mirror of
				https://git.proxmox.com/git/mirror_frr
				synced 2025-11-04 15:04:05 +00:00 
			
		
		
		
	The files converted in this commit either had some random misspelling or formatting weirdness that made them escape automated replacement, or have a particularly "weird" licensing setup (e.g. dual-licensed.) This also marks a bunch of "public domain" files as SPDX License "NONE". Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
		
			
				
	
	
		
			254 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			254 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
#!/usr/bin/env python3
 | 
						|
# SPDX-License-Identifier: GPL-2.0-or-later
 | 
						|
"""
 | 
						|
Usage: frr_babeltrace.py trace_path
 | 
						|
 | 
						|
FRR pushes data into lttng tracepoints in the least overhead way possible
 | 
						|
i.e. as binary-data/crf_arrays. These traces need to be converted into pretty
 | 
						|
strings for easy greping etc. This script is a babeltrace python plugin for
 | 
						|
that pretty printing.
 | 
						|
 | 
						|
Copyright (C) 2021  NVIDIA Corporation
 | 
						|
Anuradha Karuppiah
 | 
						|
"""
 | 
						|
 | 
						|
import ipaddress
 | 
						|
import socket
 | 
						|
import sys
 | 
						|
 | 
						|
import babeltrace
 | 
						|
 | 
						|
########################### common parsers - start ############################
 | 
						|
def print_ip_addr(field_val):
 | 
						|
    """
 | 
						|
    pretty print "struct ipaddr"
 | 
						|
    """
 | 
						|
    if field_val[0] == socket.AF_INET:
 | 
						|
        addr = [str(fv) for fv in field_val[4:8]]
 | 
						|
        return str(ipaddress.IPv4Address(".".join(addr)))
 | 
						|
 | 
						|
    if field_val[0] == socket.AF_INET6:
 | 
						|
        tmp = "".join("%02x" % fb for fb in field_val[4:])
 | 
						|
        addr = []
 | 
						|
        while tmp:
 | 
						|
            addr.append(tmp[:4])
 | 
						|
            tmp = tmp[4:]
 | 
						|
        addr = ":".join(addr)
 | 
						|
        return str(ipaddress.IPv6Address(addr))
 | 
						|
 | 
						|
    if not field_val[0]:
 | 
						|
        return ""
 | 
						|
 | 
						|
    return field_val
 | 
						|
 | 
						|
 | 
						|
def print_mac(field_val):
 | 
						|
    """
 | 
						|
    pretty print "u8 mac[6]"
 | 
						|
    """
 | 
						|
    return ":".join("%02x" % fb for fb in field_val)
 | 
						|
 | 
						|
def print_net_ipv4_addr(field_val):
 | 
						|
    """
 | 
						|
    pretty print ctf_integer_network ipv4
 | 
						|
    """
 | 
						|
    return str(ipaddress.IPv4Address(field_val))
 | 
						|
 | 
						|
def print_esi(field_val):
 | 
						|
    """
 | 
						|
    pretty print ethernet segment id, esi_t
 | 
						|
    """
 | 
						|
    return ":".join("%02x" % fb for fb in field_val)
 | 
						|
 | 
						|
def get_field_list(event):
 | 
						|
    """
 | 
						|
    only fetch fields added via the TP, skip metadata etc.
 | 
						|
    """
 | 
						|
    return event.field_list_with_scope(babeltrace.CTFScope.EVENT_FIELDS)
 | 
						|
 | 
						|
def parse_event(event, field_parsers):
 | 
						|
    """
 | 
						|
    Wild card event parser; doesn't make things any prettier
 | 
						|
    """
 | 
						|
    field_list = get_field_list(event)
 | 
						|
    field_info = {}
 | 
						|
    for field in field_list:
 | 
						|
        if field in field_parsers:
 | 
						|
            field_parser = field_parsers.get(field)
 | 
						|
            field_info[field] = field_parser(event.get(field))
 | 
						|
        else:
 | 
						|
            field_info[field] = event.get(field)
 | 
						|
    print(event.name, field_info)
 | 
						|
############################ common parsers - end #############################
 | 
						|
 | 
						|
############################ evpn parsers - start #############################
 | 
						|
def parse_frr_bgp_evpn_mac_ip_zsend(event):
 | 
						|
    """
 | 
						|
    bgp evpn mac-ip parser; raw format -
 | 
						|
    ctf_array(unsigned char, mac, &pfx->prefix.macip_addr.mac,
 | 
						|
            sizeof(struct ethaddr))
 | 
						|
    ctf_array(unsigned char, ip, &pfx->prefix.macip_addr.ip,
 | 
						|
            sizeof(struct ipaddr))
 | 
						|
    ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr)
 | 
						|
    ctf_array(unsigned char, esi, esi, sizeof(esi_t))
 | 
						|
    """
 | 
						|
    field_parsers = {"ip": print_ip_addr,
 | 
						|
                     "mac": print_mac,
 | 
						|
                     "esi": print_esi,
 | 
						|
                     "vtep": print_net_ipv4_addr}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_bum_vtep_zsend(event):
 | 
						|
    """
 | 
						|
    bgp evpn bum-vtep parser; raw format -
 | 
						|
    ctf_integer_network_hex(unsigned int, vtep,
 | 
						|
            pfx->prefix.imet_addr.ip.ipaddr_v4.s_addr)
 | 
						|
 | 
						|
    """
 | 
						|
    field_parsers = {"vtep": print_net_ipv4_addr}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_mh_nh_rmac_send(event):
 | 
						|
    """
 | 
						|
    bgp evpn nh-rmac parser; raw format -
 | 
						|
    ctf_array(unsigned char, rmac, &nh->rmac, sizeof(struct ethaddr))
 | 
						|
    """
 | 
						|
    field_parsers = {"rmac": print_mac}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_mh_local_es_add_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-es parser; raw format -
 | 
						|
    ctf_array(unsigned char, esi, esi, sizeof(esi_t))
 | 
						|
    ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr)
 | 
						|
    """
 | 
						|
    field_parsers = {"esi": print_esi,
 | 
						|
                     "vtep": print_net_ipv4_addr}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_mh_local_es_del_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-es parser; raw format -
 | 
						|
    ctf_array(unsigned char, esi, esi, sizeof(esi_t))
 | 
						|
    """
 | 
						|
    field_parsers = {"esi": print_esi}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_mh_local_es_evi_add_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-es-evi parser; raw format -
 | 
						|
    ctf_array(unsigned char, esi, esi, sizeof(esi_t))
 | 
						|
    """
 | 
						|
    field_parsers = {"esi": print_esi}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_mh_local_es_evi_del_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-es-evi parser; raw format -
 | 
						|
    ctf_array(unsigned char, esi, esi, sizeof(esi_t))
 | 
						|
    """
 | 
						|
    field_parsers = {"esi": print_esi}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_local_vni_add_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-vni parser; raw format -
 | 
						|
    ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr)
 | 
						|
    ctf_integer_network_hex(unsigned int, mc_grp, mc_grp.s_addr)
 | 
						|
    """
 | 
						|
    field_parsers = {"vtep": print_net_ipv4_addr,
 | 
						|
                     "mc_grp": print_net_ipv4_addr}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_local_l3vni_add_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-l3vni parser; raw format -
 | 
						|
    ctf_integer_network_hex(unsigned int, vtep, vtep.s_addr)
 | 
						|
    ctf_array(unsigned char, svi_rmac, svi_rmac, sizeof(struct ethaddr))
 | 
						|
    ctf_array(unsigned char, vrr_rmac, vrr_rmac, sizeof(struct ethaddr))
 | 
						|
    """
 | 
						|
    field_parsers = {"vtep": print_net_ipv4_addr,
 | 
						|
                     "svi_rmac": print_mac,
 | 
						|
                     "vrr_rmac": print_mac}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_local_macip_add_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-mac-ip parser; raw format -
 | 
						|
    ctf_array(unsigned char, ip, ip, sizeof(struct ipaddr))
 | 
						|
    ctf_array(unsigned char, mac, mac, sizeof(struct ethaddr))
 | 
						|
    ctf_array(unsigned char, esi, esi, sizeof(esi_t))
 | 
						|
    """
 | 
						|
    field_parsers = {"ip": print_ip_addr,
 | 
						|
                     "mac": print_mac,
 | 
						|
                     "esi": print_esi}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
def parse_frr_bgp_evpn_local_macip_del_zrecv(event):
 | 
						|
    """
 | 
						|
    bgp evpn local-mac-ip del parser; raw format -
 | 
						|
    ctf_array(unsigned char, ip, ip, sizeof(struct ipaddr))
 | 
						|
    ctf_array(unsigned char, mac, mac, sizeof(struct ethaddr))
 | 
						|
    """
 | 
						|
    field_parsers = {"ip": print_ip_addr,
 | 
						|
                     "mac": print_mac}
 | 
						|
 | 
						|
    parse_event(event, field_parsers)
 | 
						|
 | 
						|
############################ evpn parsers - end *#############################
 | 
						|
 | 
						|
def main():
 | 
						|
    """
 | 
						|
    FRR lttng trace output parser; babel trace plugin
 | 
						|
    """
 | 
						|
    event_parsers = {"frr_bgp:evpn_mac_ip_zsend":
 | 
						|
                     parse_frr_bgp_evpn_mac_ip_zsend,
 | 
						|
                     "frr_bgp:evpn_bum_vtep_zsend":
 | 
						|
                     parse_frr_bgp_evpn_bum_vtep_zsend,
 | 
						|
                     "frr_bgp:evpn_mh_nh_rmac_zsend":
 | 
						|
                     parse_frr_bgp_evpn_mh_nh_rmac_send,
 | 
						|
                     "frr_bgp:evpn_mh_local_es_add_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_mh_local_es_add_zrecv,
 | 
						|
                     "frr_bgp:evpn_mh_local_es_del_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_mh_local_es_del_zrecv,
 | 
						|
                     "frr_bgp:evpn_mh_local_es_evi_add_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_mh_local_es_evi_add_zrecv,
 | 
						|
                     "frr_bgp:evpn_mh_local_es_evi_del_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_mh_local_es_evi_del_zrecv,
 | 
						|
                     "frr_bgp:evpn_local_vni_add_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_local_vni_add_zrecv,
 | 
						|
                     "frr_bgp:evpn_local_l3vni_add_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_local_l3vni_add_zrecv,
 | 
						|
                     "frr_bgp:evpn_local_macip_add_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_local_macip_add_zrecv,
 | 
						|
                     "frr_bgp:evpn_local_macip_del_zrecv":
 | 
						|
                     parse_frr_bgp_evpn_local_macip_del_zrecv,
 | 
						|
}
 | 
						|
 | 
						|
    # get the trace path from the first command line argument
 | 
						|
    trace_path = sys.argv[1]
 | 
						|
 | 
						|
    # grab events
 | 
						|
    trace_collection = babeltrace.TraceCollection()
 | 
						|
    trace_collection.add_traces_recursive(trace_path, "ctf")
 | 
						|
 | 
						|
    for event in trace_collection.events:
 | 
						|
        if event.name in event_parsers:
 | 
						|
            event_parser = event_parsers.get(event.name)
 | 
						|
            event_parser(event)
 | 
						|
        else:
 | 
						|
            parse_event(event, {})
 | 
						|
 | 
						|
if __name__ == "__main__":
 | 
						|
    main()
 |