This is a note to let you know that I've just added the patch titled netfilter: nftables: rename set element data activation/deactivation functions to the 5.10-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: netfilter-nftables-rename-set-element-data-activation-deactivation-functions.patch and it can be found in the queue-5.10 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From stable-owner@xxxxxxxxxxxxxxx Thu Jul 13 10:49:53 2023 From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> Date: Thu, 13 Jul 2023 10:48:56 +0200 Subject: netfilter: nftables: rename set element data activation/deactivation functions To: netfilter-devel@xxxxxxxxxxxxxxx Cc: gregkh@xxxxxxxxxxxxxxxxxxx, stable@xxxxxxxxxxxxxxx, sashal@xxxxxxxxxx Message-ID: <20230713084859.71541-9-pablo@xxxxxxxxxxxxx> From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> [ Upstream commit f8bb7889af58d8e74d2d61c76b1418230f1610fa ] Rename: - nft_set_elem_activate() to nft_set_elem_data_activate(). - nft_set_elem_deactivate() to nft_set_elem_data_deactivate(). To prepare for updates in the set element infrastructure to add support for the special catch-all element. Signed-off-by: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- net/netfilter/nf_tables_api.c | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) --- a/net/netfilter/nf_tables_api.c +++ b/net/netfilter/nf_tables_api.c @@ -5270,8 +5270,8 @@ void nft_set_elem_destroy(const struct n } EXPORT_SYMBOL_GPL(nft_set_elem_destroy); -/* Only called from commit path, nft_set_elem_deactivate() already deals with - * the refcounting from the preparation phase. +/* Only called from commit path, nft_setelem_data_deactivate() already deals + * with the refcounting from the preparation phase. */ static void nf_tables_set_elem_destroy(const struct nft_ctx *ctx, const struct nft_set *set, void *elem) @@ -5649,9 +5649,9 @@ void nft_data_hold(const struct nft_data } } -static void nft_set_elem_activate(const struct net *net, - const struct nft_set *set, - struct nft_set_elem *elem) +static void nft_setelem_data_activate(const struct net *net, + const struct nft_set *set, + struct nft_set_elem *elem) { const struct nft_set_ext *ext = nft_set_elem_ext(set, elem->priv); @@ -5661,9 +5661,9 @@ static void nft_set_elem_activate(const (*nft_set_ext_obj(ext))->use++; } -static void nft_set_elem_deactivate(const struct net *net, - const struct nft_set *set, - struct nft_set_elem *elem) +static void nft_setelem_data_deactivate(const struct net *net, + const struct nft_set *set, + struct nft_set_elem *elem) { const struct nft_set_ext *ext = nft_set_elem_ext(set, elem->priv); @@ -5740,7 +5740,7 @@ static int nft_del_setelem(struct nft_ct kfree(elem.priv); elem.priv = priv; - nft_set_elem_deactivate(ctx->net, set, &elem); + nft_setelem_data_deactivate(ctx->net, set, &elem); nft_trans_elem(trans) = elem; nft_trans_commit_list_add_tail(ctx->net, trans); @@ -5774,7 +5774,7 @@ static int nft_flush_set(const struct nf } set->ndeact++; - nft_set_elem_deactivate(ctx->net, set, elem); + nft_setelem_data_deactivate(ctx->net, set, elem); nft_trans_elem_set(trans) = set; nft_trans_elem(trans) = *elem; nft_trans_commit_list_add_tail(ctx->net, trans); @@ -8413,7 +8413,7 @@ static int __nf_tables_abort(struct net case NFT_MSG_DELSETELEM: te = (struct nft_trans_elem *)trans->data; - nft_set_elem_activate(net, te->set, &te->elem); + nft_setelem_data_activate(net, te->set, &te->elem); te->set->ops->activate(net, te->set, &te->elem); te->set->ndeact--; Patches currently in stable-queue which might be from stable-owner@xxxxxxxxxxxxxxx are queue-5.10/netfilter-nf_tables-fix-chain-binding-transaction-logic.patch queue-5.10/netfilter-nf_tables-drop-map-element-references-from-preparation-phase.patch queue-5.10/netfilter-nf_tables-fix-scheduling-while-atomic-splat.patch queue-5.10/netfilter-nf_tables-reject-unbound-anonymous-set-before-commit-phase.patch queue-5.10/netfilter-nf_tables-use-net_generic-infra-for-transaction-data.patch queue-5.10/netfilter-nftables-rename-set-element-data-activation-deactivation-functions.patch queue-5.10/netfilter-nf_tables-incorrect-error-path-handling-with-nft_msg_newrule.patch queue-5.10/netfilter-nf_tables-reject-unbound-chain-set-before-commit-phase.patch queue-5.10/netfilter-nf_tables-add-rescheduling-points-during-loop-detection-walks.patch queue-5.10/netfilter-nf_tables-add-nft_trans_prepare_error-to-deal-with-bound-set-chain.patch queue-5.10/netfilter-nf_tables-unbind-non-anonymous-set-if-rule-construction-fails.patch