Lines Matching defs:reply
203 * @reply: Pointer to buffer holding reply.
204 * @reply_len: Length of the reply.
209 static unsigned long vmw_port_hb_in(struct rpc_channel *channel, char *reply,
219 di = (uintptr_t) reply;
248 memcpy(reply, &ebx, bytes);
250 reply += bytes;
321 char *reply;
343 DRM_ERROR("Failed to get reply size for host message.\n");
347 /* No reply available. This is okay. */
352 reply = kzalloc(reply_len + 1, GFP_KERNEL);
353 if (!reply) {
354 DRM_ERROR("Cannot allocate memory for host message reply.\n");
360 ebx = vmw_port_hb_in(channel, reply, reply_len,
363 kfree(reply);
364 reply = NULL;
373 reply[reply_len] = '\0';
387 kfree(reply);
388 reply = NULL;
400 if (!reply)
404 *msg = reply;
418 * @buffer: if NULL, *reply_len will contain reply size.
419 * @length: size of the reply_buf. Set to size of reply upon return
427 char *msg, *reply = NULL;
447 vmw_recv_msg(&channel, (void *) &reply, &reply_len))
451 if (buffer && reply && reply_len > 0) {
452 /* Remove reply code, which are the first 2 characters of
453 * the reply
459 memcpy(buffer, reply + 2, reply_len);
464 kfree(reply);
471 kfree(reply);
576 char *reply = NULL;
579 if (vmw_recv_msg(&channel, (void *) &reply, &reply_len)) {
583 if (reply && reply_len > 0) {
585 reply, reply_len)) {
587 kfree(reply);
592 kfree(reply);