Your message dated Tue, 24 Aug 2021 21:37:59 +0000
with message-id <[email protected]>
and subject line Bug#972455: fixed in iptables-netflow 2.6-1
has caused the Debian Bug report #972455,
regarding gen_compat_def can fail on filesystems w/o microsecond resolution
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
972455: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972455
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: iptables-netflow-dkms
Version: 2.5.1-1
Severity: grave

Hi!

It seems adfc6318 was not enough to be compatible with Linux 5.9, as
compilation breaks for me with the following log:

-------8<------------------

DKMS make.log for ipt-netflow-2.5.1 for kernel 5.9.0-1-amd64 (x86_64)
Sun 18 Oct 2020 08:10:48 PM CEST
./gen_compat_def > compat_def.h
Test symbol xt_family linux/netfilter_ipv4/ip_tables.h
Test struct timeval linux/ktime.h
Test struct proc_ops linux/proc_fs.h
Test symbol synchronize_sched linux/rcupdate.h
Compiling for kernel 5.9.1
make -C /lib/modules/5.9.0-1-amd64/build 
M=/var/lib/dkms/ipt-netflow/2.5.1/build modules CONFIG_DEBUG_INFO=y
make[1]: warning: jobserver unavailable: using -j1.  Add '+' to parent make 
rule.
make[1]: Entering directory '/usr/src/linux-headers-5.9.0-1-amd64'
  CC [M]  /var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.o
In file included from /var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:76:
/var/lib/dkms/ipt-netflow/2.5.1/build/compat.h:709:43: warning: ‘struct 
timeval’ declared inside parameter list will not be visible outside of this 
definition or declaration
  709 | static inline void do_gettimeofday(struct timeval *tv)
      |                                           ^~~~~~~
/var/lib/dkms/ipt-netflow/2.5.1/build/compat.h: In function ‘do_gettimeofday’:
/var/lib/dkms/ipt-netflow/2.5.1/build/compat.h:713:4: error: invalid use of 
undefined type ‘struct timeval’
  713 |  tv->tv_sec = ts64.tv_sec;
      |    ^~
/var/lib/dkms/ipt-netflow/2.5.1/build/compat.h:714:4: error: invalid use of 
undefined type ‘struct timeval’
  714 |  tv->tv_usec = ts64.tv_nsec/1000;
      |    ^~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c: In function ‘nf_seq_show’:
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:755:39: warning: format 
‘%lu’ expects argument of type ‘long unsigned int’, but argument 3 has type 
‘s64’ {aka ‘long long int’} [-Wformat=]
  755 |    seq_printf(seq, " Flows selected %lu, discarded %lu.",
      |                                     ~~^
      |                                       |
      |                                       long unsigned int
      |                                     %llu
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:755:54: warning: format 
‘%lu’ expects argument of type ‘long unsigned int’, but argument 4 has type 
‘s64’ {aka ‘long long int’} [-Wformat=]
  755 |    seq_printf(seq, " Flows selected %lu, discarded %lu.",
      |                                                    ~~^
      |                                                      |
      |                                                      long unsigned int
      |                                                    %llu
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:759:39: warning: format 
‘%lu’ expects argument of type ‘long unsigned int’, but argument 3 has type 
‘s64’ {aka ‘long long int’} [-Wformat=]
  759 |    seq_printf(seq, " Flows selected %lu.", 
atomic64_read(&flows_selected));
      |                                     ~~^
      |                                       |
      |                                       long unsigned int
      |                                     %llu
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c: In function 
‘netflow_export_pdu_v5’:
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:2652:17: error: storage 
size of ‘tv’ isn’t known
 2652 |  struct timeval tv;
      |                 ^~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:2652:17: warning: unused 
variable ‘tv’ [-Wunused-variable]
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c: In function 
‘netflow_export_pdu_v9’:
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:2736:17: error: storage 
size of ‘tv’ isn’t known
 2736 |  struct timeval tv;
      |                 ^~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:2736:17: warning: unused 
variable ‘tv’ [-Wunused-variable]
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c: In function 
‘netflow_export_pdu_ipfix’:
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:2770:17: error: storage 
size of ‘tv’ isn’t known
 2770 |  struct timeval tv;
      |                 ^~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:2770:17: warning: unused 
variable ‘tv’ [-Wunused-variable]
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c: In function 
‘timeout_rate_j’:
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:10: error: variable 
‘tv’ has initializer but incomplete type
 3677 |   struct timeval tv = { .tv_sec = timeout_rate * 60, .tv_usec = 0 };
      |          ^~~~~~~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:26: error: ‘struct 
timeval’ has no member named ‘tv_sec’
 3677 |   struct timeval tv = { .tv_sec = timeout_rate * 60, .tv_usec = 0 };
      |                          ^~~~~~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:35: warning: excess 
elements in struct initializer
 3677 |   struct timeval tv = { .tv_sec = timeout_rate * 60, .tv_usec = 0 };
      |                                   ^~~~~~~~~~~~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:35: note: (near 
initialization for ‘tv’)
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:55: error: ‘struct 
timeval’ has no member named ‘tv_usec’
 3677 |   struct timeval tv = { .tv_sec = timeout_rate * 60, .tv_usec = 0 };
      |                                                       ^~~~~~~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:65: warning: excess 
elements in struct initializer
 3677 |   struct timeval tv = { .tv_sec = timeout_rate * 60, .tv_usec = 0 };
      |                                                                 ^
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:65: note: (near 
initialization for ‘tv’)
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:18: error: storage 
size of ‘tv’ isn’t known
 3677 |   struct timeval tv = { .tv_sec = timeout_rate * 60, .tv_usec = 0 };
      |                  ^~
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3680:14: error: implicit 
declaration of function ‘timeval_to_jiffies’; did you mean ‘nsecs_to_jiffies’? 
[-Werror=implicit-function-declaration]
 3680 |   t_rate_j = timeval_to_jiffies(&tv);
      |              ^~~~~~~~~~~~~~~~~~
      |              nsecs_to_jiffies
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.c:3677:18: warning: unused 
variable ‘tv’ [-Wunused-variable]
 3677 |   struct timeval tv = { .tv_sec = timeout_rate * 60, .tv_usec = 0 };
      |                  ^~
cc1: some warnings being treated as errors
make[3]: *** [/usr/src/linux-headers-5.9.0-1-common/scripts/Makefile.build:288: 
/var/lib/dkms/ipt-netflow/2.5.1/build/ipt_NETFLOW.o] Error 1
make[2]: *** [/usr/src/linux-headers-5.9.0-1-common/Makefile:1796: 
/var/lib/dkms/ipt-netflow/2.5.1/build] Error 2
make[1]: *** [/usr/src/linux-headers-5.9.0-1-common/Makefile:185: __sub-make] 
Error 2
make[1]: Leaving directory '/usr/src/linux-headers-5.9.0-1-amd64'
make: *** [Makefile:25: ipt_NETFLOW.ko] Error 2
-------8<------------------

Grüße,
Sven.

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 
'unstable'), (500, 'testing'), (200, 'experimental'), (1, 'experimental-debug')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-3-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages iptables-netflow-dkms depends on:
ii  dkms            2.8.3-4
ii  libc6           2.31-4
ii  libc6-dev       2.31-4
ii  libxtables-dev  1.8.5-3
ii  pkg-config      0.29.2-1

Versions of packages iptables-netflow-dkms recommends:
ii  iptables  1.8.5-3

Versions of packages iptables-netflow-dkms suggests:
ii  irqtop  2.5.1-1
pn  nfdump  <none>

-- debconf-show failed

--- End Message ---
--- Begin Message ---
Source: iptables-netflow
Source-Version: 2.6-1
Done: Axel Beckert <[email protected]>

We believe that the bug you reported is fixed in the latest version of
iptables-netflow, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Axel Beckert <[email protected]> (supplier of updated iptables-netflow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 24 Aug 2021 23:02:21 +0200
Source: iptables-netflow
Architecture: source
Version: 2.6-1
Distribution: unstable
Urgency: medium
Maintainer: Axel Beckert <[email protected]>
Changed-By: Axel Beckert <[email protected]>
Closes: 972455
Changes:
 iptables-netflow (2.6-1) unstable; urgency=medium
 .
   * New upstream release 2.6.
     - Drop add-quoting-needed-by-dh_dkms.patch, applied upstream.
     - Drop cherry-picked patch (upstream commit adfc6318).
     - Refresh remaining patches as needed.
     - Fixes race condition during gen_compat_def on filesystems w/o
       microsecond resolution. (Closes: #972455)
   * Declare compliance with Debian Policy 4.6.0. (No changes needed.)
   * Bump debhelper-compat to 13.
Checksums-Sha1:
 6962371338db09300d5cfabac95bd518b58dc4cf 2004 iptables-netflow_2.6-1.dsc
 b43e1af4bdecc251bc23ef3cbece0351fc39c4de 95752 iptables-netflow_2.6.orig.tar.gz
 52d5b2c9418001e57397223c71642612c2c888c6 8432 
iptables-netflow_2.6-1.debian.tar.xz
 56921de52c057360405d958bc29e3c0a614f0824 6965 
iptables-netflow_2.6-1_source.buildinfo
Checksums-Sha256:
 87d53779f57c651544d7ec70c062c110cabf2172b1f36676f4c8d1026106db6c 2004 
iptables-netflow_2.6-1.dsc
 1ae270ddd0e60449159607c2f413604e31cb446beae516777dfeeee5f9b4931d 95752 
iptables-netflow_2.6.orig.tar.gz
 410f2f77fe43fd5d4b890f2c55fbff4f5c4e624191c305a021aff44e9a45de14 8432 
iptables-netflow_2.6-1.debian.tar.xz
 2912309cfd108e442628a5d02c89123709aece8b961d160b10ec22569e282f80 6965 
iptables-netflow_2.6-1_source.buildinfo
Files:
 93a9e2d58094dde95a246c654fa24b6c 2004 kernel optional 
iptables-netflow_2.6-1.dsc
 810fdcf4b551e447f1ceed43273d9832 95752 kernel optional 
iptables-netflow_2.6.orig.tar.gz
 41722b46e90a892dfe389f6ed2c5d6cc 8432 kernel optional 
iptables-netflow_2.6-1.debian.tar.xz
 d838fca1bed14184724b1b058523de5b 6965 kernel optional 
iptables-netflow_2.6-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=LsqN
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to