This always evals to true, so all packets get dropped in the ebtables compat layer. ip(6)tables is fine. Reported-by: kernel test robot <lkp@xxxxxxxxx> Fixes: 6d6dbfe7fe1e6e1 ("netfilter: nf_tables: remove xt_action_param from nft_pktinfo") Signed-off-by: Florian Westphal <fw@xxxxxxxxx> --- Pablo, feel free to squash if you prefer that. net/netfilter/nft_compat.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/netfilter/nft_compat.c b/net/netfilter/nft_compat.c index 936e244f5aba..3144a9ad2f6a 100644 --- a/net/netfilter/nft_compat.c +++ b/net/netfilter/nft_compat.c @@ -110,7 +110,7 @@ static void nft_target_eval_bridge(const struct nft_expr *expr, ret = target->target(skb, &xt); - if (&xt.hotdrop) + if (xt.hotdrop) ret = NF_DROP; switch (ret) { -- 2.31.1