Your message dated Wed, 22 Sep 2021 23:33:46 +0000
with message-id <[email protected]>
and subject line Bug#994883: fixed in iptables-netflow 2.6-2
has caused the Debian Bug report #994883,
regarding iptables-netflow-dkms: Kernel module fails to build for 
linux-image-5.14.0-1-amd64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
994883: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994883
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: iptables-netflow-dkms
Version: 2.6-1
Severity: serious

DKMS make.log for ipt-netflow-2.6 for kernel 5.14.0-1-amd64 (x86_64)
Wed Sep 22 16:33:59 CEST 2021
./gen_compat_def > compat_def.h
Test symbol xt_family linux/netfilter_ipv4/ip_tables.h  declared
Test struct timeval linux/ktime.h  undeclared
Test struct proc_ops linux/proc_fs.h  declared
Test symbol synchronize_sched linux/rcupdate.h  undeclared
Test symbol nf_bridge_info_get linux/netfilter_bridge.h  declared
Test struct vlan_dev_priv linux/if_vlan.h  declared
Compiling 2.6 for kernel 5.14.6
make -C /lib/modules/5.14.0-1-amd64/build M=/var/lib/dkms/ipt-netflow/2.6/build 
modules
make[1]: warning: jobserver unavailable: using -j1.  Add '+' to parent make 
rule.
make[1]: Entering directory '/usr/src/linux-headers-5.14.0-1-amd64'
  CC [M]  /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:96:4: warning: #warning 
"Requested physdev is not compiled." [-Wcpp]
   96 | #  warning "Requested physdev is not compiled."
      |    ^~~~~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function ‘nf_seq_show’:
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:39: warning: format ‘%lu’ 
expects argument of type ‘long unsigned int’, but argument 3 has type ‘s64’ 
{aka ‘long long int’} [-Wformat=]
  762 |    seq_printf(seq, " Flows selected %lu, discarded %lu.",
      |                                     ~~^
      |                                       |
      |                                       long unsigned int
      |                                     %llu
  763 |        atomic64_read(&flows_selected),
      |        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
      |        |
      |        s64 {aka long long int}
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:762:54: warning: format ‘%lu’ 
expects argument of type ‘long unsigned int’, but argument 4 has type ‘s64’ 
{aka ‘long long int’} [-Wformat=]
  762 |    seq_printf(seq, " Flows selected %lu, discarded %lu.",
      |                                                    ~~^
      |                                                      |
      |                                                      long unsigned int
      |                                                    %llu
  763 |        atomic64_read(&flows_selected),
  764 |        atomic64_read(&flows_observed) - atomic64_read(&flows_selected));
      |        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      |                                       |
      |                                       s64 {aka long long int}
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:766:39: warning: format ‘%lu’ 
expects argument of type ‘long unsigned int’, but argument 3 has type ‘s64’ 
{aka ‘long long int’} [-Wformat=]
  766 |    seq_printf(seq, " Flows selected %lu.", 
atomic64_read(&flows_selected));
      |                                     ~~^    
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      |                                       |    |
      |                                       |    s64 {aka long long int}
      |                                       long unsigned int
      |                                     %llu
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: At top level:
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:1946:13: error: static 
declaration of ‘sk_error_report’ follows non-static declaration
 1946 | static void sk_error_report(struct sock *sk)
      |             ^~~~~~~~~~~~~~~
In file included from 
/usr/src/linux-headers-5.14.0-1-common/include/net/inet_sock.h:22,
                 from 
/usr/src/linux-headers-5.14.0-1-common/include/linux/udp.h:16,
                 from /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:33:
/usr/src/linux-headers-5.14.0-1-common/include/net/sock.h:2287:6: note: 
previous declaration of ‘sk_error_report’ was here
 2287 | void sk_error_report(struct sock *sk);
      |      ^~~~~~~~~~~~~~~
In file included from /var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:79:
/var/lib/dkms/ipt-netflow/2.6/build/murmur3.h: In function ‘murmur3’:
/var/lib/dkms/ipt-netflow/2.6/build/murmur3.h:35:14: warning: this statement 
may fall through [-Wimplicit-fallthrough=]
   35 |   case 3: k1 ^= tail[2] << 16; /* FALLTHROUGH */
      |           ~~~^~~~~~~~~~~~~~~~
/var/lib/dkms/ipt-netflow/2.6/build/murmur3.h:36:3: note: here
   36 |   case 2: k1 ^= tail[1] << 8;  /* FALLTHROUGH */
      |   ^~~~
/var/lib/dkms/ipt-netflow/2.6/build/murmur3.h:36:14: warning: this statement 
may fall through [-Wimplicit-fallthrough=]
   36 |   case 2: k1 ^= tail[1] << 8;  /* FALLTHROUGH */
      |           ~~~^~~~~~~~~~~~~~~
/var/lib/dkms/ipt-netflow/2.6/build/murmur3.h:37:3: note: here
   37 |   case 1: k1 ^= tail[0];
      |   ^~~~
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c: In function ‘parse_sampler’:
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:2228:7: warning: this 
statement may fall through [-Wimplicit-fallthrough=]
 2228 |   ret = -EINVAL;
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:2230:2: note: here
 2230 |  case '\0': /* empty */
      |  ^~~~
make[3]: *** 
[/usr/src/linux-headers-5.14.0-1-common/scripts/Makefile.build:276: 
/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.o] Error 1
make[2]: *** [/usr/src/linux-headers-5.14.0-1-common/Makefile:1882: 
/var/lib/dkms/ipt-netflow/2.6/build] Error 2
make[1]: *** [/usr/src/linux-headers-5.14.0-1-common/Makefile:232: __sub-make] 
Error 2
make[1]: Leaving directory '/usr/src/linux-headers-5.14.0-1-amd64'
make: *** [Makefile:27: ipt_NETFLOW.ko] Error 2

Might be an upstream issue. Will dig deeper later.

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (980, 'unstable-debug'), (600, 'testing'), 
(111, 'buildd-unstable'), (111, 'buildd-experimental'), (110, 'experimental'), 
(105, 'experimental-debug')
Architecture: amd64 (x86_64)

Kernel: Linux 5.13.0-trunk-amd64 (SMP w/2 CPU threads)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages iptables-netflow-dkms depends on:
ii  dkms            2.8.4-4
ii  libc6           2.32-4
ii  libc6-dev       2.32-4
ii  libxtables-dev  1.8.7-1
ii  pkg-config      0.29.2-1

Versions of packages iptables-netflow-dkms recommends:
ii  iptables  1.8.7-1

Versions of packages iptables-netflow-dkms suggests:
ii  irqtop  2.6-1
pn  nfdump  <none>

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: iptables-netflow
Source-Version: 2.6-2
Done: Axel Beckert <[email protected]>

We believe that the bug you reported is fixed in the latest version of
iptables-netflow, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Axel Beckert <[email protected]> (supplier of updated iptables-netflow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 23 Sep 2021 00:45:21 +0200
Source: iptables-netflow
Architecture: source
Version: 2.6-2
Distribution: unstable
Urgency: high
Maintainer: Axel Beckert <[email protected]>
Changed-By: Axel Beckert <[email protected]>
Closes: 994883
Changes:
 iptables-netflow (2.6-2) unstable; urgency=high
 .
   * Cherry-pick 66e43041 ("Namespace sk_error_report") from upstream to
     fix module build with kernel 5.14. (Closes: #994883)
   * Update lintian overrides to include line numbers.
Checksums-Sha1:
 9cec610d05b3aa9c3aafaca14366fe65f2ac6c9e 2004 iptables-netflow_2.6-2.dsc
 1309d04ed0496146d1c93b3654ea066a809c3dd9 9020 
iptables-netflow_2.6-2.debian.tar.xz
 d74def6ec7eab35fc1db59d5b5f7372ce08cbd27 6860 
iptables-netflow_2.6-2_source.buildinfo
Checksums-Sha256:
 b368abc783ccb6c3dd6d2b45cdd1a11d80eb9560c1a98feb4ae8000a6f325847 2004 
iptables-netflow_2.6-2.dsc
 2a92a2ca2ad661ad1a14cf2a302cbce8b3ff8c9f06d27c3013f4543ef0aca2af 9020 
iptables-netflow_2.6-2.debian.tar.xz
 d3c69c8cd34e22160f7f17ad8b3e8d0f45d9d6161269b893e90a92d4aa10f1a3 6860 
iptables-netflow_2.6-2_source.buildinfo
Files:
 394d9fb8c2ff74d7ab0c60306959d50b 2004 kernel optional 
iptables-netflow_2.6-2.dsc
 ec7e11adb381d1413e0f080c98282631 9020 kernel optional 
iptables-netflow_2.6-2.debian.tar.xz
 38e1f3f4460b722072398a4f8feffaed 6860 kernel optional 
iptables-netflow_2.6-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=JTLS
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to