Your message dated Wed, 10 May 2023 23:20:30 +0000
with message-id <[email protected]>
and subject line Bug#1035511: fixed in iptables-netflow 2.6-4
has caused the Debian Bug report #1035511,
regarding iptables-netflow-dkms: fails to upgrade from bullseye: fails to build
a module for the bullseye kernel
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1035511: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035511
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: iptables-netflow-dkms
Version: 2.6-3.1
Severity: serious
User: [email protected]
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package fails to upgrade from
'bullseye'.
It installed fine in 'bullseye' (with linux-headers-amd64 installed),
then the upgrade to 'bullseye' fails.
>From the attached log (scroll to the bottom...):
Setting up iptables-netflow-dkms (2.6-3.1) ...
Loading new ipt-netflow-2.6 DKMS files...
It is likely that 5.10.28 belongs to a chroot's host
Building for 5.10.0-22-amd64 and 6.1.0-7-amd64
Building initial module for 5.10.0-22-amd64
Error! Bad return status for module build on kernel: 5.10.0-22-amd64 (x86_64)
Consult /var/lib/dkms/ipt-netflow/2.6/build/make.log for more information.
dpkg: error processing package iptables-netflow-dkms (--configure):
installed iptables-netflow-dkms package post-installation script subprocess
returned error exit status 10
As during the upgrade phase it is very likely that both the old and new
kernel and their headers are installed, the dkms module should be able
to build for both kernel versions (or use some BUILD_EXCLUSIVE_*
settings to exclude unsupported versions, this will be easier from
bookworm+1 onwards).
The dkms.log says:
DKMS make.log for ipt-netflow-2.6 for kernel 5.10.0-22-amd64 (x86_64)
Thu May 4 11:57:32 UTC 2023
./gen_compat_def > compat_def.h
Test symbol xt_family linux/netfilter_ipv4/ip_tables.h declared
Test struct timeval linux/ktime.h undeclared
Test struct proc_ops linux/proc_fs.h declared
Test symbol synchronize_sched linux/rcupdate.h undeclared
Test symbol nf_bridge_info_get linux/netfilter_bridge.h declared
Test struct vlan_dev_priv linux/if_vlan.h declared
Test member nf_ct_event_notifier.ct_event net/netfilter/nf_conntrack_ecache.h
undeclared
Compiling 2.6 for kernel 5.10.178
make -C /lib/modules/5.10.0-22-amd64/build
M=/var/lib/dkms/ipt-netflow/2.6/build modules
make[1]: warning: jobserver unavailable: using -j1. Add '+' to parent make
rule.
make[1]: Entering directory '/usr/src/linux-headers-5.10.0-22-amd64'
CC [M] /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:96:4: warning: #warning
"Requested physdev is not compiled." [-Wcpp]
96 | # warning "Requested physdev is not compiled."
| ^~~~~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function 'nf_seq_show':
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:39: warning: format '%lu'
expects argument of type 'long unsigned int', but argument 3 has type 's64'
{aka 'long long int'} [-Wformat=]
762 | seq_printf(seq, " Flows selected %lu, discarded %lu.",
| ~~^
| |
| long unsigned int
| %llu
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:54: warning: format '%lu'
expects argument of type 'long unsigned int', but argument 4 has type 's64'
{aka 'long long int'} [-Wformat=]
762 | seq_printf(seq, " Flows selected %lu, discarded %lu.",
| ~~^
| |
| long unsigned int
| %llu
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:766:39: warning: format '%lu'
expects argument of type 'long unsigned int', but argument 3 has type 's64'
{aka 'long long int'} [-Wformat=]
766 | seq_printf(seq, " Flows selected %lu.",
atomic64_read(&flows_selected));
| ~~^
| |
| long unsigned int
| %llu
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function
'netflow_conntrack_event':
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4622:36: warning: passing
argument 2 of 'notifier->fcn' discards 'const' qualifier from pointer target
type [-Wdiscarded-qualifiers]
4622 | ret = notifier->ct_event(events, item);
| ^~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4622:36: note: expected
'struct nf_ct_event *' but argument is of type 'const struct nf_ct_event *'
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: At top level:
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4687:14: error:
initialization of 'int (*)(unsigned int, struct nf_ct_event *)' from
incompatible pointer type 'int (*)(const unsigned int, const struct
nf_ct_event *)' [-Werror=incompatible-pointer-types]
4687 | .ct_event = netflow_conntrack_event
| ^~~~~~~~~~~~~~~~~~~~~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4687:14: note: (near
initialization for 'ctnl_notifier.fcn')
cc1: some warnings being treated as errors
make[3]: ***
[/usr/src/linux-headers-5.10.0-22-common/scripts/Makefile.build:291:
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o] Error 1
make[2]: *** [/usr/src/linux-headers-5.10.0-22-common/Makefile:1852:
/var/lib/dkms/ipt-netflow/2.6/build] Error 2
make[1]: *** [/usr/src/linux-headers-5.10.0-22-common/Makefile:192: __sub-make]
Error 2
make[1]: Leaving directory '/usr/src/linux-headers-5.10.0-22-amd64'
make: *** [Makefile:27: ipt_NETFLOW.ko] Error 2
cheers,
Andreas
iptables-netflow-dkms_2.6-3.1.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---
Source: iptables-netflow
Source-Version: 2.6-4
Done: Axel Beckert <[email protected]>
We believe that the bug you reported is fixed in the latest version of
iptables-netflow, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Axel Beckert <[email protected]> (supplier of updated iptables-netflow package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 10 May 2023 18:22:39 +0200
Source: iptables-netflow
Architecture: source
Version: 2.6-4
Distribution: unstable
Urgency: medium
Maintainer: Axel Beckert <[email protected]>
Changed-By: Axel Beckert <[email protected]>
Closes: 1035511
Changes:
iptables-netflow (2.6-4) unstable; urgency=medium
.
* Acknowledge NMU. Thanks Andreas!
* Cherry-pick upstream commit 0901f028 "fix building on old kernels".
(Closes: #1035511)
Checksums-Sha1:
c50934b899cb9e6058f0174dd8a43b03f0cf6f1c 2051 iptables-netflow_2.6-4.dsc
9a3c15b1563a36baab15b73beb19c9619dfc300c 11172
iptables-netflow_2.6-4.debian.tar.xz
7cea0e2ef83e215745246680f41f8fb0a8922c3f 6646
iptables-netflow_2.6-4_source.buildinfo
Checksums-Sha256:
33453e3315963de55a31ee09741ddf04fb8c01af92a399edd9c31df92fbdfa53 2051
iptables-netflow_2.6-4.dsc
d91e426904c78503836d479f0edb011bb553358c4c785ecd8bf33966b8a55de9 11172
iptables-netflow_2.6-4.debian.tar.xz
3747f909d04cd18c5055efe96f846e28f03d646934b31a0a864812e4d831d310 6646
iptables-netflow_2.6-4_source.buildinfo
Files:
1841ddd631c174cb4690472734058701 2051 kernel optional
iptables-netflow_2.6-4.dsc
e4e706399f0be3fa3fafe9bbb58f40e7 11172 kernel optional
iptables-netflow_2.6-4.debian.tar.xz
bb42820522b6d6eb049e3387c561050a 6646 kernel optional
iptables-netflow_2.6-4_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=Nkdl
-----END PGP SIGNATURE-----
--- End Message ---