fix: default linux vrf device mtu for latest linux kernels #1824
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Default mtu for vrf is set to 65536. The value was changed in recent linux kernels
to 65535 (ETH_MAX_MTU) + size of IPv6 header (40 octets) resulting in mtu 65575.
The latest kernel sets this value by default.
I don't know the exact kernel version where the change has taken place, but it was
somewhere between 5.11.0-27-generic to 5.11.0-37-generic (tested empirically).
More info here: https://www.spinics.net/lists/stable/msg476226.html
Without the patch, resync modifies MTU (from linux-default to agent-default) without
change in the data. The patch causes that both values are considered as default in case
the new MTU is undefined.
Added simple example to localclient-linux testing vrf device.
Signed-off-by: Vladimir Lavor vlavor@cisco.com