2018-01-05 15:02:55

by Marco Franchi

[permalink] [raw]
Subject: WARNING: CPU: 0 PID: 0 at ./include/linux/netfilter.h:233 arp_rcv

Hi,

I am getting the following warning on a imx6ul-evk board running
linux-next 20180105:

[ 9.233290] ------------[ cut here ]------------
[ 9.242068] WARNING: CPU: 0 PID: 0 at
./include/linux/netfilter.h:233 arp_rcv+0x1f8/0x228
[ 9.250381] Modules linked in:
[ 9.253633] CPU: 0 PID: 0 Comm: swapper/0 Not tainted
4.15.0-rc6-next-20180104-dirty #2
[ 9.261764] Hardware name: Freescale i.MX6 Ultralite (Device Tree)
[ 9.268065] Backtrace:
[ 9.270719] [<c010d188>] (dump_backtrace) from [<c010d448>]
(show_stack+0x18/0x1c)
[ 9.278438] r7:00000000 r6:60000153 r5:00000000 r4:c1079878
[ 9.284258] [<c010d430>] (show_stack) from [<c0a32468>]
(dump_stack+0xb4/0xe8)
[ 9.291641] [<c0a323b4>] (dump_stack) from [<c01260ac>] (__warn+0xf0/0x11c)
[ 9.298763] r9:d8053000 r8:000000e9 r7:00000009 r6:c0da3bdc
r5:00000000 r4:00000000
[ 9.306662] [<c0125fbc>] (__warn) from [<c01261f0>]
(warn_slowpath_null+0x44/0x50)
[ 9.314383] r8:d8053000 r7:00000608 r6:c08873f8 r5:000000e9 r4:c0da3bdc
[ 9.321243] [<c01261ac>] (warn_slowpath_null) from [<c08873f8>]
(arp_rcv+0x1f8/0x228)
[ 9.329215] r6:c0887200 r5:c107ac58 r4:d899b240
[ 9.333999] [<c0887200>] (arp_rcv) from [<c07fe680>]
(__netif_receive_skb_core+0x878/0xbd4)
[ 9.342491] r6:c0887200 r5:c100ac8c r4:d899b240
[ 9.347265] [<c07fde08>] (__netif_receive_skb_core) from
[<c0800fe0>] (__netif_receive_skb+0x2c/0x8c)
[ 9.356643] r10:00000080 r9:d8053000 r8:e0a26000 r7:c107ab0d
r6:c1008908 r5:d899b240
[ 9.364598] r4:c10099c4
[ 9.367288] [<c0800fb4>] (__netif_receive_skb) from [<c0804c00>]
(netif_receive_skb_internal+0x7c/0x354)
[ 9.376904] r5:d899b240 r4:c10099c4
[ 9.380635] [<c0804b84>] (netif_receive_skb_internal) from
[<c0805d5c>] (napi_gro_receive+0x88/0xa4)
[ 9.389918] r8:e0a26000 r7:00000001 r6:d899b240 r5:d899b240 r4:00000003
[ 9.396784] [<c0805cd4>] (napi_gro_receive) from [<c064609c>]
(fec_enet_rx_napi+0x3a8/0x9b8)
[ 9.405357] r5:d8054000 r4:00000000
[ 9.409093] [<c0645cf4>] (fec_enet_rx_napi) from [<c080552c>]
(net_rx_action+0x220/0x334)
[ 9.417431] r10:dbbdfa00 r9:c1001d94 r8:00000040 r7:0000012c
r6:ffff8e6b r5:00000001
[ 9.425384] r4:d8053710
[ 9.428075] [<c080530c>] (net_rx_action) from [<c01022d0>]
(__do_softirq+0x128/0x2a0)
[ 9.436063] r10:40000003 r9:c1003080 r8:00000100 r7:c100308c
r6:c1000000 r5:00000003
[ 9.444018] r4:00000000
[ 9.446708] [<c01021a8>] (__do_softirq) from [<c012c16c>]
(irq_exit+0x14c/0x1a8)
[ 9.454262] r10:e080a000 r9:d8004400 r8:00000001 r7:00000000
r6:c1008a98 r5:00000000
[ 9.462218] r4:ffffe000
[ 9.464911] [<c012c020>] (irq_exit) from [<c0180464>]
(__handle_domain_irq+0x74/0xe8)
[ 9.472879] r5:00000000 r4:c0f7cc24
[ 9.476614] [<c01803f0>] (__handle_domain_irq) from [<c0467ebc>]
(gic_handle_irq+0x64/0xc4)
[ 9.485121] r9:c1028344 r8:c1001e98 r7:00000000 r6:000003ff
r5:000003eb r4:e080a00c
[ 9.493016] [<c0467e58>] (gic_handle_irq) from [<c01019f0>]
(__irq_svc+0x70/0x98)
[ 9.500632] Exception stack(0xc1001e98 to 0xc1001ee0)
[ 9.505822] 1e80:
00000001 00000001
[ 9.514157] 1ea0: 00000000 c100bf80 25963796 00000002 00000002
dbbde5c8 26545294 00000002
[ 9.522491] 1ec0: 00000000 c1001f14 c1001eb8 c1001ee8 c01724fc
c0724464 20000153 ffffffff
[ 9.530824] r10:00000000 r9:c1000000 r8:26545294 r7:c1001ecc
r6:ffffffff r5:20000153
[ 9.538778] r4:c0724464
[ 9.541470] [<c07242f4>] (cpuidle_enter_state) from [<c0724630>]
(cpuidle_enter+0x1c/0x20)
[ 9.549893] r10:c100f6a8 r9:dbbde5c8 r8:c0f7c5c0 r7:c1008978
r6:00000001 r5:c100892c
[ 9.557857] r4:c1000000 r3:dbbde5c8
[ 9.561589] [<c0724614>] (cpuidle_enter) from [<c0169dd4>]
(call_cpuidle+0x28/0x44)
[ 9.569399] [<c0169dac>] (call_cpuidle) from [<c016a0bc>]
(do_idle+0x1bc/0x230)
[ 9.576861] [<c0169f00>] (do_idle) from [<c016a4e0>]
(cpu_startup_entry+0x20/0x24)
[ 9.584587] r10:c0f63a50 r9:c1008908 r8:c107b480 r7:c1008900
r6:c107b480 r5:00000002
[ 9.592546] r4:000000c4 r3:c0f75354
[ 9.596283] [<c016a4c0>] (cpu_startup_entry) from [<c0a47720>]
(rest_init+0x210/0x25c)
[ 9.604372] [<c0a47510>] (rest_init) from [<c0f00d60>]
(start_kernel+0x390/0x418)
[ 9.611998] r5:ffffffff r4:c107b4cc
[ 9.615723] [<c0f009d0>] (start_kernel) from [<00000000>] ( (null))
[ 9.622235] r10:10c5387d r9:410fc075 r8:83000000 r7:00000000
r6:10c0387d r5:00000051
[ 9.630191] r4:c0f0032c
[ 9.632851] ---[ end trace 2d5d5f79c0c8da59 ]---

Does anyone know how to fix it?

Thanks


2018-01-08 06:32:21

by Andy Duan

[permalink] [raw]
Subject: RE: WARNING: CPU: 0 PID: 0 at ./include/linux/netfilter.h:233 arp_rcv

From: Marco Franchi <[email protected]> Sent: Friday, January 05, 2018 11:03 PM
>Hi,
>
>I am getting the following warning on a imx6ul-evk board running linux-next
>20180105:
>
>[ 9.233290] ------------[ cut here ]------------
>[ 9.242068] WARNING: CPU: 0 PID: 0 at
>./include/linux/netfilter.h:233 arp_rcv+0x1f8/0x228
>[ 9.250381] Modules linked in:
>[ 9.253633] CPU: 0 PID: 0 Comm: swapper/0 Not tainted
>4.15.0-rc6-next-20180104-dirty #2
>[ 9.261764] Hardware name: Freescale i.MX6 Ultralite (Device Tree)
>[ 9.268065] Backtrace:
>[ 9.270719] [<c010d188>] (dump_backtrace) from [<c010d448>]
>(show_stack+0x18/0x1c)
>[ 9.278438] r7:00000000 r6:60000153 r5:00000000 r4:c1079878
>[ 9.284258] [<c010d430>] (show_stack) from [<c0a32468>]
>(dump_stack+0xb4/0xe8)
>[ 9.291641] [<c0a323b4>] (dump_stack) from [<c01260ac>]
>(__warn+0xf0/0x11c)
>[ 9.298763] r9:d8053000 r8:000000e9 r7:00000009 r6:c0da3bdc
>r5:00000000 r4:00000000
>[ 9.306662] [<c0125fbc>] (__warn) from [<c01261f0>]
>(warn_slowpath_null+0x44/0x50)
>[ 9.314383] r8:d8053000 r7:00000608 r6:c08873f8 r5:000000e9 r4:c0da3bdc
>[ 9.321243] [<c01261ac>] (warn_slowpath_null) from [<c08873f8>]
>(arp_rcv+0x1f8/0x228)
>[ 9.329215] r6:c0887200 r5:c107ac58 r4:d899b240
>[ 9.333999] [<c0887200>] (arp_rcv) from [<c07fe680>]
>(__netif_receive_skb_core+0x878/0xbd4)
>[ 9.342491] r6:c0887200 r5:c100ac8c r4:d899b240
>[ 9.347265] [<c07fde08>] (__netif_receive_skb_core) from
>[<c0800fe0>] (__netif_receive_skb+0x2c/0x8c)
>[ 9.356643] r10:00000080 r9:d8053000 r8:e0a26000 r7:c107ab0d
>r6:c1008908 r5:d899b240
>[ 9.364598] r4:c10099c4
>[ 9.367288] [<c0800fb4>] (__netif_receive_skb) from [<c0804c00>]
>(netif_receive_skb_internal+0x7c/0x354)
>[ 9.376904] r5:d899b240 r4:c10099c4
>[ 9.380635] [<c0804b84>] (netif_receive_skb_internal) from
>[<c0805d5c>] (napi_gro_receive+0x88/0xa4)
>[ 9.389918] r8:e0a26000 r7:00000001 r6:d899b240 r5:d899b240 r4:00000003
>[ 9.396784] [<c0805cd4>] (napi_gro_receive) from [<c064609c>]
>(fec_enet_rx_napi+0x3a8/0x9b8)
>[ 9.405357] r5:d8054000 r4:00000000
>[ 9.409093] [<c0645cf4>] (fec_enet_rx_napi) from [<c080552c>]
>(net_rx_action+0x220/0x334)
>[ 9.417431] r10:dbbdfa00 r9:c1001d94 r8:00000040 r7:0000012c
>r6:ffff8e6b r5:00000001
>[ 9.425384] r4:d8053710
>[ 9.428075] [<c080530c>] (net_rx_action) from [<c01022d0>]
>(__do_softirq+0x128/0x2a0)
>[ 9.436063] r10:40000003 r9:c1003080 r8:00000100 r7:c100308c
>r6:c1000000 r5:00000003
>[ 9.444018] r4:00000000
>[ 9.446708] [<c01021a8>] (__do_softirq) from [<c012c16c>]
>(irq_exit+0x14c/0x1a8)
>[ 9.454262] r10:e080a000 r9:d8004400 r8:00000001 r7:00000000
>r6:c1008a98 r5:00000000
>[ 9.462218] r4:ffffe000
>[ 9.464911] [<c012c020>] (irq_exit) from [<c0180464>]
>(__handle_domain_irq+0x74/0xe8)
>[ 9.472879] r5:00000000 r4:c0f7cc24
>[ 9.476614] [<c01803f0>] (__handle_domain_irq) from [<c0467ebc>]
>(gic_handle_irq+0x64/0xc4)
>[ 9.485121] r9:c1028344 r8:c1001e98 r7:00000000 r6:000003ff
>r5:000003eb r4:e080a00c
>[ 9.493016] [<c0467e58>] (gic_handle_irq) from [<c01019f0>]
>(__irq_svc+0x70/0x98)
>[ 9.500632] Exception stack(0xc1001e98 to 0xc1001ee0)
>[ 9.505822] 1e80:
> 00000001 00000001
>[ 9.514157] 1ea0: 00000000 c100bf80 25963796 00000002 00000002
>dbbde5c8 26545294 00000002
>[ 9.522491] 1ec0: 00000000 c1001f14 c1001eb8 c1001ee8 c01724fc
>c0724464 20000153 ffffffff
>[ 9.530824] r10:00000000 r9:c1000000 r8:26545294 r7:c1001ecc
>r6:ffffffff r5:20000153
>[ 9.538778] r4:c0724464
>[ 9.541470] [<c07242f4>] (cpuidle_enter_state) from [<c0724630>]
>(cpuidle_enter+0x1c/0x20)
>[ 9.549893] r10:c100f6a8 r9:dbbde5c8 r8:c0f7c5c0 r7:c1008978
>r6:00000001 r5:c100892c
>[ 9.557857] r4:c1000000 r3:dbbde5c8
>[ 9.561589] [<c0724614>] (cpuidle_enter) from [<c0169dd4>]
>(call_cpuidle+0x28/0x44)
>[ 9.569399] [<c0169dac>] (call_cpuidle) from [<c016a0bc>]
>(do_idle+0x1bc/0x230)
>[ 9.576861] [<c0169f00>] (do_idle) from [<c016a4e0>]
>(cpu_startup_entry+0x20/0x24)
>[ 9.584587] r10:c0f63a50 r9:c1008908 r8:c107b480 r7:c1008900
>r6:c107b480 r5:00000002
>[ 9.592546] r4:000000c4 r3:c0f75354
>[ 9.596283] [<c016a4c0>] (cpu_startup_entry) from [<c0a47720>]
>(rest_init+0x210/0x25c)
>[ 9.604372] [<c0a47510>] (rest_init) from [<c0f00d60>]
>(start_kernel+0x390/0x418)
>[ 9.611998] r5:ffffffff r4:c107b4cc
>[ 9.615723] [<c0f009d0>] (start_kernel) from [<00000000>] ( (null))
>[ 9.622235] r10:10c5387d r9:410fc075 r8:83000000 r7:00000000
>r6:10c0387d r5:00000051
>[ 9.630191] r4:c0f0032c
>[ 9.632851] ---[ end trace 2d5d5f79c0c8da59 ]---
>
>Does anyone know how to fix it?
>
>Thanks

If you enable kernel config "CONFIG_NETFILTER_FAMILY_ARP" can fix the warning.
It is introduced by below commit.

commit 8de98f058360722a1a9febe3970de6dcd4d91513
Author: Florian Westphal <[email protected]>
Date: Thu Dec 7 16:28:26 2017 +0100

netfilter: don't allocate space for arp/bridge hooks unless needed

no need to define hook points if the family isn't supported.
Because we need these hooks for either nftables, arp/ebtables
or the 'call-iptables' hack we have in the bridge layer add two
new dependencies, NETFILTER_FAMILY_{ARP,BRIDGE}, and have the
users select them.

Signed-off-by: Florian Westphal <[email protected]>
Signed-off-by: Pablo Neira Ayuso <[email protected]>

diff --git a/include/linux/netfilter.h b/include/linux/netfilter.h
index ce4e91df..0e46cb4 100644
--- a/include/linux/netfilter.h
+++ b/include/linux/netfilter.h
@@ -213,12 +213,16 @@ static inline int nf_hook(u_int8_t pf, unsigned int hook, struct net *net,
case NFPROTO_IPV6:
hook_head = rcu_dereference(net->nf.hooks_ipv6[hook]);
break;
+#ifdef CONFIG_NETFILTER_FAMILY_ARP
case NFPROTO_ARP:
hook_head = rcu_dereference(net->nf.hooks_arp[hook]);
break;
+#endif
+#ifdef CONFIG_NETFILTER_FAMILY_BRIDGE
case NFPROTO_BRIDGE:
hook_head = rcu_dereference(net->nf.hooks_bridge[hook]);
break;
+#endif
#if IS_ENABLED(CONFIG_DECNET)
case NFPROTO_DECNET:
hook_head = rcu_dereference(net->nf.hooks_decnet[hook]);

2018-01-08 11:14:40

by Marco Franchi

[permalink] [raw]
Subject: Re: WARNING: CPU: 0 PID: 0 at ./include/linux/netfilter.h:233 arp_rcv

2018-01-08 4:32 GMT-02:00 Andy Duan <[email protected]>:
> From: Marco Franchi <[email protected]> Sent: Friday, January 05, 2018 11:03 PM
>>Hi,
>>
>>I am getting the following warning on a imx6ul-evk board running linux-next
>>20180105:
>>
>>[ 9.233290] ------------[ cut here ]------------
>>[ 9.242068] WARNING: CPU: 0 PID: 0 at
>>./include/linux/netfilter.h:233 arp_rcv+0x1f8/0x228
>>[ 9.250381] Modules linked in:
>>[ 9.253633] CPU: 0 PID: 0 Comm: swapper/0 Not tainted
>>4.15.0-rc6-next-20180104-dirty #2
>>[ 9.261764] Hardware name: Freescale i.MX6 Ultralite (Device Tree)
>>[ 9.268065] Backtrace:
>>[ 9.270719] [<c010d188>] (dump_backtrace) from [<c010d448>]
>>(show_stack+0x18/0x1c)
>>[ 9.278438] r7:00000000 r6:60000153 r5:00000000 r4:c1079878
>>[ 9.284258] [<c010d430>] (show_stack) from [<c0a32468>]
>>(dump_stack+0xb4/0xe8)
>>[ 9.291641] [<c0a323b4>] (dump_stack) from [<c01260ac>]
>>(__warn+0xf0/0x11c)
>>[ 9.298763] r9:d8053000 r8:000000e9 r7:00000009 r6:c0da3bdc
>>r5:00000000 r4:00000000
>>[ 9.306662] [<c0125fbc>] (__warn) from [<c01261f0>]
>>(warn_slowpath_null+0x44/0x50)
>>[ 9.314383] r8:d8053000 r7:00000608 r6:c08873f8 r5:000000e9 r4:c0da3bdc
>>[ 9.321243] [<c01261ac>] (warn_slowpath_null) from [<c08873f8>]
>>(arp_rcv+0x1f8/0x228)
>>[ 9.329215] r6:c0887200 r5:c107ac58 r4:d899b240
>>[ 9.333999] [<c0887200>] (arp_rcv) from [<c07fe680>]
>>(__netif_receive_skb_core+0x878/0xbd4)
>>[ 9.342491] r6:c0887200 r5:c100ac8c r4:d899b240
>>[ 9.347265] [<c07fde08>] (__netif_receive_skb_core) from
>>[<c0800fe0>] (__netif_receive_skb+0x2c/0x8c)
>>[ 9.356643] r10:00000080 r9:d8053000 r8:e0a26000 r7:c107ab0d
>>r6:c1008908 r5:d899b240
>>[ 9.364598] r4:c10099c4
>>[ 9.367288] [<c0800fb4>] (__netif_receive_skb) from [<c0804c00>]
>>(netif_receive_skb_internal+0x7c/0x354)
>>[ 9.376904] r5:d899b240 r4:c10099c4
>>[ 9.380635] [<c0804b84>] (netif_receive_skb_internal) from
>>[<c0805d5c>] (napi_gro_receive+0x88/0xa4)
>>[ 9.389918] r8:e0a26000 r7:00000001 r6:d899b240 r5:d899b240 r4:00000003
>>[ 9.396784] [<c0805cd4>] (napi_gro_receive) from [<c064609c>]
>>(fec_enet_rx_napi+0x3a8/0x9b8)
>>[ 9.405357] r5:d8054000 r4:00000000
>>[ 9.409093] [<c0645cf4>] (fec_enet_rx_napi) from [<c080552c>]
>>(net_rx_action+0x220/0x334)
>>[ 9.417431] r10:dbbdfa00 r9:c1001d94 r8:00000040 r7:0000012c
>>r6:ffff8e6b r5:00000001
>>[ 9.425384] r4:d8053710
>>[ 9.428075] [<c080530c>] (net_rx_action) from [<c01022d0>]
>>(__do_softirq+0x128/0x2a0)
>>[ 9.436063] r10:40000003 r9:c1003080 r8:00000100 r7:c100308c
>>r6:c1000000 r5:00000003
>>[ 9.444018] r4:00000000
>>[ 9.446708] [<c01021a8>] (__do_softirq) from [<c012c16c>]
>>(irq_exit+0x14c/0x1a8)
>>[ 9.454262] r10:e080a000 r9:d8004400 r8:00000001 r7:00000000
>>r6:c1008a98 r5:00000000
>>[ 9.462218] r4:ffffe000
>>[ 9.464911] [<c012c020>] (irq_exit) from [<c0180464>]
>>(__handle_domain_irq+0x74/0xe8)
>>[ 9.472879] r5:00000000 r4:c0f7cc24
>>[ 9.476614] [<c01803f0>] (__handle_domain_irq) from [<c0467ebc>]
>>(gic_handle_irq+0x64/0xc4)
>>[ 9.485121] r9:c1028344 r8:c1001e98 r7:00000000 r6:000003ff
>>r5:000003eb r4:e080a00c
>>[ 9.493016] [<c0467e58>] (gic_handle_irq) from [<c01019f0>]
>>(__irq_svc+0x70/0x98)
>>[ 9.500632] Exception stack(0xc1001e98 to 0xc1001ee0)
>>[ 9.505822] 1e80:
>> 00000001 00000001
>>[ 9.514157] 1ea0: 00000000 c100bf80 25963796 00000002 00000002
>>dbbde5c8 26545294 00000002
>>[ 9.522491] 1ec0: 00000000 c1001f14 c1001eb8 c1001ee8 c01724fc
>>c0724464 20000153 ffffffff
>>[ 9.530824] r10:00000000 r9:c1000000 r8:26545294 r7:c1001ecc
>>r6:ffffffff r5:20000153
>>[ 9.538778] r4:c0724464
>>[ 9.541470] [<c07242f4>] (cpuidle_enter_state) from [<c0724630>]
>>(cpuidle_enter+0x1c/0x20)
>>[ 9.549893] r10:c100f6a8 r9:dbbde5c8 r8:c0f7c5c0 r7:c1008978
>>r6:00000001 r5:c100892c
>>[ 9.557857] r4:c1000000 r3:dbbde5c8
>>[ 9.561589] [<c0724614>] (cpuidle_enter) from [<c0169dd4>]
>>(call_cpuidle+0x28/0x44)
>>[ 9.569399] [<c0169dac>] (call_cpuidle) from [<c016a0bc>]
>>(do_idle+0x1bc/0x230)
>>[ 9.576861] [<c0169f00>] (do_idle) from [<c016a4e0>]
>>(cpu_startup_entry+0x20/0x24)
>>[ 9.584587] r10:c0f63a50 r9:c1008908 r8:c107b480 r7:c1008900
>>r6:c107b480 r5:00000002
>>[ 9.592546] r4:000000c4 r3:c0f75354
>>[ 9.596283] [<c016a4c0>] (cpu_startup_entry) from [<c0a47720>]
>>(rest_init+0x210/0x25c)
>>[ 9.604372] [<c0a47510>] (rest_init) from [<c0f00d60>]
>>(start_kernel+0x390/0x418)
>>[ 9.611998] r5:ffffffff r4:c107b4cc
>>[ 9.615723] [<c0f009d0>] (start_kernel) from [<00000000>] ( (null))
>>[ 9.622235] r10:10c5387d r9:410fc075 r8:83000000 r7:00000000
>>r6:10c0387d r5:00000051
>>[ 9.630191] r4:c0f0032c
>>[ 9.632851] ---[ end trace 2d5d5f79c0c8da59 ]---
>>
>>Does anyone know how to fix it?
>>
>>Thanks
>
> If you enable kernel config "CONFIG_NETFILTER_FAMILY_ARP" can fix the warning.
> It is introduced by below commit.
>
> commit 8de98f058360722a1a9febe3970de6dcd4d91513
> Author: Florian Westphal <[email protected]>
> Date: Thu Dec 7 16:28:26 2017 +0100
>
> netfilter: don't allocate space for arp/bridge hooks unless needed
>
> no need to define hook points if the family isn't supported.
> Because we need these hooks for either nftables, arp/ebtables
> or the 'call-iptables' hack we have in the bridge layer add two
> new dependencies, NETFILTER_FAMILY_{ARP,BRIDGE}, and have the
> users select them.
>
> Signed-off-by: Florian Westphal <[email protected]>
> Signed-off-by: Pablo Neira Ayuso <[email protected]>
>
> diff --git a/include/linux/netfilter.h b/include/linux/netfilter.h
> index ce4e91df..0e46cb4 100644
> --- a/include/linux/netfilter.h
> +++ b/include/linux/netfilter.h
> @@ -213,12 +213,16 @@ static inline int nf_hook(u_int8_t pf, unsigned int hook, struct net *net,
> case NFPROTO_IPV6:
> hook_head = rcu_dereference(net->nf.hooks_ipv6[hook]);
> break;
> +#ifdef CONFIG_NETFILTER_FAMILY_ARP
> case NFPROTO_ARP:
> hook_head = rcu_dereference(net->nf.hooks_arp[hook]);
> break;
> +#endif
> +#ifdef CONFIG_NETFILTER_FAMILY_BRIDGE
> case NFPROTO_BRIDGE:
> hook_head = rcu_dereference(net->nf.hooks_bridge[hook]);
> break;
> +#endif
> #if IS_ENABLED(CONFIG_DECNET)
> case NFPROTO_DECNET:
> hook_head = rcu_dereference(net->nf.hooks_decnet[hook]);

Hi Andy,

I applied the NETILTER_FAMILY_ARP as suggested and works.

Thank you