/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/ |
D | ccm.c | 52 skb_queue_walk(&ccm->replies, skb) { in __nfp_ccm_reply() 56 __skb_unlink(skb, &ccm->replies); in __nfp_ccm_reply() 194 __skb_queue_tail(&ccm->replies, skb); in nfp_ccm_rx() 209 skb_queue_head_init(&ccm->replies); in nfp_ccm_init() 216 WARN_ON(!skb_queue_empty(&ccm->replies)); in nfp_ccm_clean()
|
D | ccm.h | 103 struct sk_buff_head replies; member
|
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/flower/ |
D | main.c | 291 nfp_flower_wait_repr_reify(struct nfp_app *app, atomic_t *replies, int tot_repl) in nfp_flower_wait_repr_reify() argument 300 atomic_read(replies) >= tot_repl, in nfp_flower_wait_repr_reify() 344 atomic_t *replies = &priv->reify_replies; in nfp_flower_repr_netdev_preclean() local 347 atomic_set(replies, 0); in nfp_flower_repr_netdev_preclean() 354 nfp_flower_wait_repr_reify(app, replies, 1); in nfp_flower_repr_netdev_preclean() 374 atomic_t *replies = &priv->reify_replies; in nfp_flower_spawn_vnic_reprs() local 452 atomic_set(replies, 0); in nfp_flower_spawn_vnic_reprs() 460 err = nfp_flower_wait_repr_reify(app, replies, reify_cnt); in nfp_flower_spawn_vnic_reprs() 488 atomic_t *replies = &priv->reify_replies; in nfp_flower_spawn_phy_reprs() local 576 atomic_set(replies, 0); in nfp_flower_spawn_phy_reprs() [all …]
|
/kernel/linux/linux-5.10/Documentation/w1/ |
D | w1-netlink.rst | 75 Currently replies to userspace commands are only generated for read 137 Command status replies
|
/kernel/linux/linux-5.10/Documentation/userspace-api/media/cec/ |
D | cec-ioc-receive.rst | 157 are processed differently: either value will match both possible replies. 159 message that has two possible replies other than Feature Abort. The
|
/kernel/linux/linux-5.10/net/ |
D | Kconfig | 150 replies, the Linux box will silently forward the traffic to the 153 reach the outside and can receive replies. It is even possible to
|
/kernel/linux/linux-5.10/net/bridge/netfilter/ |
D | Kconfig | 182 automatically sending arp replies to arp requests.
|
/kernel/linux/linux-5.10/Documentation/usb/ |
D | usbip_protocol.rst | 34 sends an OP_REQ_IMPORT packet. The server replies with OP_REP_IMPORT. If the
|
/kernel/linux/linux-5.10/Documentation/filesystems/ |
D | coda.rst | 108 serviced a request it replies to the operating system with appropriate 165 offered by the cache manager Venus. When the replies from Venus have 185 Venus replies the response is passed back to the caller in unmodified 209 on behalf of a process P, creates messages for Venus, awaits replies 295 retrieves messages by doing a read on the device, replies are sent
|
/kernel/linux/linux-5.10/net/ipv6/netfilter/ |
D | Kconfig | 157 This option allows you to match packets whose replies would
|
/kernel/linux/linux-5.10/Documentation/admin-guide/ |
D | reporting-bugs.rst | 54 maintainer replies to you, make sure to 'Reply-all' in order to keep the
|
/kernel/linux/linux-5.10/net/ipv4/netfilter/ |
D | Kconfig | 159 This option allows you to match packets whose replies would
|
/kernel/linux/linux-5.10/drivers/infiniband/ulp/rtrs/ |
D | README | 88 4. Server replies to the session info request message with RTRS_MSG_INFO_RSP,
|
/kernel/linux/linux-5.10/Documentation/hid/ |
D | uhid.rst | 187 send a SET_REPORT request to your hid device. Once it replies, you must tell
|
/kernel/linux/linux-5.10/Documentation/networking/ |
D | ethtool-netlink.rst | 13 requests and replies is passed using netlink attributes. 249 Kernel replies with corresponding "GET_REPLY" message. For most types, ``GET`` 284 kernel replies. There are two types of string sets: global (independent of
|
D | bonding.rst | 299 fashion, all replies from the ARP targets will be received on 318 Specifies whether or not ARP probes and replies should be 359 ARP requests and replies, and only consider a slave to be up if it 362 For an active slave, the validation checks ARP replies to confirm 364 do not typically receive these replies, the validation performed 383 ARP requests and replies associated with its own instance of 1933 shows the ARP requests and replies on the network, then it may be that 2013 as an unsolicited ARP reply (because ARP matches replies on an
|
D | snmp_counter.rst | 296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into 360 timer, after client replies ACK, TCP stack checks whether the accept 363 time client replies ACK, this socket will get another chance to move 800 TCP stack receives a SYN and replies SYN+ACK. Now the TCP stack is
|
D | ip-sysctl.rst | 72 associated with a socket for example, TCP RSTs or ICMP echo replies). 1323 Basically allow proxy arp replies back to the same interface 1479 Define different modes for sending replies in response to 1513 Both replies and requests type gratuitous arp will trigger the 1828 associated with a socket for example, TCP RSTs or ICMPv6 echo replies).
|
D | rxrpc.rst | 140 replies with a "response". If the response is successful, the security is 263 (#) Sending debug requests and receiving debug replies [TODO].
|
D | arcnet.rst | 532 I do send (sometimes automated) replies to all messages I receive. My email
|
/kernel/linux/linux-5.10/drivers/message/fusion/lsi/ |
D | mpi_history.txt | 590 * Added PriorityReason field to some replies and 703 * Diagnostic Release requests and replies.
|
/kernel/linux/linux-5.10/Documentation/admin-guide/nfs/ |
D | nfsroot.rst | 112 replies from the specified server are accepted.
|
/kernel/linux/linux-5.10/Documentation/process/ |
D | 5.Posting.rst | 273 the patch in their replies. Instead, just put the patch directly into your
|
D | 2.Process.rst | 438 replies to your postings.
|
/kernel/linux/linux-5.10/scripts/ |
D | spelling.txt | 1185 replys||replies
|