Lines Matching refs:reply
198 * @reply: Pointer to buffer holding reply.
199 * @reply_len: Length of the reply.
204 static unsigned long vmw_port_hb_in(struct rpc_channel *channel, char *reply,
214 di = (uintptr_t) reply;
243 memcpy(reply, &ebx, bytes);
245 reply += bytes;
316 char *reply;
338 DRM_ERROR("Failed to get reply size for host message.\n");
342 /* No reply available. This is okay. */
347 reply = kzalloc(reply_len + 1, GFP_KERNEL);
348 if (!reply) {
349 DRM_ERROR("Cannot allocate memory for host message reply.\n");
355 ebx = vmw_port_hb_in(channel, reply, reply_len,
358 kfree(reply);
359 reply = NULL;
368 reply[reply_len] = '\0';
382 kfree(reply);
383 reply = NULL;
395 if (!reply)
399 *msg = reply;
413 * @buffer: if NULL, *reply_len will contain reply size.
414 * @length: size of the reply_buf. Set to size of reply upon return
422 char *msg, *reply = NULL;
442 vmw_recv_msg(&channel, (void *) &reply, &reply_len))
446 if (buffer && reply && reply_len > 0) {
447 /* Remove reply code, which are the first 2 characters of
448 * the reply
454 memcpy(buffer, reply + 2, reply_len);
459 kfree(reply);
466 kfree(reply);
571 char *reply = NULL;
574 if (vmw_recv_msg(&channel, (void *) &reply, &reply_len)) {
578 if (reply && reply_len > 0) {
580 reply, reply_len)) {
582 kfree(reply);
587 kfree(reply);