Your message dated Wed, 10 May 2023 23:20:30 +0000
with message-id <e1pwt6k-007h9e...@fasolo.debian.org>
and subject line Bug#1035511: fixed in iptables-netflow 2.6-4
has caused the Debian Bug report #1035511,
regarding iptables-netflow-dkms: fails to upgrade from bullseye: fails to build 
a module for the bullseye kernel
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1035511: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035511
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: iptables-netflow-dkms
Version: 2.6-3.1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'bullseye'.
It installed fine in 'bullseye' (with linux-headers-amd64 installed),
then the upgrade to 'bullseye' fails.

>From the attached log (scroll to the bottom...):

  Setting up iptables-netflow-dkms (2.6-3.1) ...
  Loading new ipt-netflow-2.6 DKMS files...
  It is likely that 5.10.28 belongs to a chroot's host
  Building for 5.10.0-22-amd64 and 6.1.0-7-amd64
  Building initial module for 5.10.0-22-amd64
  Error! Bad return status for module build on kernel: 5.10.0-22-amd64 (x86_64)
  Consult /var/lib/dkms/ipt-netflow/2.6/build/make.log for more information.
  dpkg: error processing package iptables-netflow-dkms (--configure):
   installed iptables-netflow-dkms package post-installation script subprocess 
returned error exit status 10

As during the upgrade phase it is very likely that both the old and new
kernel and their headers are installed, the dkms module should be able
to build for both kernel versions (or use some BUILD_EXCLUSIVE_*
settings to exclude unsupported versions, this will be easier from
bookworm+1 onwards).

The dkms.log says:

DKMS make.log for ipt-netflow-2.6 for kernel 5.10.0-22-amd64 (x86_64)
Thu May  4 11:57:32 UTC 2023
./gen_compat_def > compat_def.h
Test symbol xt_family linux/netfilter_ipv4/ip_tables.h  declared
Test struct timeval linux/ktime.h  undeclared
Test struct proc_ops linux/proc_fs.h  declared
Test symbol synchronize_sched linux/rcupdate.h  undeclared
Test symbol nf_bridge_info_get linux/netfilter_bridge.h  declared
Test struct vlan_dev_priv linux/if_vlan.h  declared
Test member nf_ct_event_notifier.ct_event net/netfilter/nf_conntrack_ecache.h  
undeclared
Compiling 2.6 for kernel 5.10.178
make -C /lib/modules/5.10.0-22-amd64/build 
M=/var/lib/dkms/ipt-netflow/2.6/build modules
make[1]: warning: jobserver unavailable: using -j1.  Add '+' to parent make 
rule.
make[1]: Entering directory '/usr/src/linux-headers-5.10.0-22-amd64'
  CC [M]  /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:96:4: warning: #warning 
"Requested physdev is not compiled." [-Wcpp]
   96 | #  warning "Requested physdev is not compiled."
      |    ^~~~~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function 'nf_seq_show':
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:39: warning: format '%lu' 
expects argument of type 'long unsigned int', but argument 3 has type 's64' 
{aka 'long long int'} [-Wformat=]
  762 |    seq_printf(seq, " Flows selected %lu, discarded %lu.",
      |                                     ~~^
      |                                       |
      |                                       long unsigned int
      |                                     %llu
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:54: warning: format '%lu' 
expects argument of type 'long unsigned int', but argument 4 has type 's64' 
{aka 'long long int'} [-Wformat=]
  762 |    seq_printf(seq, " Flows selected %lu, discarded %lu.",
      |                                                    ~~^
      |                                                      |
      |                                                      long unsigned int
      |                                                    %llu
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:766:39: warning: format '%lu' 
expects argument of type 'long unsigned int', but argument 3 has type 's64' 
{aka 'long long int'} [-Wformat=]
  766 |    seq_printf(seq, " Flows selected %lu.", 
atomic64_read(&flows_selected));
      |                                     ~~^
      |                                       |
      |                                       long unsigned int
      |                                     %llu
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function 
'netflow_conntrack_event':
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4622:36: warning: passing 
argument 2 of 'notifier->fcn' discards 'const' qualifier from pointer target 
type [-Wdiscarded-qualifiers]
 4622 |   ret = notifier->ct_event(events, item);
      |                                    ^~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4622:36: note: expected 
'struct nf_ct_event *' but argument is of type 'const struct nf_ct_event *'
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: At top level:
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4687:14: error: 
initialization of 'int (*)(unsigned int,  struct nf_ct_event *)' from 
incompatible pointer type 'int (*)(const unsigned int,  const struct 
nf_ct_event *)' [-Werror=incompatible-pointer-types]
 4687 |  .ct_event = netflow_conntrack_event
      |              ^~~~~~~~~~~~~~~~~~~~~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4687:14: note: (near 
initialization for 'ctnl_notifier.fcn')
cc1: some warnings being treated as errors
make[3]: *** 
[/usr/src/linux-headers-5.10.0-22-common/scripts/Makefile.build:291: 
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o] Error 1
make[2]: *** [/usr/src/linux-headers-5.10.0-22-common/Makefile:1852: 
/var/lib/dkms/ipt-netflow/2.6/build] Error 2
make[1]: *** [/usr/src/linux-headers-5.10.0-22-common/Makefile:192: __sub-make] 
Error 2
make[1]: Leaving directory '/usr/src/linux-headers-5.10.0-22-amd64'
make: *** [Makefile:27: ipt_NETFLOW.ko] Error 2


cheers,

Andreas

Attachment: iptables-netflow-dkms_2.6-3.1.log.gz
Description: application/gzip


--- End Message ---
--- Begin Message ---
Source: iptables-netflow
Source-Version: 2.6-4
Done: Axel Beckert <a...@debian.org>

We believe that the bug you reported is fixed in the latest version of
iptables-netflow, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1035...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Axel Beckert <a...@debian.org> (supplier of updated iptables-netflow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 10 May 2023 18:22:39 +0200
Source: iptables-netflow
Architecture: source
Version: 2.6-4
Distribution: unstable
Urgency: medium
Maintainer: Axel Beckert <a...@debian.org>
Changed-By: Axel Beckert <a...@debian.org>
Closes: 1035511
Changes:
 iptables-netflow (2.6-4) unstable; urgency=medium
 .
   * Acknowledge NMU. Thanks Andreas!
   * Cherry-pick upstream commit 0901f028 "fix building on old kernels".
     (Closes: #1035511)
Checksums-Sha1:
 c50934b899cb9e6058f0174dd8a43b03f0cf6f1c 2051 iptables-netflow_2.6-4.dsc
 9a3c15b1563a36baab15b73beb19c9619dfc300c 11172 
iptables-netflow_2.6-4.debian.tar.xz
 7cea0e2ef83e215745246680f41f8fb0a8922c3f 6646 
iptables-netflow_2.6-4_source.buildinfo
Checksums-Sha256:
 33453e3315963de55a31ee09741ddf04fb8c01af92a399edd9c31df92fbdfa53 2051 
iptables-netflow_2.6-4.dsc
 d91e426904c78503836d479f0edb011bb553358c4c785ecd8bf33966b8a55de9 11172 
iptables-netflow_2.6-4.debian.tar.xz
 3747f909d04cd18c5055efe96f846e28f03d646934b31a0a864812e4d831d310 6646 
iptables-netflow_2.6-4_source.buildinfo
Files:
 1841ddd631c174cb4690472734058701 2051 kernel optional 
iptables-netflow_2.6-4.dsc
 e4e706399f0be3fa3fafe9bbb58f40e7 11172 kernel optional 
iptables-netflow_2.6-4.debian.tar.xz
 bb42820522b6d6eb049e3387c561050a 6646 kernel optional 
iptables-netflow_2.6-4_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=Nkdl
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to