chaininfo          74 include/linux/netfilter_bridge/ebtables.h 	struct ebt_entries *chaininfo; /* pointer to chain data */
chaininfo         190 net/bridge/netfilter/ebtables.c 	struct ebt_entries *chaininfo;
chaininfo         206 net/bridge/netfilter/ebtables.c 	chaininfo = private->hook_entry[hook];
chaininfo         258 net/bridge/netfilter/ebtables.c 			chaininfo = cs[sp].chaininfo;
chaininfo         259 net/bridge/netfilter/ebtables.c 			nentries = chaininfo->nentries;
chaininfo         262 net/bridge/netfilter/ebtables.c 			   chaininfo->counter_offset;
chaininfo         275 net/bridge/netfilter/ebtables.c 		cs[sp].chaininfo = chaininfo;
chaininfo         278 net/bridge/netfilter/ebtables.c 		chaininfo = (struct ebt_entries *) (base + verdict);
chaininfo         280 net/bridge/netfilter/ebtables.c 		if (WARN(chaininfo->distinguisher, "jump to non-chain\n")) {
chaininfo         285 net/bridge/netfilter/ebtables.c 		nentries = chaininfo->nentries;
chaininfo         286 net/bridge/netfilter/ebtables.c 		point = (struct ebt_entry *)chaininfo->data;
chaininfo         287 net/bridge/netfilter/ebtables.c 		counter_base = cb_base + chaininfo->counter_offset;
chaininfo         296 net/bridge/netfilter/ebtables.c 	if (chaininfo->policy == EBT_RETURN)
chaininfo         298 net/bridge/netfilter/ebtables.c 	if (chaininfo->policy == EBT_ACCEPT) {
chaininfo         571 net/bridge/netfilter/ebtables.c 	udc[*n].cs.chaininfo = (struct ebt_entries *)e;
chaininfo         684 net/bridge/netfilter/ebtables.c 			if ((char *)(cl_s[i].cs.chaininfo) > (char *)e)
chaininfo         775 net/bridge/netfilter/ebtables.c 				cl_s[cl_s[chain_nr].from].cs.chaininfo->nentries;
chaininfo         797 net/bridge/netfilter/ebtables.c 				if (hlp2 == cl_s[i].cs.chaininfo)