Searched refs:agents (Results 1 – 23 of 23) sorted by relevance
12 struct mlx5_hv_vhca_agent *agents[MLX5_HV_VHCA_AGENT_MAX]; member81 struct mlx5_hv_vhca_agent *agent = hv_vhca->agents[i]; in mlx5_hv_vhca_invalidate_work()120 struct mlx5_hv_vhca_agent *agent = hv_vhca->agents[i]; in mlx5_hv_vhca_agents_control()138 struct mlx5_hv_vhca_agent *agent = hv_vhca->agents[i]; in mlx5_hv_vhca_capabilities()220 hv_vhca->agents[MLX5_HV_VHCA_AGENT_CONTROL] = agent; in mlx5_hv_vhca_init()233 agent = hv_vhca->agents[MLX5_HV_VHCA_AGENT_CONTROL]; in mlx5_hv_vhca_cleanup()239 WARN_ON(hv_vhca->agents[i]); in mlx5_hv_vhca_cleanup()270 if (hv_vhca->agents[type]) { in mlx5_hv_vhca_agent_create()288 hv_vhca->agents[type] = agent; in mlx5_hv_vhca_agent_create()302 if (WARN_ON(agent != hv_vhca->agents[agent->type])) { in mlx5_hv_vhca_agent_destroy()[all …]
25 performance of a specific datapath. For example, agents of a L3 cache can be27 masking the agents from which the request come from. If the bit with31 counted for all agent requests (config1 = 0x0). For all the supported agents of
7 device ports to which various AMBA CHI agents are attached.
31 such programs are called "policy agents" here. Typically they involve84 leverage USB module-init-tools support. Later agents might unload drivers.92 files can be used by various user mode policy agents to make sure all the
129 all dynamic suspend events are internal; external agents are not
16 Some system agents rely on the information in sysfs to operate.
60 It also supports logging to multiple remote agents by specifying61 parameters for the multiple agents separated by semicolons and the196 so it is advised to explicitly specify the remote agents' MAC addresses
79 9. SNMP agents2144 9. SNMP agents2147 If running SNMP agents, the bonding driver should be loaded
13 Creating MAD agents30 ioctl. Also, all agents registered through a file descriptor will
10 The Connector driver makes it easy to connect various agents using a24 handling, etc... The Connector driver allows any kernelspace agents to use
78 agents, etc.
129 agents, etc. See cciss_vol_status at http://cciss.sf.net for some examples.
292 to indicate that enumeration is completed and agents are allowed to execute295 The discovery process is performed by agents and is similar to the enumeration297 without changes to the existing routing because agents only gather information301 simultaneously by several agents. After initializing its RapidIO master port
175 accessed by other agents not running in this mode.
1048 to prohibit certain system agents from accessing memory with 1 KiB1052 by hardware agents inside the SoC. Read and write masks can be
163 copy (directly or through your agents or retailers) of that edition to
188 Opaque copy (directly or through your agents or retailers) of that
482 Adapter firmware implements LLDP and DCBX protocol agents as per 802.1AB and
540 Adapter firmware implements LLDP and DCBX protocol agents as per 802.1AB and
749 LLDP/DCBX agents that interface with the Linux kernel's DCB Netlink API. We
177 copy (directly or through your agents or retailers) of that edition to
1389 Opaque copy (directly or through your agents or retailers) of that
2300 This will allow user space agents to monitor unexpected changes