]> git.proxmox.com Git - mirror_frr.git/blame - bgpd/bgp_main.c
*: manual SPDX License ID conversions
[mirror_frr.git] / bgpd / bgp_main.c
CommitLineData
718e3744 1/* Main routine of bgpd.
896014f4
DL
2 * Copyright (C) 1996, 97, 98, 1999 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19 */
718e3744 20
21#include <zebra.h>
22
03014d48 23#include <pthread.h>
718e3744 24#include "vector.h"
718e3744 25#include "command.h"
26#include "getopt.h"
27#include "thread.h"
5e4fa164 28#include <lib/version.h>
718e3744 29#include "memory.h"
30#include "prefix.h"
31#include "log.h"
edd7c245 32#include "privs.h"
2d75d052 33#include "sigevent.h"
228da428
CC
34#include "zclient.h"
35#include "routemap.h"
36#include "filter.h"
37#include "plist.h"
8196f13d 38#include "stream.h"
3f9c7369 39#include "queue.h"
6a69b354 40#include "vrf.h"
567b877d 41#include "bfd.h"
4f04a76b 42#include "libfrr.h"
61cf4b37 43#include "ns.h"
718e3744 44
45#include "bgpd/bgpd.h"
46#include "bgpd/bgp_attr.h"
b2f0fa55 47#include "bgpd/bgp_route.h"
718e3744 48#include "bgpd/bgp_mplsvpn.h"
228da428
CC
49#include "bgpd/bgp_aspath.h"
50#include "bgpd/bgp_dump.h"
51#include "bgpd/bgp_route.h"
52#include "bgpd/bgp_nexthop.h"
53#include "bgpd/bgp_regex.h"
54#include "bgpd/bgp_clist.h"
55#include "bgpd/bgp_debug.h"
14454c9f 56#include "bgpd/bgp_errors.h"
228da428 57#include "bgpd/bgp_filter.h"
8196f13d 58#include "bgpd/bgp_zebra.h"
d3ecc69e 59#include "bgpd/bgp_packet.h"
03014d48 60#include "bgpd/bgp_keepalives.h"
61cf4b37 61#include "bgpd/bgp_network.h"
def31c13 62#include "bgpd/bgp_errors.h"
b4becb06 63#include "bgpd/bgp_script.h"
45a859f1 64#include "bgpd/bgp_evpn_mh.h"
c589d847 65#include "bgpd/bgp_nht.h"
48cb7ea9 66#include "bgpd/bgp_routemap_nb.h"
ed0e57e3 67#include "bgpd/bgp_community_alias.h"
718e3744 68
65efcfce 69#ifdef ENABLE_BGP_VNC
f8b6f499 70#include "bgpd/rfapi/rfapi_backend.h"
65efcfce
LB
71#endif
72
718e3744 73/* bgpd options, we use GNU getopt library. */
d62a17ae 74static const struct option longopts[] = {
75 {"bgp_port", required_argument, NULL, 'p'},
76 {"listenon", required_argument, NULL, 'l'},
d62a17ae 77 {"no_kernel", no_argument, NULL, 'n'},
78 {"skip_runas", no_argument, NULL, 'S'},
79 {"ecmp", required_argument, NULL, 'e'},
f533be73 80 {"int_num", required_argument, NULL, 'I'},
c0064d2a 81 {"no_zebra", no_argument, NULL, 'Z'},
c2d020ad 82 {"socket_size", required_argument, NULL, 's'},
d62a17ae 83 {0}};
718e3744 84
2d75d052 85/* signal definitions */
d62a17ae 86void sighup(void);
87void sigint(void);
88void sigusr1(void);
2d75d052 89
d62a17ae 90static void bgp_exit(int);
91static void bgp_vrf_terminate(void);
228da428 92
7cc91e67 93static struct frr_signal_t bgp_signals[] = {
d62a17ae 94 {
95 .signal = SIGHUP,
96 .handler = &sighup,
97 },
98 {
99 .signal = SIGUSR1,
100 .handler = &sigusr1,
101 },
102 {
103 .signal = SIGINT,
104 .handler = &sigint,
105 },
106 {
107 .signal = SIGTERM,
108 .handler = &sigint,
109 },
2d75d052 110};
111
edd7c245 112/* privileges */
996c9314
LB
113static zebra_capabilities_t _caps_p[] = {ZCAP_BIND, ZCAP_NET_RAW,
114 ZCAP_NET_ADMIN, ZCAP_SYS_ADMIN};
edd7c245 115
d62a17ae 116struct zebra_privs_t bgpd_privs = {
b2f36157 117#if defined(FRR_USER) && defined(FRR_GROUP)
d62a17ae 118 .user = FRR_USER,
119 .group = FRR_GROUP,
d81fadfd 120#endif
121#ifdef VTY_GROUP
d62a17ae 122 .vty_group = VTY_GROUP,
edd7c245 123#endif
d62a17ae 124 .caps_p = _caps_p,
125 .cap_num_p = array_size(_caps_p),
126 .cap_num_i = 0,
edd7c245 127};
128
eb05883f
DL
129static struct frr_daemon_info bgpd_di;
130
718e3744 131/* SIGHUP handler. */
d62a17ae 132void sighup(void)
718e3744 133{
23ca3269
DS
134 zlog_info("SIGHUP received, ignoring");
135
136 return;
137
138 /*
139 * This is turned off for the moment. There is all
140 * sorts of config turned off by bgp_terminate
3130e286 141 * that is not setup properly again in bgp_reset.
23ca3269
DS
142 * I see no easy way to do this nor do I see that
143 * this is a desirable way to reload config
144 * given the yang work.
145 */
d62a17ae 146 /* Terminate all thread. */
3130e286
DS
147 /*
148 * bgp_terminate();
149 * bgp_reset();
150 * zlog_info("bgpd restarting!");
718e3744 151
3130e286
DS
152 * Reload config file.
153 * vty_read_config(NULL, bgpd_di.config_file, config_default);
154 */
d62a17ae 155 /* Try to return to normal operation. */
718e3744 156}
157
158/* SIGINT handler. */
d62a17ae 159__attribute__((__noreturn__)) void sigint(void)
718e3744 160{
d62a17ae 161 zlog_notice("Terminating on signal");
97b4a0ec
LB
162 assert(bm->terminating == false);
163 bm->terminating = true; /* global flag that shutting down */
718e3744 164
21bfce98
RZ
165 /* Disable BFD events to avoid wasting processing. */
166 bfd_protocol_integration_set_shutdown(true);
167
c8dde10f 168 bgp_terminate();
718e3744 169
d62a17ae 170 bgp_exit(0);
540766e7 171
d62a17ae 172 exit(0);
718e3744 173}
174
175/* SIGUSR1 handler. */
d62a17ae 176void sigusr1(void)
718e3744 177{
d62a17ae 178 zlog_rotate();
718e3744 179}
228da428
CC
180
181/*
182 Try to free up allocations we know about so that diagnostic tools such as
183 valgrind are able to better illuminate leaks.
184
185 Zebra route removal and protocol teardown are not meant to be done here.
186 For example, "retain_mode" may be set.
187*/
d62a17ae 188static __attribute__((__noreturn__)) void bgp_exit(int status)
228da428 189{
e2f3a930 190 struct bgp *bgp, *bgp_default, *bgp_evpn;
d62a17ae 191 struct listnode *node, *nnode;
228da428 192
d62a17ae 193 /* it only makes sense for this to be called on a clean exit */
194 assert(status == 0);
228da428 195
03951374
DL
196 frr_early_fini();
197
d62a17ae 198 bgp_close();
1ff9a340 199
0e42e319 200 bgp_default = bgp_get_default();
e2f3a930 201 bgp_evpn = bgp_get_evpn();
0e42e319 202
d62a17ae 203 /* reverse bgp_master_init */
0e42e319 204 for (ALL_LIST_ELEMENTS(bm->bgp, node, nnode, bgp)) {
e2f3a930 205 if (bgp_default == bgp || bgp_evpn == bgp)
0e42e319 206 continue;
d62a17ae 207 bgp_delete(bgp);
0e42e319 208 }
e2f3a930
T
209 if (bgp_evpn && bgp_evpn != bgp_default)
210 bgp_delete(bgp_evpn);
1f4b2cce
DS
211 if (bgp_default)
212 bgp_delete(bgp_default);
46abd3e3 213
45a859f1 214 bgp_evpn_mh_finish();
c589d847 215 bgp_l3nhg_finish();
45a859f1 216
d62a17ae 217 /* reverse bgp_dump_init */
218 bgp_dump_finish();
ed0e57e3
DA
219
220 /* BGP community aliases */
221 bgp_community_alias_finish();
228da428 222
d62a17ae 223 /* reverse bgp_route_init */
224 bgp_route_finish();
228da428 225
d62a17ae 226 /* cleanup route maps */
227 bgp_route_map_terminate();
228da428 228
d62a17ae 229 /* reverse bgp_attr_init */
230 bgp_attr_finish();
7b8def58 231
2d4ee774
QY
232 /* stop pthreads */
233 bgp_pthreads_finish();
234
d62a17ae 235 /* reverse access_list_init */
236 access_list_add_hook(NULL);
237 access_list_delete_hook(NULL);
238 access_list_reset();
228da428 239
d62a17ae 240 /* reverse bgp_filter_init */
241 as_list_add_hook(NULL);
242 as_list_delete_hook(NULL);
243 bgp_filter_reset();
228da428 244
d62a17ae 245 /* reverse prefix_list_init */
246 prefix_list_add_hook(NULL);
247 prefix_list_delete_hook(NULL);
248 prefix_list_reset();
228da428 249
d62a17ae 250 /* reverse community_list_init */
251 community_list_terminate(bgp_clist);
228da428 252
d62a17ae 253 bgp_vrf_terminate();
49e5a4a0 254#ifdef ENABLE_BGP_VNC
d62a17ae 255 vnc_zebra_destroy();
65efcfce 256#endif
d62a17ae 257 bgp_zebra_destroy();
228da428 258
3d57c994 259 bf_free(bm->rd_idspace);
6a154c88 260 list_delete(&bm->bgp);
85e9cd9a 261 list_delete(&bm->addresses);
0768f289
PG
262
263 bgp_lp_finish();
264
d62a17ae 265 memset(bm, 0, sizeof(*bm));
46857efe 266
03951374 267 frr_fini();
d62a17ae 268 exit(status);
228da428 269}
6b0655a2 270
d62a17ae 271static int bgp_vrf_new(struct vrf *vrf)
2fcc254e 272{
d62a17ae 273 if (BGP_DEBUG(zebra, ZEBRA))
a8bf7d9c 274 zlog_debug("VRF Created: %s(%u)", vrf->name, vrf->vrf_id);
2fcc254e 275
d62a17ae 276 return 0;
2fcc254e
DS
277}
278
d62a17ae 279static int bgp_vrf_delete(struct vrf *vrf)
2fcc254e 280{
d62a17ae 281 if (BGP_DEBUG(zebra, ZEBRA))
a8bf7d9c 282 zlog_debug("VRF Deletion: %s(%u)", vrf->name, vrf->vrf_id);
2fcc254e 283
d62a17ae 284 return 0;
2fcc254e
DS
285}
286
d62a17ae 287static int bgp_vrf_enable(struct vrf *vrf)
2fcc254e 288{
d62a17ae 289 struct bgp *bgp;
290 vrf_id_t old_vrf_id;
291
292 if (BGP_DEBUG(zebra, ZEBRA))
a8bf7d9c 293 zlog_debug("VRF enable add %s id %u", vrf->name, vrf->vrf_id);
d62a17ae 294
295 bgp = bgp_lookup_by_name(vrf->name);
d5f31d5f 296 if (bgp && bgp->vrf_id != vrf->vrf_id) {
d62a17ae 297 old_vrf_id = bgp->vrf_id;
298 /* We have instance configured, link to VRF and make it "up". */
299 bgp_vrf_link(bgp, vrf);
300
e5619c28 301 bgp_handle_socket(bgp, vrf, old_vrf_id, true);
d62a17ae 302 bgp_instance_up(bgp);
ddb5b488
PZ
303 vpn_leak_zebra_vrf_label_update(bgp, AFI_IP);
304 vpn_leak_zebra_vrf_label_update(bgp, AFI_IP6);
b72c9e14
HS
305 vpn_leak_zebra_vrf_sid_update(bgp, AFI_IP);
306 vpn_leak_zebra_vrf_sid_update(bgp, AFI_IP6);
e504cf3b
DS
307 vpn_leak_postchange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP,
308 bgp_get_default(), bgp);
309 vpn_leak_postchange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP,
310 bgp_get_default(), bgp);
311 vpn_leak_postchange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP6,
312 bgp_get_default(), bgp);
313 vpn_leak_postchange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP6,
314 bgp_get_default(), bgp);
d62a17ae 315 }
316
317 return 0;
2fcc254e
DS
318}
319
d62a17ae 320static int bgp_vrf_disable(struct vrf *vrf)
2fcc254e 321{
d62a17ae 322 struct bgp *bgp;
d62a17ae 323
324 if (vrf->vrf_id == VRF_DEFAULT)
325 return 0;
326
327 if (BGP_DEBUG(zebra, ZEBRA))
328 zlog_debug("VRF disable %s id %d", vrf->name, vrf->vrf_id);
329
330 bgp = bgp_lookup_by_name(vrf->name);
331 if (bgp) {
ddb5b488
PZ
332
333 vpn_leak_zebra_vrf_label_withdraw(bgp, AFI_IP);
334 vpn_leak_zebra_vrf_label_withdraw(bgp, AFI_IP6);
e504cf3b
DS
335 vpn_leak_prechange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP,
336 bgp_get_default(), bgp);
337 vpn_leak_prechange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP,
338 bgp_get_default(), bgp);
339 vpn_leak_prechange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP6,
340 bgp_get_default(), bgp);
341 vpn_leak_prechange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP6,
342 bgp_get_default(), bgp);
ddb5b488 343
e5619c28 344 bgp_handle_socket(bgp, vrf, VRF_UNKNOWN, false);
d62a17ae 345 /* We have instance configured, unlink from VRF and make it
346 * "down". */
d62a17ae 347 bgp_instance_down(bgp);
6cc0114b 348 bgp_vrf_unlink(bgp, vrf);
d62a17ae 349 }
350
351 /* Note: This is a callback, the VRF will be deleted by the caller. */
352 return 0;
2fcc254e
DS
353}
354
d62a17ae 355static void bgp_vrf_init(void)
2fcc254e 356{
ac2cb9bf 357 vrf_init(bgp_vrf_new, bgp_vrf_enable, bgp_vrf_disable, bgp_vrf_delete);
2fcc254e
DS
358}
359
d62a17ae 360static void bgp_vrf_terminate(void)
021530c1 361{
d62a17ae 362 vrf_terminate();
021530c1 363}
364
0d8c7a26 365static const struct frr_yang_module_info *const bgpd_yang_modules[] = {
c2aab693 366 &frr_filter_info,
91835f1f
RZ
367 &frr_interface_info,
368 &frr_route_map_info,
6fd8972a 369 &frr_vrf_info,
48cb7ea9 370 &frr_bgp_route_map_info,
8fcdd0d6
RW
371};
372
d62a17ae 373FRR_DAEMON_INFO(bgpd, BGP, .vty_port = BGP_VTY_PORT,
4f04a76b 374
d62a17ae 375 .proghelp = "Implementation of the BGP routing protocol.",
4f04a76b 376
d62a17ae 377 .signals = bgp_signals, .n_signals = array_size(bgp_signals),
4f04a76b 378
8fcdd0d6 379 .privs = &bgpd_privs, .yang_modules = bgpd_yang_modules,
80413c20
DL
380 .n_yang_modules = array_size(bgpd_yang_modules),
381);
4f04a76b 382
f28963f7 383#define DEPRECATED_OPTIONS ""
c8dde10f 384
718e3744 385/* Main routine of bgpd. Treatment of argument and start bgp finite
386 state machine is handled at here. */
d62a17ae 387int main(int argc, char **argv)
718e3744 388{
d62a17ae 389 int opt;
390 int tmp_port;
391
392 int bgp_port = BGP_PORT_DEFAULT;
85e9cd9a 393 struct list *addresses = list_new();
d62a17ae 394 int no_fib_flag = 0;
0b014ea6 395 int no_zebra_flag = 0;
d62a17ae 396 int skip_runas = 0;
f533be73 397 int instance = 0;
c2d020ad 398 int buffer_size = BGP_SOCKET_SNDBUF_SIZE;
85e9cd9a
AMR
399 char *address;
400 struct listnode *node;
401
402 addresses->cmp = (int (*)(void *, void *))strcmp;
d62a17ae 403
404 frr_preinit(&bgpd_di, argc, argv);
405 frr_opt_add(
c2d020ad 406 "p:l:SnZe:I:s:" DEPRECATED_OPTIONS, longopts,
580f8636 407 " -p, --bgp_port Set BGP listen port number (0 means do not listen).\n"
d62a17ae 408 " -l, --listenon Listen on specified address (implies -n)\n"
d62a17ae 409 " -n, --no_kernel Do not install route to kernel.\n"
0b014ea6 410 " -Z, --no_zebra Do not communicate with Zebra.\n"
d62a17ae 411 " -S, --skip_runas Skip capabilities checks, and changing user and group IDs.\n"
f533be73 412 " -e, --ecmp Specify ECMP to use.\n"
c2d020ad
DS
413 " -I, --int_num Set instance number (label-manager)\n"
414 " -s, --socket_size Set BGP peer socket send buffer size\n");
d62a17ae 415
416 /* Command line argument treatment. */
417 while (1) {
418 opt = frr_getopt(argc, argv, 0);
419
c8dde10f
QY
420 if (opt && opt < 128 && strchr(DEPRECATED_OPTIONS, opt)) {
421 fprintf(stderr,
422 "The -%c option no longer exists.\nPlease refer to the manual.\n",
423 opt);
424 continue;
425 }
426
d62a17ae 427 if (opt == EOF)
428 break;
429
430 switch (opt) {
431 case 0:
432 break;
433 case 'p':
434 tmp_port = atoi(optarg);
580f8636 435 if (tmp_port < 0 || tmp_port > 0xffff)
d62a17ae 436 bgp_port = BGP_PORT_DEFAULT;
437 else
438 bgp_port = tmp_port;
439 break;
1e03d6bc
QY
440 case 'e': {
441 unsigned long int parsed_multipath =
442 strtoul(optarg, NULL, 10);
443 if (parsed_multipath == 0
444 || parsed_multipath > MULTIPATH_NUM
445 || parsed_multipath > UINT_MAX) {
af4c2728 446 flog_err(
e50f7cfd 447 EC_BGP_MULTIPATH,
1e03d6bc 448 "Multipath Number specified must be less than %u and greater than 0",
d62a17ae 449 MULTIPATH_NUM);
450 return 1;
451 }
1e03d6bc 452 multipath_num = parsed_multipath;
d62a17ae 453 break;
1e03d6bc 454 }
d62a17ae 455 case 'l':
85e9cd9a 456 listnode_add_sort_nodup(addresses, optarg);
6595c229 457 break;
d62a17ae 458 case 'n':
459 no_fib_flag = 1;
460 break;
0b014ea6
PG
461 case 'Z':
462 no_zebra_flag = 1;
463 break;
d62a17ae 464 case 'S':
465 skip_runas = 1;
466 break;
f533be73 467 case 'I':
468 instance = atoi(optarg);
469 if (instance > (unsigned short)-1)
470 zlog_err("Instance %i out of range (0..%u)",
471 instance, (unsigned short)-1);
472 break;
c2d020ad
DS
473 case 's':
474 buffer_size = atoi(optarg);
475 break;
d62a17ae 476 default:
477 frr_help_exit(1);
d62a17ae 478 }
718e3744 479 }
d62a17ae 480 if (skip_runas)
481 memset(&bgpd_privs, 0, sizeof(bgpd_privs));
718e3744 482
d62a17ae 483 /* BGP master init. */
85e9cd9a 484 bgp_master_init(frr_init(), buffer_size, addresses);
d62a17ae 485 bm->port = bgp_port;
580f8636 486 if (bgp_port == 0)
487 bgp_option_set(BGP_OPT_NO_LISTEN);
0b014ea6 488 if (no_fib_flag || no_zebra_flag)
d62a17ae 489 bgp_option_set(BGP_OPT_NO_FIB);
0b014ea6
PG
490 if (no_zebra_flag)
491 bgp_option_set(BGP_OPT_NO_ZEBRA);
def31c13 492 bgp_error_init();
d62a17ae 493 /* Initializations. */
494 bgp_vrf_init();
718e3744 495
fa22080d 496#ifdef HAVE_SCRIPTING
b4becb06 497 bgp_script_init();
fa22080d 498#endif
b4becb06 499
d62a17ae 500 /* BGP related initialization. */
f533be73 501 bgp_init((unsigned short)instance);
718e3744 502
85e9cd9a
AMR
503 if (list_isempty(bm->addresses)) {
504 snprintf(bgpd_di.startinfo, sizeof(bgpd_di.startinfo),
505 ", bgp@<all>:%d", bm->port);
506 } else {
507 for (ALL_LIST_ELEMENTS_RO(bm->addresses, node, address))
508 snprintf(bgpd_di.startinfo + strlen(bgpd_di.startinfo),
509 sizeof(bgpd_di.startinfo)
510 - strlen(bgpd_di.startinfo),
511 ", bgp@%s:%d", address, bm->port);
512 }
718e3744 513
4cd690ae
PG
514 bgp_if_init();
515
d62a17ae 516 frr_config_fork();
2d4ee774 517 /* must be called after fork() */
034e185d 518 bgp_gr_apply_running_config();
419dfe6a 519 bgp_pthreads_run();
d62a17ae 520 frr_run(bm->master);
718e3744 521
d62a17ae 522 /* Not reached. */
95f7965d 523 return 0;
718e3744 524}