OXIESEC PANEL
- Current Dir:
/
/
lib
/
frr
Server IP: 2a02:4780:11:1084:0:327f:3464:10
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
02/08/2025 12:05:33 AM
r-xr-xr-x
📁
__pycache__
-
02/16/2024 09:04:14 PM
rwxr-xr-x
📄
babeld
208.32 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
bfdd
289.11 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
bgpd
2.97 MB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
eigrpd
274.86 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
fabricd
800.58 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
frr-reload
198 bytes
12/01/2023 04:22:16 PM
rwxr-xr-x
📄
frr-reload.py
84.74 KB
12/01/2023 04:30:43 PM
rwxr-xr-x
📄
frr_babeltrace.py
8.72 KB
12/01/2023 04:22:16 PM
rwxr-xr-x
📄
frrcommon.sh
8.63 KB
12/01/2023 04:27:29 PM
rwxr-xr-x
📄
frrinit.sh
3.46 KB
12/01/2023 04:27:29 PM
rwxr-xr-x
📄
generate_support_bundle.py
3.09 KB
12/01/2023 04:30:43 PM
rwxr-xr-x
📄
isisd
1.05 MB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
ldpd
346.42 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
nhrpd
232.91 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
ospf6d
1010.45 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
ospfclient.py
40.62 KB
12/01/2023 04:22:15 PM
rwxr-xr-x
📄
ospfd
1.6 MB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
pathd
185.3 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
pbrd
153.63 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
pim6d
938.09 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
pimd
1.18 MB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
ripd
270.82 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
ripngd
202.13 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
staticd
166.92 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
vrrpd
171.21 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
vtysh
0 bytes
01/01/1970 12:00:00 AM
---------
📄
watchfrr
77.13 KB
12/01/2023 04:30:55 PM
rwxr-xr-x
📄
watchfrr.sh
737 bytes
12/01/2023 04:27:29 PM
rwxr-xr-x
📄
zebra
1.93 MB
12/01/2023 04:30:55 PM
rwxr-xr-x
Editing: frr_babeltrace.py
Close
#! /usr/libexec/platform-python -s """ Usage: frr_babeltrace.py trace_path FRR pushes data into lttng tracepoints in the least overhead way possible i.e. as binary-data/crf_arrays. These traces need to be converted into pretty strings for easy greping etc. This script is a babeltrace python plugin for that pretty printing. Copyright (C) 2021 NVIDIA Corporation Anuradha Karuppiah This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; see the file COPYING; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA """ import ipaddress import socket import sys import babeltrace ########################### common parsers - start ############################ def print_ip_addr(field_val): """ pretty print "struct ipaddr" """ if field_val[0] == socket.AF_INET: addr = [str(fv) for fv in field_val[4:8]] return str(ipaddress.IPv4Address(".".join(addr))) if field_val[0] == socket.AF_INET6: tmp = "".join("%02x" % fb for fb in field_val[4:]) addr = [] while tmp: addr.append(tmp[:4]) tmp = tmp[4:] addr = ":".join(addr) return str(ipaddress.IPv6Address(addr)) if not field_val[0]: return "" return field_val def print_mac(field_val): """ pretty print "u8 mac[6]" """ return ":".join("%02x" % fb for fb in field_val) def print_net_ipv4_addr(field_val): """ pretty print ctf_integer_network ipv4 """ return str(ipaddress.IPv4Address(field_val)) def print_esi(field_val): """ pretty print ethernet segment id, esi_t """ return ":".join("%02x" % fb for fb in field_val) def get_field_list(event): """ only fetch fields added via the TP, skip metadata etc. """ return event.field_list_with_scope(babeltrace.CTFScope.EVENT_FIELDS) def parse_event(event, field_parsers): """ Wild card event parser; doesn't make things any prettier """ field_list = get_field_list(event) field_info = {} for field in field_list: if field in field_parsers: field_parser = field_parsers.get(field) field_info[field] = field_parser(event.get(field)) else: field_info[field] = event.get(field) print(event.name, field_info) ############################ common parsers - end ############################# ############################ evpn parsers - start ############################# def parse_frr_bgp_evpn_mac_ip_zsend(event): """ bgp evpn mac-ip parser; raw format - ctf_array(unsigned char, mac, &pfx->prefix.macip_addr.mac, sizeof(struct ethaddr)) ctf_array(unsigned char, ip, &pfx->prefix.macip_addr.ip, sizeof(struct ipaddr)) ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr) ctf_array(unsigned char, esi, esi, sizeof(esi_t)) """ field_parsers = {"ip": print_ip_addr, "mac": print_mac, "esi": print_esi, "vtep": print_net_ipv4_addr} parse_event(event, field_parsers) def parse_frr_bgp_evpn_bum_vtep_zsend(event): """ bgp evpn bum-vtep parser; raw format - ctf_integer_network_hex(unsigned int, vtep, pfx->prefix.imet_addr.ip.ipaddr_v4.s_addr) """ field_parsers = {"vtep": print_net_ipv4_addr} parse_event(event, field_parsers) def parse_frr_bgp_evpn_mh_nh_rmac_send(event): """ bgp evpn nh-rmac parser; raw format - ctf_array(unsigned char, rmac, &nh->rmac, sizeof(struct ethaddr)) """ field_parsers = {"rmac": print_mac} parse_event(event, field_parsers) def parse_frr_bgp_evpn_mh_local_es_add_zrecv(event): """ bgp evpn local-es parser; raw format - ctf_array(unsigned char, esi, esi, sizeof(esi_t)) ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr) """ field_parsers = {"esi": print_esi, "vtep": print_net_ipv4_addr} parse_event(event, field_parsers) def parse_frr_bgp_evpn_mh_local_es_del_zrecv(event): """ bgp evpn local-es parser; raw format - ctf_array(unsigned char, esi, esi, sizeof(esi_t)) """ field_parsers = {"esi": print_esi} parse_event(event, field_parsers) def parse_frr_bgp_evpn_mh_local_es_evi_add_zrecv(event): """ bgp evpn local-es-evi parser; raw format - ctf_array(unsigned char, esi, esi, sizeof(esi_t)) """ field_parsers = {"esi": print_esi} parse_event(event, field_parsers) def parse_frr_bgp_evpn_mh_local_es_evi_del_zrecv(event): """ bgp evpn local-es-evi parser; raw format - ctf_array(unsigned char, esi, esi, sizeof(esi_t)) """ field_parsers = {"esi": print_esi} parse_event(event, field_parsers) def parse_frr_bgp_evpn_local_vni_add_zrecv(event): """ bgp evpn local-vni parser; raw format - ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr) ctf_integer_network_hex(unsigned int, mc_grp, mc_grp.s_addr) """ field_parsers = {"vtep": print_net_ipv4_addr, "mc_grp": print_net_ipv4_addr} parse_event(event, field_parsers) def parse_frr_bgp_evpn_local_l3vni_add_zrecv(event): """ bgp evpn local-l3vni parser; raw format - ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr) ctf_array(unsigned char, svi_rmac, svi_rmac, sizeof(struct ethaddr)) ctf_array(unsigned char, vrr_rmac, vrr_rmac, sizeof(struct ethaddr)) """ field_parsers = {"vtep": print_net_ipv4_addr, "svi_rmac": print_mac, "vrr_rmac": print_mac} parse_event(event, field_parsers) def parse_frr_bgp_evpn_local_macip_add_zrecv(event): """ bgp evpn local-mac-ip parser; raw format - ctf_array(unsigned char, ip, ip, sizeof(struct ipaddr)) ctf_array(unsigned char, mac, mac, sizeof(struct ethaddr)) ctf_array(unsigned char, esi, esi, sizeof(esi_t)) """ field_parsers = {"ip": print_ip_addr, "mac": print_mac, "esi": print_esi} parse_event(event, field_parsers) def parse_frr_bgp_evpn_local_macip_del_zrecv(event): """ bgp evpn local-mac-ip del parser; raw format - ctf_array(unsigned char, ip, ip, sizeof(struct ipaddr)) ctf_array(unsigned char, mac, mac, sizeof(struct ethaddr)) """ field_parsers = {"ip": print_ip_addr, "mac": print_mac} parse_event(event, field_parsers) ############################ evpn parsers - end *############################# def main(): """ FRR lttng trace output parser; babel trace plugin """ event_parsers = {"frr_bgp:evpn_mac_ip_zsend": parse_frr_bgp_evpn_mac_ip_zsend, "frr_bgp:evpn_bum_vtep_zsend": parse_frr_bgp_evpn_bum_vtep_zsend, "frr_bgp:evpn_mh_nh_rmac_zsend": parse_frr_bgp_evpn_mh_nh_rmac_send, "frr_bgp:evpn_mh_local_es_add_zrecv": parse_frr_bgp_evpn_mh_local_es_add_zrecv, "frr_bgp:evpn_mh_local_es_del_zrecv": parse_frr_bgp_evpn_mh_local_es_del_zrecv, "frr_bgp:evpn_mh_local_es_evi_add_zrecv": parse_frr_bgp_evpn_mh_local_es_evi_add_zrecv, "frr_bgp:evpn_mh_local_es_evi_del_zrecv": parse_frr_bgp_evpn_mh_local_es_evi_del_zrecv, "frr_bgp:evpn_local_vni_add_zrecv": parse_frr_bgp_evpn_local_vni_add_zrecv, "frr_bgp:evpn_local_l3vni_add_zrecv": parse_frr_bgp_evpn_local_l3vni_add_zrecv, "frr_bgp:evpn_local_macip_add_zrecv": parse_frr_bgp_evpn_local_macip_add_zrecv, "frr_bgp:evpn_local_macip_del_zrecv": parse_frr_bgp_evpn_local_macip_del_zrecv, } # get the trace path from the first command line argument trace_path = sys.argv[1] # grab events trace_collection = babeltrace.TraceCollection() trace_collection.add_traces_recursive(trace_path, "ctf") for event in trace_collection.events: if event.name in event_parsers: event_parser = event_parsers.get(event.name) event_parser(event) else: parse_event(event, {}) if __name__ == "__main__": main()