Your message dated Wed, 09 Aug 2006 01:15:02 +0300
with message-id <[EMAIL PROTECTED]>
and subject line 32-bit iptables on 64-bit kernels
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel-image-2.6.8-9-amd64-k8
Version: 2.6.8-8

Fresh installation of Sarge with all updates from today:

leeloo:~# iptables -L
iptables v1.2.11: can't initialize iptables table `filter': Module is wrong version
Perhaps iptables or your kernel needs to be upgraded.

leeloo:~# lsmod | grep ip
ip6_tables             19712  0
ip_conntrack           37020  0
iptable_filter          3392  0
ip_tables              18432  1 iptable_filter
ipv6                  264232  14

leeloo:~# cat /proc/version
Linux version 2.6.8-9-amd64-k8 ([EMAIL PROTECTED]) (gcc version 3.4.2 (Debian 3.4.2-2)) #1 Wed Dec 8 13:26:29 UTC 2004

||/ Name Version Description
+++-=================================-=================================-==================================================================================
ii iptables 1.2.11-8 Linux kernel 2.4+ iptables administration tools

leeloo:~# ifconfig
eth0      Link encap:Ethernet  HWaddr 00:11:2F:E1:77:9C
          inet addr:192.168.0.11  Bcast:192.168.0.255  Mask:255.255.255.0
          inet6 addr: fe80::211:2fff:fee1:779c/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:6971 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2495 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:1491126 (1.4 MiB)  TX bytes:316599 (309.1 KiB)
          Interrupt:177 Memory:f7c00000-0

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:132 errors:0 dropped:0 overruns:0 frame:0
          TX packets:132 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:10052 (9.8 KiB)  TX bytes:10052 (9.8 KiB)


--- End Message ---
--- Begin Message ---
This bug is fixed on the kernel side, on 2.6.17+.
Please see commit 2722971cbe831117686039d5c334f2c0f560be13 [1].

It is unlikely that this bug will be ever fixed on iptables' side and
even more unlikely that such a patch will be included in Debian,
especially considering that etch is going to release with 2.6.17 or
later. I'm not the maintainer though, so that's just a speculation.

Regards,
Faidon

1:
http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2722971cbe831117686039d5c334f2c0f560be13

--- End Message ---

Reply via email to