cl_s 645 net/bridge/netfilter/ebtables.c struct ebt_cl_stack *cl_s, unsigned int udc_cnt) cl_s 684 net/bridge/netfilter/ebtables.c if ((char *)(cl_s[i].cs.chaininfo) > (char *)e) cl_s 689 net/bridge/netfilter/ebtables.c hookmask = cl_s[i - 1].hookmask; cl_s 761 net/bridge/netfilter/ebtables.c static int check_chainloops(const struct ebt_entries *chain, struct ebt_cl_stack *cl_s, cl_s 772 net/bridge/netfilter/ebtables.c e = cl_s[chain_nr].cs.e; cl_s 773 net/bridge/netfilter/ebtables.c if (cl_s[chain_nr].from != -1) cl_s 775 net/bridge/netfilter/ebtables.c cl_s[cl_s[chain_nr].from].cs.chaininfo->nentries; cl_s 778 net/bridge/netfilter/ebtables.c pos = cl_s[chain_nr].cs.n; cl_s 780 net/bridge/netfilter/ebtables.c cl_s[chain_nr].cs.n = 0; cl_s 781 net/bridge/netfilter/ebtables.c chain_nr = cl_s[chain_nr].from; cl_s 797 net/bridge/netfilter/ebtables.c if (hlp2 == cl_s[i].cs.chaininfo) cl_s 803 net/bridge/netfilter/ebtables.c if (cl_s[i].cs.n) cl_s 806 net/bridge/netfilter/ebtables.c if (cl_s[i].hookmask & (1 << hooknr)) cl_s 809 net/bridge/netfilter/ebtables.c cl_s[i].cs.n = pos + 1; cl_s 811 net/bridge/netfilter/ebtables.c cl_s[i].cs.e = ebt_next_entry(e); cl_s 814 net/bridge/netfilter/ebtables.c cl_s[i].from = chain_nr; cl_s 817 net/bridge/netfilter/ebtables.c cl_s[i].hookmask |= (1 << hooknr); cl_s 833 net/bridge/netfilter/ebtables.c struct ebt_cl_stack *cl_s = NULL; /* used in the checking for chain loops */ cl_s 900 net/bridge/netfilter/ebtables.c cl_s = vmalloc(array_size(udc_cnt, sizeof(*cl_s))); cl_s 901 net/bridge/netfilter/ebtables.c if (!cl_s) cl_s 905 net/bridge/netfilter/ebtables.c ebt_get_udc_positions, newinfo, &i, cl_s); cl_s 908 net/bridge/netfilter/ebtables.c vfree(cl_s); cl_s 917 net/bridge/netfilter/ebtables.c cl_s, udc_cnt, i, newinfo->entries)) { cl_s 918 net/bridge/netfilter/ebtables.c vfree(cl_s); cl_s 936 net/bridge/netfilter/ebtables.c ebt_check_entry, net, newinfo, name, &i, cl_s, udc_cnt); cl_s 941 net/bridge/netfilter/ebtables.c vfree(cl_s);