Lines Matching defs:opcode
442 * @opcode: opcode which generated this ack. For error messages.
450 ssize_t __i2400m_bm_ack_verify(struct i2400m *i2400m, int opcode,
457 d_fnstart(8, dev, "(i2400m %p opcode %d ack %p size %zu)\n",
458 i2400m, opcode, ack, ack_size);
463 opcode, ack_size, sizeof(*ack));
469 d_printf(6, dev, "boot-mode cmd %d: HW boot barker\n", opcode);
476 opcode);
485 d_printf(5, dev, "boot-mode cmd %d: notification for opcode %u "
487 opcode, i2400m_brh_get_opcode(ack),
495 "0x%04x\n", opcode, i2400m_brh_get_signature(ack));
498 if (opcode != -1 && opcode != i2400m_brh_get_opcode(ack)) {
500 "received response for opcode %u, expected %u\n",
501 opcode, i2400m_brh_get_opcode(ack), opcode);
506 opcode, i2400m_brh_get_response(ack));
512 "of data\n", opcode, ack_size,
528 d_fnend(8, dev, "(i2400m %p opcode %d ack %p size %zu) = %d\n",
529 i2400m, opcode, ack, ack_size, (int) result);
587 int opcode = cmd == NULL ? -1 : i2400m_brh_get_opcode(cmd);
602 opcode, i2400m_brh_get_use_checksum(cmd),
611 opcode, (int) result); /* bah, %zd doesn't work */
617 result = __i2400m_bm_ack_verify(i2400m, opcode, ack, ack_size, flags);