The evil overloads backported the 5-argument form, causing the version check to be meaningless. --- kernel/net/netfilter/ipset/ip_set_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: ipset-6.13/kernel/net/netfilter/ipset/ip_set_core.c =================================================================== --- ipset-6.13.orig/kernel/net/netfilter/ipset/ip_set_core.c +++ ipset-6.13/kernel/net/netfilter/ipset/ip_set_core.c @@ -1180,7 +1180,7 @@ ip_set_dump(struct sock *ctnl, struct sk if (unlikely(protocol_failed(attr))) return -IPSET_ERR_PROTOCOL; -#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 1, 0) +#if 0 return netlink_dump_start(ctnl, skb, nlh, ip_set_dump_start, ip_set_dump_done);