Lines Matching refs:reply
199 * @reply: Pointer to buffer holding reply.
200 * @reply_len: Length of the reply.
205 static unsigned long vmw_port_hb_in(struct rpc_channel *channel, char *reply,
217 (uintptr_t) reply, channel->cookie_low,
239 memcpy(reply, &ebx, bytes);
241 reply += bytes;
308 char *reply;
326 DRM_ERROR("Failed to get reply size for host message.\n");
330 /* No reply available. This is okay. */
335 reply = kzalloc(reply_len + 1, GFP_KERNEL);
336 if (!reply) {
337 DRM_ERROR("Cannot allocate memory for host message reply.\n");
343 ebx = vmw_port_hb_in(channel, reply, reply_len,
346 kfree(reply);
347 reply = NULL;
356 reply[reply_len] = '\0';
366 kfree(reply);
367 reply = NULL;
379 if (!reply)
383 *msg = reply;
397 * @buffer: if NULL, *reply_len will contain reply size.
398 * @length: size of the reply_buf. Set to size of reply upon return
406 char *msg, *reply = NULL;
426 vmw_recv_msg(&channel, (void *) &reply, &reply_len))
430 if (buffer && reply && reply_len > 0) {
431 /* Remove reply code, which are the first 2 characters of
432 * the reply
438 memcpy(buffer, reply + 2, reply_len);
443 kfree(reply);
450 kfree(reply);
567 char *reply = NULL;
570 if (vmw_recv_msg(&channel, (void *) &reply, &reply_len)) {
574 if (reply && reply_len > 0) {
576 reply, reply_len)) {
578 kfree(reply);
583 kfree(reply);