.result = REJECT,
                .prog_type = BPF_PROG_TYPE_XDP,
        },
+       {
+               "search pruning: all branches should be verified (nop operation)",
+               .insns = {
+                       BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
+                       BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
+                       BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
+                       BPF_LD_MAP_FD(BPF_REG_1, 0),
+                       BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
+                       BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
+                       BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
+                       BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
+                       BPF_MOV64_IMM(BPF_REG_4, 0),
+                       BPF_JMP_A(1),
+                       BPF_MOV64_IMM(BPF_REG_4, 1),
+                       BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
+                       BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
+                       BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
+                       BPF_JMP_IMM(BPF_JEQ, BPF_REG_5, 0, 2),
+                       BPF_MOV64_IMM(BPF_REG_6, 0),
+                       BPF_ST_MEM(BPF_DW, BPF_REG_6, 0, 0xdead),
+                       BPF_EXIT_INSN(),
+               },
+               .fixup_map1 = { 3 },
+               .errstr = "R6 invalid mem access 'inv'",
+               .result = REJECT,
+               .prog_type = BPF_PROG_TYPE_TRACEPOINT,
+       },
+       {
+               "search pruning: all branches should be verified (invalid stack access)",
+               .insns = {
+                       BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
+                       BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
+                       BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
+                       BPF_LD_MAP_FD(BPF_REG_1, 0),
+                       BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
+                       BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
+                       BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
+                       BPF_MOV64_IMM(BPF_REG_4, 0),
+                       BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
+                       BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
+                       BPF_JMP_A(1),
+                       BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -24),
+                       BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
+                       BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
+                       BPF_EXIT_INSN(),
+               },
+               .fixup_map1 = { 3 },
+               .errstr = "invalid read from stack off -16+0 size 8",
+               .result = REJECT,
+               .prog_type = BPF_PROG_TYPE_TRACEPOINT,
+       },
 };
 
 static int probe_filter_length(const struct bpf_insn *fp)