Symbol: base_type
drivers/pci/hotplug/cpqphp.h
236
u8 base_type[0x06];
drivers/pci/hotplug/cpqphp_pci.c
1124
if (func->base_type[(cloop - 0x10) >> 2] != type)
drivers/pci/hotplug/cpqphp_pci.c
615
func->base_type[(cloop - 0x10) >> 2] = type;
drivers/pci/hotplug/cpqphp_pci.c
654
func->base_type[(cloop - 0x10) >> 2] = type;
drivers/pinctrl/bcm/pinctrl-nsp-gpio.c
116
static inline bool nsp_get_bit(struct nsp_gpio *chip, enum base_type address,
drivers/pinctrl/bcm/pinctrl-nsp-gpio.c
92
static inline void nsp_set_bit(struct nsp_gpio *chip, enum base_type address,
drivers/spi/spi-bcm-qspi.c
303
static inline u32 bcm_qspi_read(struct bcm_qspi *qspi, enum base_type type,
drivers/spi/spi-bcm-qspi.c
310
static inline void bcm_qspi_write(struct bcm_qspi *qspi, enum base_type type,
include/linux/bpf_verifier.h
989
return base_type(type) == PTR_TO_BTF_ID && type_flag(type) & MEM_ALLOC;
include/linux/bpf_verifier.h
999
type = base_type(type);
kernel/bpf/btf.c
6905
type = base_type(ctx_arg_info->reg_type);
kernel/bpf/log.c
470
if (base_type(type) == PTR_TO_BTF_ID)
kernel/bpf/log.c
487
prefix, str[base_type(type)], postfix);
kernel/bpf/log.c
657
switch (base_type(t)) {
kernel/bpf/log.c
699
if (base_type(t) == PTR_TO_BTF_ID)
kernel/bpf/log.c
725
if (base_type(t) == PTR_TO_MEM) {
kernel/bpf/verifier.c
10459
if (base_type(fn->arg_type[arg]) != ARG_PTR_TO_MEM)
kernel/bpf/verifier.c
10488
if (base_type(fn->arg_type[i]) == ARG_PTR_TO_BTF_ID)
kernel/bpf/verifier.c
10490
if (base_type(fn->arg_type[i]) == ARG_PTR_TO_SPIN_LOCK)
kernel/bpf/verifier.c
10492
if (base_type(fn->arg_type[i]) != ARG_PTR_TO_BTF_ID && fn->arg_btf_id[i] &&
kernel/bpf/verifier.c
10494
(base_type(fn->arg_type[i]) != ARG_PTR_TO_MEM ||
kernel/bpf/verifier.c
10509
if (base_type(arg_type) != ARG_PTR_TO_MEM)
kernel/bpf/verifier.c
10731
} else if (base_type(arg->arg_type) == ARG_PTR_TO_MEM) {
kernel/bpf/verifier.c
10741
} else if (base_type(arg->arg_type) == ARG_PTR_TO_ARENA) {
kernel/bpf/verifier.c
10761
} else if (base_type(arg->arg_type) == ARG_PTR_TO_BTF_ID) {
kernel/bpf/verifier.c
11959
switch (base_type(ret_type)) {
kernel/bpf/verifier.c
12075
base_type(ret_type), func_id_name(func_id),
kernel/bpf/verifier.c
12085
base_type(ret_type), func_id_name(func_id), func_id);
kernel/bpf/verifier.c
12757
if ((base_type(reg->type) == PTR_TO_BTF_ID || reg2btf_ids[base_type(reg->type)])) {
kernel/bpf/verifier.c
12798
if (base_type(reg->type) == PTR_TO_BTF_ID) {
kernel/bpf/verifier.c
12803
reg_ref_id = *reg2btf_ids[base_type(reg->type)];
kernel/bpf/verifier.c
13738
if ((base_type(reg->type) != PTR_TO_BTF_ID ||
kernel/bpf/verifier.c
13740
!reg2btf_ids[base_type(reg->type)]) {
kernel/bpf/verifier.c
13743
reg_type_str(env, base_type(reg->type) |
kernel/bpf/verifier.c
14915
if (base_type(ptr_reg->type) == PTR_TO_MEM && (ptr_reg->type & PTR_UNTRUSTED))
kernel/bpf/verifier.c
14918
switch (base_type(ptr_reg->type)) {
kernel/bpf/verifier.c
17693
base_type(src_reg->type) != PTR_TO_BTF_ID &&
kernel/bpf/verifier.c
17694
base_type(dst_reg->type) != PTR_TO_BTF_ID) {
kernel/bpf/verifier.c
17780
switch (base_type(dst_reg->type)) {
kernel/bpf/verifier.c
19851
switch (base_type(rold->type)) {
kernel/bpf/verifier.c
20839
switch (base_type(type)) {
kernel/bpf/verifier.c
20873
switch (base_type(type)) {
kernel/bpf/verifier.c
20884
return base_type(type) == PTR_TO_MEM;
kernel/bpf/verifier.c
2261
if (base_type(reg->type) == PTR_TO_MAP_VALUE) {
kernel/bpf/verifier.c
2311
return base_type(reg->type) == PTR_TO_MEM &&
kernel/bpf/verifier.c
24641
} else if (base_type(arg->arg_type) == ARG_PTR_TO_MEM) {
kernel/bpf/verifier.c
24649
} else if (base_type(arg->arg_type) == ARG_PTR_TO_BTF_ID) {
kernel/bpf/verifier.c
24661
} else if (base_type(arg->arg_type) == ARG_PTR_TO_ARENA) {
kernel/bpf/verifier.c
414
type = base_type(type);
kernel/bpf/verifier.c
5109
switch (base_type(type)) {
kernel/bpf/verifier.c
6003
if (base_type(reg->type) != PTR_TO_BTF_ID || (type_flag(reg->type) & ~perm_flags))
kernel/bpf/verifier.c
6399
if (base_type(info->reg_type) == PTR_TO_BTF_ID) {
kernel/bpf/verifier.c
6552
if (reg2btf_ids[base_type(reg->type)] &&
kernel/bpf/verifier.c
7786
} else if (base_type(reg->type) == PTR_TO_MEM) {
kernel/bpf/verifier.c
7863
if (base_type(info.reg_type) == PTR_TO_BTF_ID) {
kernel/bpf/verifier.c
7922
} else if (base_type(reg->type) == PTR_TO_BTF_ID &&
kernel/bpf/verifier.c
7929
} else if (base_type(reg->type) == PTR_TO_BUF &&
kernel/bpf/verifier.c
8360
switch (base_type(reg->type)) {
kernel/bpf/verifier.c
9289
return base_type(type) == ARG_PTR_TO_MEM &&
kernel/bpf/verifier.c
9300
return base_type(type) == ARG_PTR_TO_DYNPTR;
kernel/bpf/verifier.c
9454
compatible = compatible_reg_types[base_type(arg_type)];
kernel/bpf/verifier.c
9476
if (base_type(arg_type) == ARG_PTR_TO_MEM)
kernel/bpf/verifier.c
9501
if (base_type(reg->type) != PTR_TO_BTF_ID)
kernel/bpf/verifier.c
9896
if (base_type(arg_type) == ARG_PTR_TO_MAP_VALUE) {
kernel/bpf/verifier.c
9909
if (base_type(arg_type) == ARG_PTR_TO_BTF_ID ||
kernel/bpf/verifier.c
9910
base_type(arg_type) == ARG_PTR_TO_SPIN_LOCK)
kernel/bpf/verifier.c
9954
if (reg->ref_obj_id && base_type(arg_type) != ARG_KPTR_XCHG_DEST) {
kernel/bpf/verifier.c
9964
switch (base_type(arg_type)) {
net/ipv4/bpf_tcp_ca.c
52
if (base_type(info->reg_type) == PTR_TO_BTF_ID &&
tools/testing/selftests/bpf/veristat.c
2004
const struct btf_type *base_type;
tools/testing/selftests/bpf/veristat.c
2013
base_type = btf__type_by_id(btf, tid);
tools/testing/selftests/bpf/veristat.c
2024
err = adjust_var_secinfo_member(btf, base_type, 0, atom->name, sinfo);
tools/testing/selftests/bpf/veristat.c
2035
base_type = btf__type_by_id(btf, sinfo->type);
tools/testing/selftests/bpf/veristat.c
2046
const struct btf_type *base_type;
tools/testing/selftests/bpf/veristat.c
2051
base_type = btf__type_by_id(btf, btf__resolve_type(btf, sinfo->type));
tools/testing/selftests/bpf/veristat.c
2052
if (!base_type) {
tools/testing/selftests/bpf/veristat.c
2056
if (!is_preset_supported(base_type)) {
tools/testing/selftests/bpf/veristat.c
2063
if (btf_is_any_enum(base_type)) {
tools/testing/selftests/bpf/veristat.c
2064
if (enum_value_from_name(btf, base_type, preset->value.svalue, &value)) {
tools/testing/selftests/bpf/veristat.c
2073
btf__name_by_offset(btf, base_type->name_off));
tools/testing/selftests/bpf/veristat.c
2080
bool is_signed = is_signed_type(base_type);
tools/testing/selftests/bpf/veristat.c
2087
btf__name_by_offset(btf, base_type->name_off), value,