Your message dated Wed, 10 May 2023 23:20:30 +0000 with message-id <e1pwt6k-007h9e...@fasolo.debian.org> and subject line Bug#1035511: fixed in iptables-netflow 2.6-4 has caused the Debian Bug report #1035511, regarding iptables-netflow-dkms: fails to upgrade from bullseye: fails to build a module for the bullseye kernel to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1035511: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035511 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: iptables-netflow-dkms Version: 2.6-3.1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package fails to upgrade from 'bullseye'. It installed fine in 'bullseye' (with linux-headers-amd64 installed), then the upgrade to 'bullseye' fails. >From the attached log (scroll to the bottom...): Setting up iptables-netflow-dkms (2.6-3.1) ... Loading new ipt-netflow-2.6 DKMS files... It is likely that 5.10.28 belongs to a chroot's host Building for 5.10.0-22-amd64 and 6.1.0-7-amd64 Building initial module for 5.10.0-22-amd64 Error! Bad return status for module build on kernel: 5.10.0-22-amd64 (x86_64) Consult /var/lib/dkms/ipt-netflow/2.6/build/make.log for more information. dpkg: error processing package iptables-netflow-dkms (--configure): installed iptables-netflow-dkms package post-installation script subprocess returned error exit status 10 As during the upgrade phase it is very likely that both the old and new kernel and their headers are installed, the dkms module should be able to build for both kernel versions (or use some BUILD_EXCLUSIVE_* settings to exclude unsupported versions, this will be easier from bookworm+1 onwards). The dkms.log says: DKMS make.log for ipt-netflow-2.6 for kernel 5.10.0-22-amd64 (x86_64) Thu May 4 11:57:32 UTC 2023 ./gen_compat_def > compat_def.h Test symbol xt_family linux/netfilter_ipv4/ip_tables.h declared Test struct timeval linux/ktime.h undeclared Test struct proc_ops linux/proc_fs.h declared Test symbol synchronize_sched linux/rcupdate.h undeclared Test symbol nf_bridge_info_get linux/netfilter_bridge.h declared Test struct vlan_dev_priv linux/if_vlan.h declared Test member nf_ct_event_notifier.ct_event net/netfilter/nf_conntrack_ecache.h undeclared Compiling 2.6 for kernel 5.10.178 make -C /lib/modules/5.10.0-22-amd64/build M=/var/lib/dkms/ipt-netflow/2.6/build modules make[1]: warning: jobserver unavailable: using -j1. Add '+' to parent make rule. make[1]: Entering directory '/usr/src/linux-headers-5.10.0-22-amd64' CC [M] /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:96:4: warning: #warning "Requested physdev is not compiled." [-Wcpp] 96 | # warning "Requested physdev is not compiled." | ^~~~~~~ /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function 'nf_seq_show': /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:39: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 's64' {aka 'long long int'} [-Wformat=] 762 | seq_printf(seq, " Flows selected %lu, discarded %lu.", | ~~^ | | | long unsigned int | %llu /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:54: warning: format '%lu' expects argument of type 'long unsigned int', but argument 4 has type 's64' {aka 'long long int'} [-Wformat=] 762 | seq_printf(seq, " Flows selected %lu, discarded %lu.", | ~~^ | | | long unsigned int | %llu /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:766:39: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 's64' {aka 'long long int'} [-Wformat=] 766 | seq_printf(seq, " Flows selected %lu.", atomic64_read(&flows_selected)); | ~~^ | | | long unsigned int | %llu /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function 'netflow_conntrack_event': /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4622:36: warning: passing argument 2 of 'notifier->fcn' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 4622 | ret = notifier->ct_event(events, item); | ^~~~ /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4622:36: note: expected 'struct nf_ct_event *' but argument is of type 'const struct nf_ct_event *' /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: At top level: /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4687:14: error: initialization of 'int (*)(unsigned int, struct nf_ct_event *)' from incompatible pointer type 'int (*)(const unsigned int, const struct nf_ct_event *)' [-Werror=incompatible-pointer-types] 4687 | .ct_event = netflow_conntrack_event | ^~~~~~~~~~~~~~~~~~~~~~~ /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4687:14: note: (near initialization for 'ctnl_notifier.fcn') cc1: some warnings being treated as errors make[3]: *** [/usr/src/linux-headers-5.10.0-22-common/scripts/Makefile.build:291: /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o] Error 1 make[2]: *** [/usr/src/linux-headers-5.10.0-22-common/Makefile:1852: /var/lib/dkms/ipt-netflow/2.6/build] Error 2 make[1]: *** [/usr/src/linux-headers-5.10.0-22-common/Makefile:192: __sub-make] Error 2 make[1]: Leaving directory '/usr/src/linux-headers-5.10.0-22-amd64' make: *** [Makefile:27: ipt_NETFLOW.ko] Error 2 cheers, Andreas
iptables-netflow-dkms_2.6-3.1.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---Source: iptables-netflow Source-Version: 2.6-4 Done: Axel Beckert <a...@debian.org> We believe that the bug you reported is fixed in the latest version of iptables-netflow, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1035...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Axel Beckert <a...@debian.org> (supplier of updated iptables-netflow package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 10 May 2023 18:22:39 +0200 Source: iptables-netflow Architecture: source Version: 2.6-4 Distribution: unstable Urgency: medium Maintainer: Axel Beckert <a...@debian.org> Changed-By: Axel Beckert <a...@debian.org> Closes: 1035511 Changes: iptables-netflow (2.6-4) unstable; urgency=medium . * Acknowledge NMU. Thanks Andreas! * Cherry-pick upstream commit 0901f028 "fix building on old kernels". (Closes: #1035511) Checksums-Sha1: c50934b899cb9e6058f0174dd8a43b03f0cf6f1c 2051 iptables-netflow_2.6-4.dsc 9a3c15b1563a36baab15b73beb19c9619dfc300c 11172 iptables-netflow_2.6-4.debian.tar.xz 7cea0e2ef83e215745246680f41f8fb0a8922c3f 6646 iptables-netflow_2.6-4_source.buildinfo Checksums-Sha256: 33453e3315963de55a31ee09741ddf04fb8c01af92a399edd9c31df92fbdfa53 2051 iptables-netflow_2.6-4.dsc d91e426904c78503836d479f0edb011bb553358c4c785ecd8bf33966b8a55de9 11172 iptables-netflow_2.6-4.debian.tar.xz 3747f909d04cd18c5055efe96f846e28f03d646934b31a0a864812e4d831d310 6646 iptables-netflow_2.6-4_source.buildinfo Files: 1841ddd631c174cb4690472734058701 2051 kernel optional iptables-netflow_2.6-4.dsc e4e706399f0be3fa3fafe9bbb58f40e7 11172 kernel optional iptables-netflow_2.6-4.debian.tar.xz bb42820522b6d6eb049e3387c561050a 6646 kernel optional iptables-netflow_2.6-4_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEERoyJeTtCmBnp12Ema+Zjx1o1yXUFAmRbxgcACgkQa+Zjx1o1 yXUrvQ//ZbegrKbk+JKJj+RLaU9hPDS2aSlYkT5fWJ0+J1JBR3a5GotpQOSwRL2b yxwb87w1/JN5ee0YYXmCyZvm/bVEg+smn9gSmOfnWKIdv30oXYmjTxseN/OF52GJ cyiju0mMPLtdvGYYyCCj3BdRIA/5YOLytY94tWV3aB+/MViwKKUn2a6wKO+BVX7M kxjy5Dmm0k/QP5cqnaAMNmGcESEyTHUFwiPmLV8olHlOynGNBWojQY4MzaHoOHTf SW5jiO/slcXV53Johx7oREId6SfA2Lk/6J2ZkA5eETLA5O2lrhlCcNAPjkBfrCi7 IHvkzJtv56RkjbQDSI4hq4zQe3+X+Iw5XXSDNQwjlHt/t4VD/LIZaJ8LL2Te74qh VbbS19xcc7Tv4sQGxCDmDf3tirZ4xeFzi65+z+aT2FoZtquNCa2QyGeyrJWdt044 wCZsb8bxnGHRNOXBZVs5GopLOq1GN9QLz7Gj4k3k3gK6xulMBfqbJCK3gFNOPl7B xe+dqjWvGdsbcbR7KHCseybf8ffrdgrh+tcKmuVDFnI6JCl32i7XnEE1F667tjBT R4t4ArWFKQh9jBY1wRSNtFU6beIeQ45LBddYzBdqpcU98i8bUkyzeOpJ2az6bIwG 1kOAfnT+vESD9TY2n+lrQ5L5nd6j1j7pSEHtlirtz2SD21KglQ0= =Nkdl -----END PGP SIGNATURE-----
--- End Message ---