new options:,   and.

Example assembler syntax



 * MSP430: ||
 * SPARC: ||
 * MIPS:  ||jr $ra
 * x86 (AT&T Syntax):    ||jmp *%eax
 * x86 (Intel Syntax):    ||jmp eax
 * ARM:   ||BX r0, mov pc, r2
 * Itanium (x86 family):  ||
 * 6502:  ||jmp ($0DEA)
 * 65C816: ||jsr ($0DEA,X)
 * 6809: ||, ,
 * 6800: ||
 * Z80: ||
 * Intel 8080: ||
 * IBM System z: ||
 * RISC-V:
 * }
 * 65C816: ||jsr ($0DEA,X)
 * 6809: ||, ,
 * 6800: ||
 * Z80: ||
 * Intel 8080: ||
 * IBM System z: ||
 * RISC-V:
 * }
 * Intel 8080: ||
 * IBM System z: ||
 * RISC-V:
 * }
 * RISC-V:
 * }
 * }