Yasuyuki, During the review, I noticed the inclusion of the load_iptables_ko function within the compatible_revision function. Removal of the inclusion results in no error messages, and testing of firewall doesn't seem to show adverse affects. This is the patch I created for testing: diff -Naur iptables-1.3.7.orig/ip6tables.c iptables-1.3.7/ip6tables.c --- iptables-1.3.7.orig/ip6tables.c 2007-02-15 14:04:54.000000000 -0500 +++ iptables-1.3.7/ip6tables.c 2007-02-15 14:06:32.000000000 -0500 @@ -1120,8 +1120,6 @@ strcpy(rev.name, name); rev.revision = revision; - load_ip6tables_ko(modprobe); - max_rev = getsockopt(sockfd, IPPROTO_IPV6, opt, &rev, &s); if (max_rev < 0) { /* Definitely don't support this? */ diff -Naur iptables-1.3.7.orig/iptables.c iptables-1.3.7/iptables.c --- iptables-1.3.7.orig/iptables.c 2007-02-15 14:04:54.000000000 -0500 +++ iptables-1.3.7/iptables.c 2007-02-15 14:06:09.000000000 -0500 @@ -1148,8 +1148,6 @@ exit(1); } - load_iptables_ko(modprobe); - strcpy(rev.name, name); rev.revision = revision; Best regards, Harvey