Lines Matching defs:netfn

231 	unsigned char netfn;
975 msg->msg.netfn |= 1; /* Convert to a response. */
1102 unsigned char netfn,
1117 && (msg->msg.netfn == netfn)
1654 unsigned char netfn,
1662 if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd)
1670 unsigned char netfn,
1678 if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd)
1686 unsigned char netfn,
1704 rcvr->netfn = netfn;
1709 /* Make sure the command/netfn is not already registered. */
1710 if (!is_cmd_rcvr_exclusive(intf, netfn, cmd, chans)) {
1731 unsigned char netfn,
1748 rcvr = find_cmd_rcvr(intf, netfn, cmd, i);
1805 smi_msg->data[i+4] = (msg->netfn << 2) | (ipmb_addr->lun & 0x3);
1842 smi_msg->data[5] = (msg->netfn << 2) | (lan_addr->lun & 0x3);
1903 return (((msg->netfn == IPMI_NETFN_APP_REQUEST)
1906 || (msg->netfn == IPMI_NETFN_FIRMWARE_REQUEST));
1920 if (msg->netfn & 1)
1932 if ((msg->netfn == IPMI_NETFN_APP_REQUEST)
1964 smi_msg->data[0] = (msg->netfn << 2) | (smi_addr->lun & 0x3);
2034 if (recv_msg->msg.netfn & 0x1) {
2126 bool is_cmd = !(recv_msg->msg.netfn & 0x1);
2152 smi_msg->data[0] = msg->netfn << 2 | daddr->rs_lun;
2155 smi_msg->data[0] = msg->netfn << 2 | daddr->rq_lun;
2214 if (recv_msg->msg.netfn & 0x1) {
2493 || (msg->msg.netfn != IPMI_NETFN_APP_RESPONSE)
2496 "invalid device_id msg: addr_type=%d netfn=%x cmd=%x\n",
2497 msg->addr.addr_type, msg->msg.netfn, msg->msg.cmd);
2508 rv = ipmi_demangle_device_id(msg->msg.netfn, msg->msg.cmd,
2537 msg.netfn = IPMI_NETFN_APP_REQUEST;
3275 msg.netfn = IPMI_NETFN_APP_REQUEST;
3298 || (msg->msg.netfn != IPMI_NETFN_APP_RESPONSE)
3359 msg.netfn = IPMI_NETFN_APP_REQUEST;
3387 && (msg->msg.netfn == IPMI_NETFN_APP_RESPONSE)
3860 * for netfn, which needs to be the response that was
3863 recv_msg->msg.netfn = msg->rsp[4] >> 2;
3880 unsigned char netfn;
3898 netfn = msg->rsp[4] >> 2;
3903 rcvr = find_cmd_rcvr(intf, netfn, cmd, chan);
3919 msg->data[4] = ((netfn + 1) << 2) | (msg->rsp[7] & 0x3);
3968 recv_msg->msg.netfn = msg->rsp[4] >> 2;
3997 unsigned char netfn = msg->rsp[0] >> 2;
4002 rcvr = find_cmd_rcvr(intf, netfn, cmd, 0);
4014 msg->data[0] = (netfn + 1) << 2;
4060 recv_msg->msg.netfn = msg->rsp[0] >> 2;
4098 recv_msg->msg.netfn = msg->rsp[0] >> 2;
4160 * for netfn, which needs to be the response that was
4163 recv_msg->msg.netfn = msg->rsp[6] >> 2;
4180 unsigned char netfn;
4198 netfn = msg->rsp[6] >> 2;
4203 rcvr = find_cmd_rcvr(intf, netfn, cmd, chan);
4247 recv_msg->msg.netfn = msg->rsp[6] >> 2;
4279 unsigned char netfn;
4305 netfn = msg->rsp[0] >> 2;
4310 rcvr = find_cmd_rcvr(intf, netfn, cmd, chan);
4354 recv_msg->msg.netfn = msg->rsp[0] >> 2;
4386 recv_msg->msg.netfn = msg->rsp[0] >> 2;
4515 recv_msg->msg.netfn = msg->rsp[0] >> 2;
4543 "BMC returned too small a message for netfn %x cmd %x, got %d bytes\n",
4621 "BMC returned incorrect response, expected netfn %x cmd %x, got netfn %x cmd %x\n",
5230 && (msg->msg.netfn == IPMI_NETFN_SENSOR_EVENT_RESPONSE)
5242 && (msg->msg.netfn == IPMI_NETFN_APP_RESPONSE)
5273 msg.netfn = 0x04; /* Sensor or Event. */
5325 msg.netfn = IPMI_NETFN_APP_REQUEST;
5334 msg.netfn = IPMI_NETFN_SENSOR_EVENT_REQUEST;
5373 msg.netfn = IPMI_NETFN_STORAGE_REQUEST; /* Storage. */