[scapy]: Patch scapy 2.4.5 for sniffing on intfs #10644
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Signed-off-by: Lawrence Lee [email protected]
Why I did it
PR #10457 introduces a known scapy bug (secdev/scapy#3191). The bug is fixed upstream in scapy here (secdev/scapy#3240) but is not available in a release yet. This bug causes the
tunnel_packet_handler
to fail silently, causing the testdualtor/test_tunnel_memory_leak.py
to fail.How I did it
Add a patch for the bug fix into the existing series of patches applied to scapy.
How to verify it
Run
dualtor/test_tunnel_memory_leak.py
and ensure it passesWhich release branch to backport (provide reason below if selected)
Description for the changelog
Link to config_db schema for YANG module changes
A picture of a cute animal (not mandatory but encouraged)