/Linux-v5.4/drivers/net/ethernet/netronome/nfp/ |
D | ccm.c | 52 skb_queue_walk(&ccm->replies, skb) { in __nfp_ccm_reply() 56 __skb_unlink(skb, &ccm->replies); in __nfp_ccm_reply() 194 __skb_queue_tail(&ccm->replies, skb); in nfp_ccm_rx() 209 skb_queue_head_init(&ccm->replies); in nfp_ccm_init() 216 WARN_ON(!skb_queue_empty(&ccm->replies)); in nfp_ccm_clean()
|
D | ccm.h | 102 struct sk_buff_head replies; member
|
/Linux-v5.4/drivers/net/ethernet/netronome/nfp/flower/ |
D | main.c | 291 nfp_flower_wait_repr_reify(struct nfp_app *app, atomic_t *replies, int tot_repl) in nfp_flower_wait_repr_reify() argument 300 atomic_read(replies) >= tot_repl, in nfp_flower_wait_repr_reify() 344 atomic_t *replies = &priv->reify_replies; in nfp_flower_repr_netdev_preclean() local 347 atomic_set(replies, 0); in nfp_flower_repr_netdev_preclean() 354 nfp_flower_wait_repr_reify(app, replies, 1); in nfp_flower_repr_netdev_preclean() 374 atomic_t *replies = &priv->reify_replies; in nfp_flower_spawn_vnic_reprs() local 452 atomic_set(replies, 0); in nfp_flower_spawn_vnic_reprs() 460 err = nfp_flower_wait_repr_reify(app, replies, reify_cnt); in nfp_flower_spawn_vnic_reprs() 488 atomic_t *replies = &priv->reify_replies; in nfp_flower_spawn_phy_reprs() local 576 atomic_set(replies, 0); in nfp_flower_spawn_phy_reprs() [all …]
|
/Linux-v5.4/Documentation/w1/ |
D | w1-netlink.rst | 75 Currently replies to userspace commands are only generated for read 137 Command status replies
|
/Linux-v5.4/Documentation/media/uapi/cec/ |
D | cec-ioc-receive.rst | 162 are processed differently: either value will match both possible replies. 164 message that has two possible replies other than Feature Abort. The
|
/Linux-v5.4/net/ |
D | Kconfig | 145 replies, the Linux box will silently forward the traffic to the 148 reach the outside and can receive replies. It is even possible to
|
/Linux-v5.4/net/bridge/netfilter/ |
D | Kconfig | 182 automatically sending arp replies to arp requests.
|
/Linux-v5.4/Documentation/usb/ |
D | usbip_protocol.rst | 34 sends an OP_REQ_IMPORT packet. The server replies with OP_REP_IMPORT. If the
|
/Linux-v5.4/net/ipv6/netfilter/ |
D | Kconfig | 157 This option allows you to match packets whose replies would
|
/Linux-v5.4/Documentation/admin-guide/ |
D | reporting-bugs.rst | 54 maintainer replies to you, make sure to 'Reply-all' in order to keep the
|
/Linux-v5.4/net/ipv4/netfilter/ |
D | Kconfig | 159 This option allows you to match packets whose replies would
|
/Linux-v5.4/Documentation/filesystems/ |
D | coda.txt | 163 serviced a request it replies to the operating system with appropriate 221 offered by the cache manager Venus. When the replies from Venus have 246 Venus replies the response is passed back to the caller in unmodified 272 on behalf of a process P, creates messages for Venus, awaits replies 362 retrieves messages by doing a read on the device, replies are sent
|
/Linux-v5.4/Documentation/hid/ |
D | uhid.rst | 187 send a SET_REPORT request to your hid device. Once it replies, you must tell
|
/Linux-v5.4/drivers/message/fusion/lsi/ |
D | mpi_history.txt | 590 * Added PriorityReason field to some replies and 703 * Diagnostic Release requests and replies.
|
/Linux-v5.4/Documentation/networking/ |
D | bonding.txt | 290 fashion, all replies from the ARP targets will be received on 309 Specifies whether or not ARP probes and replies should be 350 ARP requests and replies, and only consider a slave to be up if it 353 For an active slave, the validation checks ARP replies to confirm 355 do not typically receive these replies, the validation performed 374 ARP requests and replies associated with its own instance of 1897 shows the ARP requests and replies on the network, then it may be that 1977 as an unsolicited ARP reply (because ARP matches replies on an
|
D | ip-sysctl.txt | 61 associated with a socket for example, TCP RSTs or ICMP echo replies). 1156 Basically allow proxy arp replies back to the same interface 1297 Define different modes for sending replies in response to 1326 Both replies and requests type gratuitous arp will trigger the 1594 associated with a socket for example, TCP RSTs or ICMPv6 echo replies).
|
D | snmp_counter.rst | 296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into 360 timer, after client replies ACK, TCP stack checks whether the accept 363 time client replies ACK, this socket will get another chance to move 800 TCP stack receives a SYN and replies SYN+ACK. Now the TCP stack is
|
D | rxrpc.txt | 140 replies with a "response". If the response is successful, the security is 264 (*) Sending debug requests and receiving debug replies [TODO].
|
D | arcnet.txt | 496 I do send (sometimes automated) replies to all messages I receive. My email
|
/Linux-v5.4/Documentation/filesystems/nfs/ |
D | nfsroot.txt | 108 replies from the specified server are accepted.
|
/Linux-v5.4/Documentation/process/ |
D | 5.Posting.rst | 273 the patch in their replies. Instead, just put the patch directly into your
|
D | 2.Process.rst | 436 replies to your postings.
|
D | howto.rst | 411 Remember to keep the context and the attribution of your replies intact,
|
/Linux-v5.4/drivers/staging/wusbcore/Documentation/ |
D | wusb-design-overview.rst | 183 and sends the replies and notifications back to the API
|
/Linux-v5.4/scripts/ |
D | spelling.txt | 1114 replys||replies
|