This bug was initially created as a copy of Bug #2226979 I am copying this bug because: the issue also exist in rhel8.6z 4.18.0-372.70.1.el8_6.x86_64 dpdk-21.11-2.el8_6.x86_64 Description of problem: Server create vfs ,and set vlan to vfs.set spoofchk off and trust on. bind vfs to testpmd, send ipv6 traffic from Client, There is no packets captured in testpmd Version-Release number of selected component (if applicable): 5.14.0-284.18.1.el9_2.x86_64 dpdk-22.11-4.el9.x86_64 5e:00.2 Ethernet controller: Broadcom Inc. and subsidiaries BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet (rev 11) 5e:00.3 Ethernet controller: Broadcom Inc. and subsidiaries BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet (rev 11) # ethtool -i ens2f2np2 driver: bnxt_en version: 5.14.0-284.18.1.el9_2.x86_64 firmware-version: 225.0.144.0/pkg 225.1.95.0 expansion-rom-version: bus-info: 0000:5e:00.2 supports-statistics: yes supports-test: yes supports-eeprom-access: yes supports-register-dump: yes supports-priv-flags: no How reproducible: always Steps to Reproduce: Server and Client is connected back to back Server side : 1. create 1 vf on each PF 5f:02.0 Ethernet controller: Broadcom Inc. and subsidiaries BCM5750X NetXtreme-E Ethernet Virtual Function (rev 11) 5f:03.0 Ethernet controller: Broadcom Inc. and subsidiaries BCM5750X NetXtreme-E Ethernet Virtual Function (rev 11) 2. set vlan ,spoofchk off , trust on on vfs #ip li set ens2f2np2 vf 0 spoofchk off #ip li set ens2f3np3 vf 0 spoofchk off #ip li set ens2f2np2 vf 0 trust on #ip li set ens2f3np3 vf 0 trust on #ip li set ens2f2np2 vf 0 vlan 2 #ip li set ens2f3np3 vf 0 vlan 2 #ip link 113: ens2f2np2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether 5c:6f:69:82:8f:62 brd ff:ff:ff:ff:ff:ff vf 0 link/ether c6:aa:3c:5e:68:dc brd ff:ff:ff:ff:ff:ff, vlan 2, spoof checking off, link-state auto, trust on altname enp94s0f2np2 114: ens2f3np3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether 5c:6f:69:82:8f:63 brd ff:ff:ff:ff:ff:ff vf 0 link/ether f6:4b:e7:c1:23:96 brd ff:ff:ff:ff:ff:ff, vlan 2, spoof checking off, link-state auto, trust on altname enp94s0f3np3 3.bind vf to vfio-pci, then start testpmd ,and set verbose 9 inside testpmd #driverctl set-override 0000:5f:02.0 vfio-pci #driverctl set-override 0000:5f:03.0 vfio-pci #dpdk-testpmd -a 0000:5f:02.0 -a 0000:5f:03.0 -- -i --auto-start testpmd> set verbose 9 Client side: send ipv6 traffic with scapy send_pkt_num = 10 size = 64 pkt = Ether()/Dot1Q(type=0x8100,vlan=2)/IPv6(src="3000::100",dst="3000::200") pkt.dst = Server_nic2_mac ## pf mac payload = max(0, size - len(pkt)) * 'x' pkt.add_payload(payload.encode()) log(pkt.show()) sendp(pkt,count=send_pkt_num,inter=1,iface='Client_nic1_name') Actual results: There is no packet captured in testpmd Expected results: There should be 10 packets in testpmd, And the Client nic2 should receive 10 packets Additional info: send ipv4 ,testpmd can receive beaker job: https://beaker.engineering.redhat.com/recipes/14411208#task164541163 dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-without-max-tx-rate-without-qos-IPV6-packets-check dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-with-max-tx-rate-without-qos-IPV6-packets-check dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-without-max-tx-rate-with-qos-IPV6-packets-check dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-with-max-tx-rate-with-qos-IPV6-packets-check