| /dpdk/drivers/event/dlb2/pf/ |
| H A D | dlb2_pf.c | 134 arg->response = response; in dlb2_pf_sched_domain_create() 169 cfg->response = response; in dlb2_pf_ldb_queue_create() 191 args->response = response; in dlb2_pf_get_sn_occupancy() 209 args->response = response; in dlb2_pf_get_sn_allocation() 227 args->response = response; in dlb2_pf_set_sn_allocation() 320 cfg->response = response; in dlb2_pf_ldb_port_create() 396 cfg->response = response; in dlb2_pf_dir_port_create() 425 cfg->response = response; in dlb2_pf_dir_queue_create() 450 cfg->response = response; in dlb2_pf_map_qid() 475 cfg->response = response; in dlb2_pf_unmap_qid() [all …]
|
| /dpdk/drivers/event/dlb2/ |
| H A D | dlb2_user.h | 123 struct dlb2_cmd_response response; member 165 struct dlb2_cmd_response response; member 212 struct dlb2_cmd_response response; member 245 struct dlb2_cmd_response response; member 265 struct dlb2_cmd_response response; member 286 struct dlb2_cmd_response response; member 307 struct dlb2_cmd_response response; member 337 struct dlb2_cmd_response response; member 361 struct dlb2_cmd_response response; member 401 struct dlb2_cmd_response response; member [all …]
|
| H A D | dlb2.c | 690 dlb2_error_strings[cfg->response.status]); in dlb2_hw_create_sched_domain() 695 handle->domain_id = cfg->response.id; in dlb2_hw_create_sched_domain() 906 return cfg.response.id; in dlb2_get_sn_allocation() 945 return cfg.response.id; in dlb2_get_sn_occupancy() 1074 qm_qid = cfg.response.id; in dlb2_hw_create_ldb_queue() 1420 qm_port_id = cfg.response.id; in dlb2_hw_create_ldb_port() 1629 qm_port_id = cfg.response.id; in dlb2_hw_create_dir_port() 1936 return cfg.response.id; in dlb2_hw_create_dir_queue() 2298 return cfg.response.id; in dlb2_eventdev_port_unlinks_in_progress() 4247 return cfg.response.id; in dlb2_get_ldb_queue_depth() [all …]
|
| /dpdk/drivers/net/iavf/ |
| H A D | iavf_ipsec_crypto.c | 477 if (response == NULL) { in iavf_ipsec_crypto_security_association_add() 555 rte_free(response); in iavf_ipsec_crypto_security_association_add() 793 if (response == NULL) { in iavf_ipsec_crypto_inbound_security_policy_add() 814 rte_free(response); in iavf_ipsec_crypto_inbound_security_policy_add() 838 if (response == NULL) { in iavf_ipsec_crypto_sa_update_esn() 867 rte_free(response); in iavf_ipsec_crypto_sa_update_esn() 933 if (response == NULL) { in iavf_ipsec_crypto_security_policy_delete() 964 rte_free(response); in iavf_ipsec_crypto_security_policy_delete() 991 if (response == NULL) { in iavf_ipsec_crypto_sa_del() 1032 rte_free(response); in iavf_ipsec_crypto_sa_del() [all …]
|
| /dpdk/drivers/bus/fslmc/mc/ |
| H A D | mc_sys.c | 57 uint64_t response; in mc_send_command() local 69 response = ioread64(mc_io->regs); in mc_send_command() 70 status = mc_cmd_read_status((struct mc_command *)&response); in mc_send_command()
|
| /dpdk/doc/guides/prog_guide/ |
| H A D | event_crypto_adapter.rst | 45 The application needs to specify event information (response information) 71 to enqueue a crypto operation in addition to the event information (response 224 Set event request/response information 235 to provide only the response information. 238 decide whether request/response data is located in the crypto session/ 241 response in the ``rte_crypto_op``. 244 will be used to set request/response data. The same data will be obtained 250 will be used to set request/response data. The same data will be obtained 253 For session-less it is mandatory to place the request/response data with 271 /* Copy response information */ [all …]
|
| H A D | telemetry_lib.rst | 10 response containing the requested telemetry information. 84 into a JSON response before sending to the client. 91 callback needs to return five integer values in the data response, it can be 100 The resulting response to the client shows the list data provided above 121 The resulting response to the client shows the key/value data provided above 138 Giving the following response to the client::
|
| H A D | multi_proc_support.rst | 217 A "message" type does not expect a response and is meant to be a best-effort 219 way communication mechanism, with the requester expecting a response from the 281 out, or will have received a response to all the messages that were sent. 292 callback to), along with a response descriptor like the one described above. 308 If a response is required, a new ``rte_mp_msg`` message descriptor must be 310 pointer. The resulting response will then be delivered to the correct requestor. 314 response to the request - it must always be explicitly sent even in case 317 to do so will cause the requestor to time out while waiting on a response.
|
| H A D | toeplitz_hash_lib.rst | 92 outgoing connections, such that the response packets will be assigned to the
|
| /dpdk/drivers/raw/ifpga/base/ |
| H A D | opae_spi_transaction.c | 415 unsigned char *response = dev->buffer->tran_resp; in do_transaction() local 436 transaction, RESPONSE_LEN, response, in do_transaction() 442 if (size != ((unsigned int)(response[2] & 0xff) << 8 | in do_transaction() 443 (unsigned int)(response[3] & 0xff))) in do_transaction() 450 transaction, size, response, in do_transaction() 456 *data++ = *response++; in do_transaction()
|
| /dpdk/doc/guides/sample_app_ug/ |
| H A D | fips_validation.rst | 55 running it will generate a response file or ``.rsp``. Differences between the 58 response file. Also if doing decryption it will not have the plain text until it 59 finished the work and in the response file it will be added onto the end of each 104 * rsp-file: The path that the response file or folder is stored. separated by
|
| H A D | ptpclient.rst | 159 Packets are received one by one on the RX ports and, if required, PTP response
|
| H A D | ip_pipeline.rst | 25 commands through the network and wait for the response before pushing the next command.
|
| /dpdk/drivers/common/qat/ |
| H A D | qat_qp.c | 920 struct icp_qat_fw_comn_resp response; in qat_cq_get_fw_version() local 940 if (qat_cq_dequeue_response(qp, &response)) { in qat_cq_get_fw_version() 943 QAT_DP_HEXDUMP_LOG(DEBUG, "NULL response:", &response, in qat_cq_get_fw_version() 944 sizeof(response)); in qat_cq_get_fw_version() 947 if (QAT_FIELD_GET(response.comn_hdr.hdr_flags, in qat_cq_get_fw_version() 950 return response.resrvd[0]; /* return LW4 */ in qat_cq_get_fw_version()
|
| /dpdk/drivers/net/atlantic/ |
| H A D | atl_ethdev.c | 736 struct macsec_msg_fw_response response; in atl_dev_configure_macsec() local 751 hw->aq_fw_ops->send_macsec_req(hw, &msg_macsec, &response); in atl_dev_configure_macsec() 753 if (response.result) in atl_dev_configure_macsec() 786 hw->aq_fw_ops->send_macsec_req(hw, &msg_macsec, &response); in atl_dev_configure_macsec() 788 if (response.result) in atl_dev_configure_macsec() 808 hw->aq_fw_ops->send_macsec_req(hw, &msg_macsec, &response); in atl_dev_configure_macsec() 810 if (response.result) in atl_dev_configure_macsec() 826 hw->aq_fw_ops->send_macsec_req(hw, &msg_macsec, &response); in atl_dev_configure_macsec() 828 if (response.result) in atl_dev_configure_macsec() 844 hw->aq_fw_ops->send_macsec_req(hw, &msg_macsec, &response); in atl_dev_configure_macsec() [all …]
|
| H A D | atl_types.h | 190 struct macsec_msg_fw_response *response);
|
| /dpdk/drivers/net/atlantic/hw_atl/ |
| H A D | hw_atl_utils_fw2x.c | 704 struct macsec_msg_fw_response *response) in aq_fw2x_send_macsec_request() argument 709 if (!req || !response) in aq_fw2x_send_macsec_request() 741 (u32 *)(void *)response, in aq_fw2x_send_macsec_request() 742 RTE_ALIGN(sizeof(*response) / sizeof(u32), sizeof(u32))); in aq_fw2x_send_macsec_request()
|
| /dpdk/doc/guides/nics/ |
| H A D | hns3.rst | 120 Current, the max waiting time for MBX response is 500ms, but in 121 some scenarios, it is not enough. Since it depends on the response 122 of the kernel mode driver, and its response time is related to the
|
| H A D | vmxnet3.rst | 47 In response the hypervisor takes packets and passes them to the vSwitch, It writes into the complet…
|
| /dpdk/doc/guides/cryptodevs/ |
| H A D | octeontx.rst | 11 the response once the operation is completed.
|
| /dpdk/doc/guides/howto/ |
| H A D | telemetry.rst | 58 response. Some available commands are shown below.
|
| /dpdk/doc/guides/contributing/ |
| H A D | vulnerability.rst | 23 At worst, the response will be to report the bug through the usual channels. 318 * `A minimal security response process
|
| /dpdk/doc/guides/rawdevs/ |
| H A D | cnxk_bphy.rst | 54 Message must have type set to ``CNXK_BPHY_CGX_MSG_TYPE_GET_LINKINFO``. In response one will
|
| /dpdk/drivers/net/bnxt/ |
| H A D | bnxt_hwrm.h | 89 void *response,
|
| /dpdk/doc/guides/rel_notes/ |
| H A D | release_18_02.rst | 183 Consumers of this channel need to register an action with an action name to response 188 * ``rte_mp_sendmsg`` is for sending a message without blocking for a response.
|