/linux/drivers/net/ethernet/netronome/nfp/ |
A D | ccm.c | 52 skb_queue_walk(&ccm->replies, skb) { in __nfp_ccm_reply() 56 __skb_unlink(skb, &ccm->replies); in __nfp_ccm_reply() 194 __skb_queue_tail(&ccm->replies, skb); in nfp_ccm_rx() 209 skb_queue_head_init(&ccm->replies); in nfp_ccm_init() 216 WARN_ON(!skb_queue_empty(&ccm->replies)); in nfp_ccm_clean()
|
A D | ccm.h | 103 struct sk_buff_head replies; member
|
/linux/drivers/net/ethernet/netronome/nfp/flower/ |
A D | main.c | 291 nfp_flower_wait_repr_reify(struct nfp_app *app, atomic_t *replies, int tot_repl) in nfp_flower_wait_repr_reify() argument 300 atomic_read(replies) >= tot_repl, in nfp_flower_wait_repr_reify() 344 atomic_t *replies = &priv->reify_replies; in nfp_flower_repr_netdev_preclean() local 347 atomic_set(replies, 0); in nfp_flower_repr_netdev_preclean() 354 nfp_flower_wait_repr_reify(app, replies, 1); in nfp_flower_repr_netdev_preclean() 374 atomic_t *replies = &priv->reify_replies; in nfp_flower_spawn_vnic_reprs() local 452 atomic_set(replies, 0); in nfp_flower_spawn_vnic_reprs() 460 err = nfp_flower_wait_repr_reify(app, replies, reify_cnt); in nfp_flower_spawn_vnic_reprs() 488 atomic_t *replies = &priv->reify_replies; in nfp_flower_spawn_phy_reprs() local 576 atomic_set(replies, 0); in nfp_flower_spawn_phy_reprs() [all …]
|
/linux/Documentation/w1/ |
A D | w1-netlink.rst | 75 Currently replies to userspace commands are only generated for read 137 Command status replies
|
/linux/Documentation/networking/devlink/ |
A D | prestera.rst | 78 - Traps ARP replies packets that have switch-port's DA Mac address
|
/linux/net/ |
A D | Kconfig | 150 replies, the Linux box will silently forward the traffic to the 153 reach the outside and can receive replies. It is even possible to
|
/linux/Documentation/userspace-api/media/cec/ |
A D | cec-ioc-receive.rst | 157 are processed differently: either value will match both possible replies. 159 message that has two possible replies other than Feature Abort. The
|
/linux/Documentation/filesystems/ |
A D | coda.rst | 108 serviced a request it replies to the operating system with appropriate 165 offered by the cache manager Venus. When the replies from Venus have 185 Venus replies the response is passed back to the caller in unmodified 209 on behalf of a process P, creates messages for Venus, awaits replies 295 retrieves messages by doing a read on the device, replies are sent
|
/linux/net/bridge/netfilter/ |
A D | Kconfig | 180 automatically sending arp replies to arp requests.
|
/linux/net/ipv6/netfilter/ |
A D | Kconfig | 160 This option allows you to match packets whose replies would
|
/linux/Documentation/usb/ |
A D | usbip_protocol.rst | 34 sends an OP_REQ_IMPORT packet. The server replies with OP_REP_IMPORT. If the
|
/linux/drivers/infiniband/ulp/rtrs/ |
A D | README | 88 4. Server replies to the session info request message with RTRS_MSG_INFO_RSP,
|
/linux/net/ipv4/netfilter/ |
A D | Kconfig | 165 This option allows you to match packets whose replies would
|
/linux/Documentation/hid/ |
A D | uhid.rst | 187 send a SET_REPORT request to your HID device. Once it replies, you must tell
|
/linux/Documentation/filesystems/nfs/ |
A D | exporting.rst | 189 replies when doing operations on this filesystem. Consider enabling
|
/linux/drivers/message/fusion/lsi/ |
A D | mpi_history.txt | 590 * Added PriorityReason field to some replies and 703 * Diagnostic Release requests and replies.
|
/linux/Documentation/networking/ |
A D | bonding.rst | 299 fashion, all replies from the ARP targets will be received on 318 Specifies whether or not ARP probes and replies should be 359 ARP requests and replies, and only consider a slave to be up if it 362 For an active slave, the validation checks ARP replies to confirm 364 do not typically receive these replies, the validation performed 383 ARP requests and replies associated with its own instance of 1958 shows the ARP requests and replies on the network, then it may be that 2038 as an unsolicited ARP reply (because ARP matches replies on an
|
A D | ethtool-netlink.rst | 13 requests and replies is passed using netlink attributes. 267 Kernel replies with corresponding "GET_REPLY" message. For most types, ``GET`` 302 kernel replies. There are two types of string sets: global (independent of
|
A D | ip-sysctl.rst | 74 associated with a socket for example, TCP RSTs or ICMP echo replies). 1398 Basically allow proxy arp replies back to the same interface 1513 performing source address selection for ICMP replies, or 1573 Define different modes for sending replies in response to 1607 Both replies and requests type gratuitous arp will trigger the 1998 associated with a socket for example, TCP RSTs or ICMPv6 echo replies).
|
A D | snmp_counter.rst | 296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into 360 timer, after client replies ACK, TCP stack checks whether the accept 363 time client replies ACK, this socket will get another chance to move 800 TCP stack receives a SYN and replies SYN+ACK. Now the TCP stack is
|
A D | rxrpc.rst | 140 replies with a "response". If the response is successful, the security is 263 (#) Sending debug requests and receiving debug replies [TODO].
|
/linux/Documentation/admin-guide/nfs/ |
A D | nfsroot.rst | 112 replies from the specified server are accepted.
|
/linux/Documentation/process/ |
A D | 5.Posting.rst | 273 the patch in their replies. Instead, just put the patch directly into your
|
/linux/Documentation/admin-guide/ |
A D | reporting-issues.rst | 1165 replies to your own mail. Just remember to actually do that once the report 1364 ask others for public or private replies how to move on. If that fails, it 1387 Here are your duties in case you got replies to your report: 1432 After the reminder wait three more weeks for replies. If you still don't get a 1444 why the report did not get any replies. A good moment for this second reminder
|
/linux/scripts/ |
A D | spelling.txt | 1249 replys||replies
|