chaininfo 74 include/linux/netfilter_bridge/ebtables.h struct ebt_entries *chaininfo; /* pointer to chain data */ chaininfo 190 net/bridge/netfilter/ebtables.c struct ebt_entries *chaininfo; chaininfo 206 net/bridge/netfilter/ebtables.c chaininfo = private->hook_entry[hook]; chaininfo 258 net/bridge/netfilter/ebtables.c chaininfo = cs[sp].chaininfo; chaininfo 259 net/bridge/netfilter/ebtables.c nentries = chaininfo->nentries; chaininfo 262 net/bridge/netfilter/ebtables.c chaininfo->counter_offset; chaininfo 275 net/bridge/netfilter/ebtables.c cs[sp].chaininfo = chaininfo; chaininfo 278 net/bridge/netfilter/ebtables.c chaininfo = (struct ebt_entries *) (base + verdict); chaininfo 280 net/bridge/netfilter/ebtables.c if (WARN(chaininfo->distinguisher, "jump to non-chain\n")) { chaininfo 285 net/bridge/netfilter/ebtables.c nentries = chaininfo->nentries; chaininfo 286 net/bridge/netfilter/ebtables.c point = (struct ebt_entry *)chaininfo->data; chaininfo 287 net/bridge/netfilter/ebtables.c counter_base = cb_base + chaininfo->counter_offset; chaininfo 296 net/bridge/netfilter/ebtables.c if (chaininfo->policy == EBT_RETURN) chaininfo 298 net/bridge/netfilter/ebtables.c if (chaininfo->policy == EBT_ACCEPT) { chaininfo 571 net/bridge/netfilter/ebtables.c udc[*n].cs.chaininfo = (struct ebt_entries *)e; chaininfo 684 net/bridge/netfilter/ebtables.c if ((char *)(cl_s[i].cs.chaininfo) > (char *)e) chaininfo 775 net/bridge/netfilter/ebtables.c cl_s[cl_s[chain_nr].from].cs.chaininfo->nentries; chaininfo 797 net/bridge/netfilter/ebtables.c if (hlp2 == cl_s[i].cs.chaininfo)