]>
Commit | Line | Data |
---|---|---|
718e3744 | 1 | /* Main routine of bgpd. |
896014f4 DL |
2 | * Copyright (C) 1996, 97, 98, 1999 Kunihiro Ishiguro |
3 | * | |
4 | * This file is part of GNU Zebra. | |
5 | * | |
6 | * GNU Zebra is free software; you can redistribute it and/or modify it | |
7 | * under the terms of the GNU General Public License as published by the | |
8 | * Free Software Foundation; either version 2, or (at your option) any | |
9 | * later version. | |
10 | * | |
11 | * GNU Zebra is distributed in the hope that it will be useful, but | |
12 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
14 | * General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License along | |
17 | * with this program; see the file COPYING; if not, write to the Free Software | |
18 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
19 | */ | |
718e3744 | 20 | |
21 | #include <zebra.h> | |
22 | ||
03014d48 | 23 | #include <pthread.h> |
718e3744 | 24 | #include "vector.h" |
718e3744 | 25 | #include "command.h" |
26 | #include "getopt.h" | |
27 | #include "thread.h" | |
5e4fa164 | 28 | #include <lib/version.h> |
718e3744 | 29 | #include "memory.h" |
30 | #include "prefix.h" | |
31 | #include "log.h" | |
edd7c245 | 32 | #include "privs.h" |
2d75d052 | 33 | #include "sigevent.h" |
228da428 CC |
34 | #include "zclient.h" |
35 | #include "routemap.h" | |
36 | #include "filter.h" | |
37 | #include "plist.h" | |
8196f13d | 38 | #include "stream.h" |
3f9c7369 | 39 | #include "queue.h" |
6a69b354 | 40 | #include "vrf.h" |
567b877d | 41 | #include "bfd.h" |
4f04a76b | 42 | #include "libfrr.h" |
61cf4b37 | 43 | #include "ns.h" |
718e3744 | 44 | |
45 | #include "bgpd/bgpd.h" | |
46 | #include "bgpd/bgp_attr.h" | |
b2f0fa55 | 47 | #include "bgpd/bgp_route.h" |
718e3744 | 48 | #include "bgpd/bgp_mplsvpn.h" |
228da428 CC |
49 | #include "bgpd/bgp_aspath.h" |
50 | #include "bgpd/bgp_dump.h" | |
51 | #include "bgpd/bgp_route.h" | |
52 | #include "bgpd/bgp_nexthop.h" | |
53 | #include "bgpd/bgp_regex.h" | |
54 | #include "bgpd/bgp_clist.h" | |
55 | #include "bgpd/bgp_debug.h" | |
14454c9f | 56 | #include "bgpd/bgp_errors.h" |
228da428 | 57 | #include "bgpd/bgp_filter.h" |
8196f13d | 58 | #include "bgpd/bgp_zebra.h" |
d3ecc69e | 59 | #include "bgpd/bgp_packet.h" |
03014d48 | 60 | #include "bgpd/bgp_keepalives.h" |
61cf4b37 | 61 | #include "bgpd/bgp_network.h" |
def31c13 | 62 | #include "bgpd/bgp_errors.h" |
b4becb06 | 63 | #include "bgpd/bgp_script.h" |
45a859f1 | 64 | #include "bgpd/bgp_evpn_mh.h" |
c589d847 | 65 | #include "bgpd/bgp_nht.h" |
48cb7ea9 | 66 | #include "bgpd/bgp_routemap_nb.h" |
ed0e57e3 | 67 | #include "bgpd/bgp_community_alias.h" |
718e3744 | 68 | |
65efcfce | 69 | #ifdef ENABLE_BGP_VNC |
f8b6f499 | 70 | #include "bgpd/rfapi/rfapi_backend.h" |
65efcfce LB |
71 | #endif |
72 | ||
718e3744 | 73 | /* bgpd options, we use GNU getopt library. */ |
d62a17ae | 74 | static const struct option longopts[] = { |
75 | {"bgp_port", required_argument, NULL, 'p'}, | |
76 | {"listenon", required_argument, NULL, 'l'}, | |
d62a17ae | 77 | {"no_kernel", no_argument, NULL, 'n'}, |
78 | {"skip_runas", no_argument, NULL, 'S'}, | |
79 | {"ecmp", required_argument, NULL, 'e'}, | |
f533be73 | 80 | {"int_num", required_argument, NULL, 'I'}, |
c0064d2a | 81 | {"no_zebra", no_argument, NULL, 'Z'}, |
c2d020ad | 82 | {"socket_size", required_argument, NULL, 's'}, |
d62a17ae | 83 | {0}}; |
718e3744 | 84 | |
2d75d052 | 85 | /* signal definitions */ |
d62a17ae | 86 | void sighup(void); |
87 | void sigint(void); | |
88 | void sigusr1(void); | |
2d75d052 | 89 | |
d62a17ae | 90 | static void bgp_exit(int); |
91 | static void bgp_vrf_terminate(void); | |
228da428 | 92 | |
7cc91e67 | 93 | static struct frr_signal_t bgp_signals[] = { |
d62a17ae | 94 | { |
95 | .signal = SIGHUP, | |
96 | .handler = &sighup, | |
97 | }, | |
98 | { | |
99 | .signal = SIGUSR1, | |
100 | .handler = &sigusr1, | |
101 | }, | |
102 | { | |
103 | .signal = SIGINT, | |
104 | .handler = &sigint, | |
105 | }, | |
106 | { | |
107 | .signal = SIGTERM, | |
108 | .handler = &sigint, | |
109 | }, | |
2d75d052 | 110 | }; |
111 | ||
edd7c245 | 112 | /* privileges */ |
996c9314 LB |
113 | static zebra_capabilities_t _caps_p[] = {ZCAP_BIND, ZCAP_NET_RAW, |
114 | ZCAP_NET_ADMIN, ZCAP_SYS_ADMIN}; | |
edd7c245 | 115 | |
d62a17ae | 116 | struct zebra_privs_t bgpd_privs = { |
b2f36157 | 117 | #if defined(FRR_USER) && defined(FRR_GROUP) |
d62a17ae | 118 | .user = FRR_USER, |
119 | .group = FRR_GROUP, | |
d81fadfd | 120 | #endif |
121 | #ifdef VTY_GROUP | |
d62a17ae | 122 | .vty_group = VTY_GROUP, |
edd7c245 | 123 | #endif |
d62a17ae | 124 | .caps_p = _caps_p, |
125 | .cap_num_p = array_size(_caps_p), | |
126 | .cap_num_i = 0, | |
edd7c245 | 127 | }; |
128 | ||
eb05883f DL |
129 | static struct frr_daemon_info bgpd_di; |
130 | ||
718e3744 | 131 | /* SIGHUP handler. */ |
d62a17ae | 132 | void sighup(void) |
718e3744 | 133 | { |
23ca3269 DS |
134 | zlog_info("SIGHUP received, ignoring"); |
135 | ||
136 | return; | |
137 | ||
138 | /* | |
139 | * This is turned off for the moment. There is all | |
140 | * sorts of config turned off by bgp_terminate | |
3130e286 | 141 | * that is not setup properly again in bgp_reset. |
23ca3269 DS |
142 | * I see no easy way to do this nor do I see that |
143 | * this is a desirable way to reload config | |
144 | * given the yang work. | |
145 | */ | |
d62a17ae | 146 | /* Terminate all thread. */ |
3130e286 DS |
147 | /* |
148 | * bgp_terminate(); | |
149 | * bgp_reset(); | |
150 | * zlog_info("bgpd restarting!"); | |
718e3744 | 151 | |
3130e286 DS |
152 | * Reload config file. |
153 | * vty_read_config(NULL, bgpd_di.config_file, config_default); | |
154 | */ | |
d62a17ae | 155 | /* Try to return to normal operation. */ |
718e3744 | 156 | } |
157 | ||
158 | /* SIGINT handler. */ | |
d62a17ae | 159 | __attribute__((__noreturn__)) void sigint(void) |
718e3744 | 160 | { |
d62a17ae | 161 | zlog_notice("Terminating on signal"); |
97b4a0ec LB |
162 | assert(bm->terminating == false); |
163 | bm->terminating = true; /* global flag that shutting down */ | |
718e3744 | 164 | |
21bfce98 RZ |
165 | /* Disable BFD events to avoid wasting processing. */ |
166 | bfd_protocol_integration_set_shutdown(true); | |
167 | ||
c8dde10f | 168 | bgp_terminate(); |
718e3744 | 169 | |
d62a17ae | 170 | bgp_exit(0); |
540766e7 | 171 | |
d62a17ae | 172 | exit(0); |
718e3744 | 173 | } |
174 | ||
175 | /* SIGUSR1 handler. */ | |
d62a17ae | 176 | void sigusr1(void) |
718e3744 | 177 | { |
d62a17ae | 178 | zlog_rotate(); |
718e3744 | 179 | } |
228da428 CC |
180 | |
181 | /* | |
182 | Try to free up allocations we know about so that diagnostic tools such as | |
183 | valgrind are able to better illuminate leaks. | |
184 | ||
185 | Zebra route removal and protocol teardown are not meant to be done here. | |
186 | For example, "retain_mode" may be set. | |
187 | */ | |
d62a17ae | 188 | static __attribute__((__noreturn__)) void bgp_exit(int status) |
228da428 | 189 | { |
e2f3a930 | 190 | struct bgp *bgp, *bgp_default, *bgp_evpn; |
d62a17ae | 191 | struct listnode *node, *nnode; |
228da428 | 192 | |
d62a17ae | 193 | /* it only makes sense for this to be called on a clean exit */ |
194 | assert(status == 0); | |
228da428 | 195 | |
03951374 DL |
196 | frr_early_fini(); |
197 | ||
d62a17ae | 198 | bgp_close(); |
1ff9a340 | 199 | |
0e42e319 | 200 | bgp_default = bgp_get_default(); |
e2f3a930 | 201 | bgp_evpn = bgp_get_evpn(); |
0e42e319 | 202 | |
d62a17ae | 203 | /* reverse bgp_master_init */ |
0e42e319 | 204 | for (ALL_LIST_ELEMENTS(bm->bgp, node, nnode, bgp)) { |
e2f3a930 | 205 | if (bgp_default == bgp || bgp_evpn == bgp) |
0e42e319 | 206 | continue; |
d62a17ae | 207 | bgp_delete(bgp); |
0e42e319 | 208 | } |
e2f3a930 T |
209 | if (bgp_evpn && bgp_evpn != bgp_default) |
210 | bgp_delete(bgp_evpn); | |
1f4b2cce DS |
211 | if (bgp_default) |
212 | bgp_delete(bgp_default); | |
46abd3e3 | 213 | |
45a859f1 | 214 | bgp_evpn_mh_finish(); |
c589d847 | 215 | bgp_l3nhg_finish(); |
45a859f1 | 216 | |
d62a17ae | 217 | /* reverse bgp_dump_init */ |
218 | bgp_dump_finish(); | |
ed0e57e3 DA |
219 | |
220 | /* BGP community aliases */ | |
221 | bgp_community_alias_finish(); | |
228da428 | 222 | |
d62a17ae | 223 | /* reverse bgp_route_init */ |
224 | bgp_route_finish(); | |
228da428 | 225 | |
d62a17ae | 226 | /* cleanup route maps */ |
227 | bgp_route_map_terminate(); | |
228da428 | 228 | |
d62a17ae | 229 | /* reverse bgp_attr_init */ |
230 | bgp_attr_finish(); | |
7b8def58 | 231 | |
2d4ee774 QY |
232 | /* stop pthreads */ |
233 | bgp_pthreads_finish(); | |
234 | ||
d62a17ae | 235 | /* reverse access_list_init */ |
236 | access_list_add_hook(NULL); | |
237 | access_list_delete_hook(NULL); | |
238 | access_list_reset(); | |
228da428 | 239 | |
d62a17ae | 240 | /* reverse bgp_filter_init */ |
241 | as_list_add_hook(NULL); | |
242 | as_list_delete_hook(NULL); | |
243 | bgp_filter_reset(); | |
228da428 | 244 | |
d62a17ae | 245 | /* reverse prefix_list_init */ |
246 | prefix_list_add_hook(NULL); | |
247 | prefix_list_delete_hook(NULL); | |
248 | prefix_list_reset(); | |
228da428 | 249 | |
d62a17ae | 250 | /* reverse community_list_init */ |
251 | community_list_terminate(bgp_clist); | |
228da428 | 252 | |
d62a17ae | 253 | bgp_vrf_terminate(); |
49e5a4a0 | 254 | #ifdef ENABLE_BGP_VNC |
d62a17ae | 255 | vnc_zebra_destroy(); |
65efcfce | 256 | #endif |
d62a17ae | 257 | bgp_zebra_destroy(); |
228da428 | 258 | |
3d57c994 | 259 | bf_free(bm->rd_idspace); |
6a154c88 | 260 | list_delete(&bm->bgp); |
85e9cd9a | 261 | list_delete(&bm->addresses); |
0768f289 PG |
262 | |
263 | bgp_lp_finish(); | |
264 | ||
d62a17ae | 265 | memset(bm, 0, sizeof(*bm)); |
46857efe | 266 | |
03951374 | 267 | frr_fini(); |
d62a17ae | 268 | exit(status); |
228da428 | 269 | } |
6b0655a2 | 270 | |
d62a17ae | 271 | static int bgp_vrf_new(struct vrf *vrf) |
2fcc254e | 272 | { |
d62a17ae | 273 | if (BGP_DEBUG(zebra, ZEBRA)) |
a8bf7d9c | 274 | zlog_debug("VRF Created: %s(%u)", vrf->name, vrf->vrf_id); |
2fcc254e | 275 | |
d62a17ae | 276 | return 0; |
2fcc254e DS |
277 | } |
278 | ||
d62a17ae | 279 | static int bgp_vrf_delete(struct vrf *vrf) |
2fcc254e | 280 | { |
d62a17ae | 281 | if (BGP_DEBUG(zebra, ZEBRA)) |
a8bf7d9c | 282 | zlog_debug("VRF Deletion: %s(%u)", vrf->name, vrf->vrf_id); |
2fcc254e | 283 | |
d62a17ae | 284 | return 0; |
2fcc254e DS |
285 | } |
286 | ||
d62a17ae | 287 | static int bgp_vrf_enable(struct vrf *vrf) |
2fcc254e | 288 | { |
d62a17ae | 289 | struct bgp *bgp; |
290 | vrf_id_t old_vrf_id; | |
291 | ||
292 | if (BGP_DEBUG(zebra, ZEBRA)) | |
a8bf7d9c | 293 | zlog_debug("VRF enable add %s id %u", vrf->name, vrf->vrf_id); |
d62a17ae | 294 | |
295 | bgp = bgp_lookup_by_name(vrf->name); | |
d5f31d5f | 296 | if (bgp && bgp->vrf_id != vrf->vrf_id) { |
d62a17ae | 297 | old_vrf_id = bgp->vrf_id; |
298 | /* We have instance configured, link to VRF and make it "up". */ | |
299 | bgp_vrf_link(bgp, vrf); | |
300 | ||
e5619c28 | 301 | bgp_handle_socket(bgp, vrf, old_vrf_id, true); |
d62a17ae | 302 | bgp_instance_up(bgp); |
ddb5b488 PZ |
303 | vpn_leak_zebra_vrf_label_update(bgp, AFI_IP); |
304 | vpn_leak_zebra_vrf_label_update(bgp, AFI_IP6); | |
b72c9e14 HS |
305 | vpn_leak_zebra_vrf_sid_update(bgp, AFI_IP); |
306 | vpn_leak_zebra_vrf_sid_update(bgp, AFI_IP6); | |
e504cf3b DS |
307 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP, |
308 | bgp_get_default(), bgp); | |
309 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP, | |
310 | bgp_get_default(), bgp); | |
311 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP6, | |
312 | bgp_get_default(), bgp); | |
313 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP6, | |
314 | bgp_get_default(), bgp); | |
d62a17ae | 315 | } |
316 | ||
317 | return 0; | |
2fcc254e DS |
318 | } |
319 | ||
d62a17ae | 320 | static int bgp_vrf_disable(struct vrf *vrf) |
2fcc254e | 321 | { |
d62a17ae | 322 | struct bgp *bgp; |
d62a17ae | 323 | |
324 | if (vrf->vrf_id == VRF_DEFAULT) | |
325 | return 0; | |
326 | ||
327 | if (BGP_DEBUG(zebra, ZEBRA)) | |
328 | zlog_debug("VRF disable %s id %d", vrf->name, vrf->vrf_id); | |
329 | ||
330 | bgp = bgp_lookup_by_name(vrf->name); | |
331 | if (bgp) { | |
ddb5b488 PZ |
332 | |
333 | vpn_leak_zebra_vrf_label_withdraw(bgp, AFI_IP); | |
334 | vpn_leak_zebra_vrf_label_withdraw(bgp, AFI_IP6); | |
e504cf3b DS |
335 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP, |
336 | bgp_get_default(), bgp); | |
337 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP, | |
338 | bgp_get_default(), bgp); | |
339 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP6, | |
340 | bgp_get_default(), bgp); | |
341 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP6, | |
342 | bgp_get_default(), bgp); | |
ddb5b488 | 343 | |
e5619c28 | 344 | bgp_handle_socket(bgp, vrf, VRF_UNKNOWN, false); |
d62a17ae | 345 | /* We have instance configured, unlink from VRF and make it |
346 | * "down". */ | |
d62a17ae | 347 | bgp_instance_down(bgp); |
6cc0114b | 348 | bgp_vrf_unlink(bgp, vrf); |
d62a17ae | 349 | } |
350 | ||
351 | /* Note: This is a callback, the VRF will be deleted by the caller. */ | |
352 | return 0; | |
2fcc254e DS |
353 | } |
354 | ||
d62a17ae | 355 | static void bgp_vrf_init(void) |
2fcc254e | 356 | { |
ac2cb9bf | 357 | vrf_init(bgp_vrf_new, bgp_vrf_enable, bgp_vrf_disable, bgp_vrf_delete); |
2fcc254e DS |
358 | } |
359 | ||
d62a17ae | 360 | static void bgp_vrf_terminate(void) |
021530c1 | 361 | { |
d62a17ae | 362 | vrf_terminate(); |
021530c1 | 363 | } |
364 | ||
0d8c7a26 | 365 | static const struct frr_yang_module_info *const bgpd_yang_modules[] = { |
c2aab693 | 366 | &frr_filter_info, |
91835f1f RZ |
367 | &frr_interface_info, |
368 | &frr_route_map_info, | |
6fd8972a | 369 | &frr_vrf_info, |
48cb7ea9 | 370 | &frr_bgp_route_map_info, |
8fcdd0d6 RW |
371 | }; |
372 | ||
d62a17ae | 373 | FRR_DAEMON_INFO(bgpd, BGP, .vty_port = BGP_VTY_PORT, |
4f04a76b | 374 | |
d62a17ae | 375 | .proghelp = "Implementation of the BGP routing protocol.", |
4f04a76b | 376 | |
d62a17ae | 377 | .signals = bgp_signals, .n_signals = array_size(bgp_signals), |
4f04a76b | 378 | |
8fcdd0d6 | 379 | .privs = &bgpd_privs, .yang_modules = bgpd_yang_modules, |
80413c20 DL |
380 | .n_yang_modules = array_size(bgpd_yang_modules), |
381 | ); | |
4f04a76b | 382 | |
f28963f7 | 383 | #define DEPRECATED_OPTIONS "" |
c8dde10f | 384 | |
718e3744 | 385 | /* Main routine of bgpd. Treatment of argument and start bgp finite |
386 | state machine is handled at here. */ | |
d62a17ae | 387 | int main(int argc, char **argv) |
718e3744 | 388 | { |
d62a17ae | 389 | int opt; |
390 | int tmp_port; | |
391 | ||
392 | int bgp_port = BGP_PORT_DEFAULT; | |
85e9cd9a | 393 | struct list *addresses = list_new(); |
d62a17ae | 394 | int no_fib_flag = 0; |
0b014ea6 | 395 | int no_zebra_flag = 0; |
d62a17ae | 396 | int skip_runas = 0; |
f533be73 | 397 | int instance = 0; |
c2d020ad | 398 | int buffer_size = BGP_SOCKET_SNDBUF_SIZE; |
85e9cd9a AMR |
399 | char *address; |
400 | struct listnode *node; | |
401 | ||
402 | addresses->cmp = (int (*)(void *, void *))strcmp; | |
d62a17ae | 403 | |
404 | frr_preinit(&bgpd_di, argc, argv); | |
405 | frr_opt_add( | |
c2d020ad | 406 | "p:l:SnZe:I:s:" DEPRECATED_OPTIONS, longopts, |
580f8636 | 407 | " -p, --bgp_port Set BGP listen port number (0 means do not listen).\n" |
d62a17ae | 408 | " -l, --listenon Listen on specified address (implies -n)\n" |
d62a17ae | 409 | " -n, --no_kernel Do not install route to kernel.\n" |
0b014ea6 | 410 | " -Z, --no_zebra Do not communicate with Zebra.\n" |
d62a17ae | 411 | " -S, --skip_runas Skip capabilities checks, and changing user and group IDs.\n" |
f533be73 | 412 | " -e, --ecmp Specify ECMP to use.\n" |
c2d020ad DS |
413 | " -I, --int_num Set instance number (label-manager)\n" |
414 | " -s, --socket_size Set BGP peer socket send buffer size\n"); | |
d62a17ae | 415 | |
416 | /* Command line argument treatment. */ | |
417 | while (1) { | |
418 | opt = frr_getopt(argc, argv, 0); | |
419 | ||
c8dde10f QY |
420 | if (opt && opt < 128 && strchr(DEPRECATED_OPTIONS, opt)) { |
421 | fprintf(stderr, | |
422 | "The -%c option no longer exists.\nPlease refer to the manual.\n", | |
423 | opt); | |
424 | continue; | |
425 | } | |
426 | ||
d62a17ae | 427 | if (opt == EOF) |
428 | break; | |
429 | ||
430 | switch (opt) { | |
431 | case 0: | |
432 | break; | |
433 | case 'p': | |
434 | tmp_port = atoi(optarg); | |
580f8636 | 435 | if (tmp_port < 0 || tmp_port > 0xffff) |
d62a17ae | 436 | bgp_port = BGP_PORT_DEFAULT; |
437 | else | |
438 | bgp_port = tmp_port; | |
439 | break; | |
1e03d6bc QY |
440 | case 'e': { |
441 | unsigned long int parsed_multipath = | |
442 | strtoul(optarg, NULL, 10); | |
443 | if (parsed_multipath == 0 | |
444 | || parsed_multipath > MULTIPATH_NUM | |
445 | || parsed_multipath > UINT_MAX) { | |
af4c2728 | 446 | flog_err( |
e50f7cfd | 447 | EC_BGP_MULTIPATH, |
1e03d6bc | 448 | "Multipath Number specified must be less than %u and greater than 0", |
d62a17ae | 449 | MULTIPATH_NUM); |
450 | return 1; | |
451 | } | |
1e03d6bc | 452 | multipath_num = parsed_multipath; |
d62a17ae | 453 | break; |
1e03d6bc | 454 | } |
d62a17ae | 455 | case 'l': |
85e9cd9a | 456 | listnode_add_sort_nodup(addresses, optarg); |
d62a17ae | 457 | /* listenon implies -n */ |
458 | /* fallthru */ | |
459 | case 'n': | |
460 | no_fib_flag = 1; | |
461 | break; | |
0b014ea6 PG |
462 | case 'Z': |
463 | no_zebra_flag = 1; | |
464 | break; | |
d62a17ae | 465 | case 'S': |
466 | skip_runas = 1; | |
467 | break; | |
f533be73 | 468 | case 'I': |
469 | instance = atoi(optarg); | |
470 | if (instance > (unsigned short)-1) | |
471 | zlog_err("Instance %i out of range (0..%u)", | |
472 | instance, (unsigned short)-1); | |
473 | break; | |
c2d020ad DS |
474 | case 's': |
475 | buffer_size = atoi(optarg); | |
476 | break; | |
d62a17ae | 477 | default: |
478 | frr_help_exit(1); | |
d62a17ae | 479 | } |
718e3744 | 480 | } |
d62a17ae | 481 | if (skip_runas) |
482 | memset(&bgpd_privs, 0, sizeof(bgpd_privs)); | |
718e3744 | 483 | |
d62a17ae | 484 | /* BGP master init. */ |
85e9cd9a | 485 | bgp_master_init(frr_init(), buffer_size, addresses); |
d62a17ae | 486 | bm->port = bgp_port; |
580f8636 | 487 | if (bgp_port == 0) |
488 | bgp_option_set(BGP_OPT_NO_LISTEN); | |
0b014ea6 | 489 | if (no_fib_flag || no_zebra_flag) |
d62a17ae | 490 | bgp_option_set(BGP_OPT_NO_FIB); |
0b014ea6 PG |
491 | if (no_zebra_flag) |
492 | bgp_option_set(BGP_OPT_NO_ZEBRA); | |
def31c13 | 493 | bgp_error_init(); |
d62a17ae | 494 | /* Initializations. */ |
495 | bgp_vrf_init(); | |
718e3744 | 496 | |
fa22080d | 497 | #ifdef HAVE_SCRIPTING |
b4becb06 | 498 | bgp_script_init(); |
fa22080d | 499 | #endif |
b4becb06 | 500 | |
d62a17ae | 501 | /* BGP related initialization. */ |
f533be73 | 502 | bgp_init((unsigned short)instance); |
718e3744 | 503 | |
85e9cd9a AMR |
504 | if (list_isempty(bm->addresses)) { |
505 | snprintf(bgpd_di.startinfo, sizeof(bgpd_di.startinfo), | |
506 | ", bgp@<all>:%d", bm->port); | |
507 | } else { | |
508 | for (ALL_LIST_ELEMENTS_RO(bm->addresses, node, address)) | |
509 | snprintf(bgpd_di.startinfo + strlen(bgpd_di.startinfo), | |
510 | sizeof(bgpd_di.startinfo) | |
511 | - strlen(bgpd_di.startinfo), | |
512 | ", bgp@%s:%d", address, bm->port); | |
513 | } | |
718e3744 | 514 | |
d62a17ae | 515 | frr_config_fork(); |
2d4ee774 | 516 | /* must be called after fork() */ |
034e185d | 517 | bgp_gr_apply_running_config(); |
419dfe6a | 518 | bgp_pthreads_run(); |
d62a17ae | 519 | frr_run(bm->master); |
718e3744 | 520 | |
d62a17ae | 521 | /* Not reached. */ |
95f7965d | 522 | return 0; |
718e3744 | 523 | } |