]>
Commit | Line | Data |
---|---|---|
718e3744 | 1 | /* Main routine of bgpd. |
896014f4 DL |
2 | * Copyright (C) 1996, 97, 98, 1999 Kunihiro Ishiguro |
3 | * | |
4 | * This file is part of GNU Zebra. | |
5 | * | |
6 | * GNU Zebra is free software; you can redistribute it and/or modify it | |
7 | * under the terms of the GNU General Public License as published by the | |
8 | * Free Software Foundation; either version 2, or (at your option) any | |
9 | * later version. | |
10 | * | |
11 | * GNU Zebra is distributed in the hope that it will be useful, but | |
12 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
14 | * General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License along | |
17 | * with this program; see the file COPYING; if not, write to the Free Software | |
18 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
19 | */ | |
718e3744 | 20 | |
21 | #include <zebra.h> | |
22 | ||
03014d48 | 23 | #include <pthread.h> |
718e3744 | 24 | #include "vector.h" |
718e3744 | 25 | #include "command.h" |
26 | #include "getopt.h" | |
27 | #include "thread.h" | |
5e4fa164 | 28 | #include <lib/version.h> |
718e3744 | 29 | #include "memory.h" |
30 | #include "prefix.h" | |
31 | #include "log.h" | |
edd7c245 | 32 | #include "privs.h" |
2d75d052 | 33 | #include "sigevent.h" |
228da428 CC |
34 | #include "zclient.h" |
35 | #include "routemap.h" | |
36 | #include "filter.h" | |
37 | #include "plist.h" | |
8196f13d | 38 | #include "stream.h" |
3f9c7369 | 39 | #include "queue.h" |
6a69b354 | 40 | #include "vrf.h" |
567b877d | 41 | #include "bfd.h" |
4f04a76b | 42 | #include "libfrr.h" |
61cf4b37 | 43 | #include "ns.h" |
718e3744 | 44 | |
45 | #include "bgpd/bgpd.h" | |
46 | #include "bgpd/bgp_attr.h" | |
b2f0fa55 | 47 | #include "bgpd/bgp_route.h" |
718e3744 | 48 | #include "bgpd/bgp_mplsvpn.h" |
228da428 CC |
49 | #include "bgpd/bgp_aspath.h" |
50 | #include "bgpd/bgp_dump.h" | |
51 | #include "bgpd/bgp_route.h" | |
52 | #include "bgpd/bgp_nexthop.h" | |
53 | #include "bgpd/bgp_regex.h" | |
54 | #include "bgpd/bgp_clist.h" | |
55 | #include "bgpd/bgp_debug.h" | |
14454c9f | 56 | #include "bgpd/bgp_errors.h" |
228da428 | 57 | #include "bgpd/bgp_filter.h" |
8196f13d | 58 | #include "bgpd/bgp_zebra.h" |
d3ecc69e | 59 | #include "bgpd/bgp_packet.h" |
03014d48 | 60 | #include "bgpd/bgp_keepalives.h" |
61cf4b37 | 61 | #include "bgpd/bgp_network.h" |
def31c13 | 62 | #include "bgpd/bgp_errors.h" |
718e3744 | 63 | |
65efcfce | 64 | #ifdef ENABLE_BGP_VNC |
f8b6f499 | 65 | #include "bgpd/rfapi/rfapi_backend.h" |
65efcfce LB |
66 | #endif |
67 | ||
718e3744 | 68 | /* bgpd options, we use GNU getopt library. */ |
d62a17ae | 69 | static const struct option longopts[] = { |
70 | {"bgp_port", required_argument, NULL, 'p'}, | |
71 | {"listenon", required_argument, NULL, 'l'}, | |
d62a17ae | 72 | {"no_kernel", no_argument, NULL, 'n'}, |
73 | {"skip_runas", no_argument, NULL, 'S'}, | |
74 | {"ecmp", required_argument, NULL, 'e'}, | |
f533be73 | 75 | {"int_num", required_argument, NULL, 'I'}, |
c0064d2a | 76 | {"no_zebra", no_argument, NULL, 'Z'}, |
c2d020ad | 77 | {"socket_size", required_argument, NULL, 's'}, |
d62a17ae | 78 | {0}}; |
718e3744 | 79 | |
2d75d052 | 80 | /* signal definitions */ |
d62a17ae | 81 | void sighup(void); |
82 | void sigint(void); | |
83 | void sigusr1(void); | |
2d75d052 | 84 | |
d62a17ae | 85 | static void bgp_exit(int); |
86 | static void bgp_vrf_terminate(void); | |
228da428 | 87 | |
d62a17ae | 88 | static struct quagga_signal_t bgp_signals[] = { |
89 | { | |
90 | .signal = SIGHUP, | |
91 | .handler = &sighup, | |
92 | }, | |
93 | { | |
94 | .signal = SIGUSR1, | |
95 | .handler = &sigusr1, | |
96 | }, | |
97 | { | |
98 | .signal = SIGINT, | |
99 | .handler = &sigint, | |
100 | }, | |
101 | { | |
102 | .signal = SIGTERM, | |
103 | .handler = &sigint, | |
104 | }, | |
2d75d052 | 105 | }; |
106 | ||
edd7c245 | 107 | /* privileges */ |
996c9314 LB |
108 | static zebra_capabilities_t _caps_p[] = {ZCAP_BIND, ZCAP_NET_RAW, |
109 | ZCAP_NET_ADMIN, ZCAP_SYS_ADMIN}; | |
edd7c245 | 110 | |
d62a17ae | 111 | struct zebra_privs_t bgpd_privs = { |
b2f36157 | 112 | #if defined(FRR_USER) && defined(FRR_GROUP) |
d62a17ae | 113 | .user = FRR_USER, |
114 | .group = FRR_GROUP, | |
d81fadfd | 115 | #endif |
116 | #ifdef VTY_GROUP | |
d62a17ae | 117 | .vty_group = VTY_GROUP, |
edd7c245 | 118 | #endif |
d62a17ae | 119 | .caps_p = _caps_p, |
120 | .cap_num_p = array_size(_caps_p), | |
121 | .cap_num_i = 0, | |
edd7c245 | 122 | }; |
123 | ||
eb05883f DL |
124 | static struct frr_daemon_info bgpd_di; |
125 | ||
718e3744 | 126 | /* SIGHUP handler. */ |
d62a17ae | 127 | void sighup(void) |
718e3744 | 128 | { |
d62a17ae | 129 | zlog_info("SIGHUP received"); |
718e3744 | 130 | |
d62a17ae | 131 | /* Terminate all thread. */ |
132 | bgp_terminate(); | |
133 | bgp_reset(); | |
134 | zlog_info("bgpd restarting!"); | |
718e3744 | 135 | |
d62a17ae | 136 | /* Reload config file. */ |
1c2facd1 | 137 | vty_read_config(NULL, bgpd_di.config_file, config_default); |
718e3744 | 138 | |
d62a17ae | 139 | /* Try to return to normal operation. */ |
718e3744 | 140 | } |
141 | ||
142 | /* SIGINT handler. */ | |
d62a17ae | 143 | __attribute__((__noreturn__)) void sigint(void) |
718e3744 | 144 | { |
d62a17ae | 145 | zlog_notice("Terminating on signal"); |
97b4a0ec LB |
146 | assert(bm->terminating == false); |
147 | bm->terminating = true; /* global flag that shutting down */ | |
718e3744 | 148 | |
c8dde10f | 149 | bgp_terminate(); |
718e3744 | 150 | |
d62a17ae | 151 | bgp_exit(0); |
540766e7 | 152 | |
d62a17ae | 153 | exit(0); |
718e3744 | 154 | } |
155 | ||
156 | /* SIGUSR1 handler. */ | |
d62a17ae | 157 | void sigusr1(void) |
718e3744 | 158 | { |
d62a17ae | 159 | zlog_rotate(); |
718e3744 | 160 | } |
228da428 CC |
161 | |
162 | /* | |
163 | Try to free up allocations we know about so that diagnostic tools such as | |
164 | valgrind are able to better illuminate leaks. | |
165 | ||
166 | Zebra route removal and protocol teardown are not meant to be done here. | |
167 | For example, "retain_mode" may be set. | |
168 | */ | |
d62a17ae | 169 | static __attribute__((__noreturn__)) void bgp_exit(int status) |
228da428 | 170 | { |
e2f3a930 | 171 | struct bgp *bgp, *bgp_default, *bgp_evpn; |
d62a17ae | 172 | struct listnode *node, *nnode; |
228da428 | 173 | |
d62a17ae | 174 | /* it only makes sense for this to be called on a clean exit */ |
175 | assert(status == 0); | |
228da428 | 176 | |
03951374 DL |
177 | frr_early_fini(); |
178 | ||
d62a17ae | 179 | bfd_gbl_exit(); |
567b877d | 180 | |
d62a17ae | 181 | bgp_close(); |
1ff9a340 | 182 | |
0e42e319 | 183 | bgp_default = bgp_get_default(); |
e2f3a930 | 184 | bgp_evpn = bgp_get_evpn(); |
0e42e319 | 185 | |
d62a17ae | 186 | /* reverse bgp_master_init */ |
0e42e319 | 187 | for (ALL_LIST_ELEMENTS(bm->bgp, node, nnode, bgp)) { |
e2f3a930 | 188 | if (bgp_default == bgp || bgp_evpn == bgp) |
0e42e319 | 189 | continue; |
d62a17ae | 190 | bgp_delete(bgp); |
0e42e319 | 191 | } |
e2f3a930 T |
192 | if (bgp_evpn && bgp_evpn != bgp_default) |
193 | bgp_delete(bgp_evpn); | |
1f4b2cce DS |
194 | if (bgp_default) |
195 | bgp_delete(bgp_default); | |
46abd3e3 | 196 | |
d62a17ae | 197 | /* reverse bgp_dump_init */ |
198 | bgp_dump_finish(); | |
228da428 | 199 | |
d62a17ae | 200 | /* reverse bgp_route_init */ |
201 | bgp_route_finish(); | |
228da428 | 202 | |
d62a17ae | 203 | /* cleanup route maps */ |
204 | bgp_route_map_terminate(); | |
228da428 | 205 | |
d62a17ae | 206 | /* reverse bgp_attr_init */ |
207 | bgp_attr_finish(); | |
7b8def58 | 208 | |
2d4ee774 QY |
209 | /* stop pthreads */ |
210 | bgp_pthreads_finish(); | |
211 | ||
d62a17ae | 212 | /* reverse access_list_init */ |
213 | access_list_add_hook(NULL); | |
214 | access_list_delete_hook(NULL); | |
215 | access_list_reset(); | |
228da428 | 216 | |
d62a17ae | 217 | /* reverse bgp_filter_init */ |
218 | as_list_add_hook(NULL); | |
219 | as_list_delete_hook(NULL); | |
220 | bgp_filter_reset(); | |
228da428 | 221 | |
d62a17ae | 222 | /* reverse prefix_list_init */ |
223 | prefix_list_add_hook(NULL); | |
224 | prefix_list_delete_hook(NULL); | |
225 | prefix_list_reset(); | |
228da428 | 226 | |
d62a17ae | 227 | /* reverse community_list_init */ |
228 | community_list_terminate(bgp_clist); | |
228da428 | 229 | |
d62a17ae | 230 | bgp_vrf_terminate(); |
65efcfce | 231 | #if ENABLE_BGP_VNC |
d62a17ae | 232 | vnc_zebra_destroy(); |
65efcfce | 233 | #endif |
d62a17ae | 234 | bgp_zebra_destroy(); |
228da428 | 235 | |
3d57c994 | 236 | bf_free(bm->rd_idspace); |
6a154c88 | 237 | list_delete(&bm->bgp); |
0768f289 PG |
238 | |
239 | bgp_lp_finish(); | |
240 | ||
d62a17ae | 241 | memset(bm, 0, sizeof(*bm)); |
46857efe | 242 | |
03951374 | 243 | frr_fini(); |
d62a17ae | 244 | exit(status); |
228da428 | 245 | } |
6b0655a2 | 246 | |
d62a17ae | 247 | static int bgp_vrf_new(struct vrf *vrf) |
2fcc254e | 248 | { |
d62a17ae | 249 | if (BGP_DEBUG(zebra, ZEBRA)) |
a8bf7d9c | 250 | zlog_debug("VRF Created: %s(%u)", vrf->name, vrf->vrf_id); |
2fcc254e | 251 | |
d62a17ae | 252 | return 0; |
2fcc254e DS |
253 | } |
254 | ||
d62a17ae | 255 | static int bgp_vrf_delete(struct vrf *vrf) |
2fcc254e | 256 | { |
d62a17ae | 257 | if (BGP_DEBUG(zebra, ZEBRA)) |
a8bf7d9c | 258 | zlog_debug("VRF Deletion: %s(%u)", vrf->name, vrf->vrf_id); |
2fcc254e | 259 | |
d62a17ae | 260 | return 0; |
2fcc254e DS |
261 | } |
262 | ||
d62a17ae | 263 | static int bgp_vrf_enable(struct vrf *vrf) |
2fcc254e | 264 | { |
d62a17ae | 265 | struct bgp *bgp; |
266 | vrf_id_t old_vrf_id; | |
267 | ||
268 | if (BGP_DEBUG(zebra, ZEBRA)) | |
a8bf7d9c | 269 | zlog_debug("VRF enable add %s id %u", vrf->name, vrf->vrf_id); |
d62a17ae | 270 | |
271 | bgp = bgp_lookup_by_name(vrf->name); | |
d5f31d5f | 272 | if (bgp && bgp->vrf_id != vrf->vrf_id) { |
9a8bdf1c PG |
273 | if (bgp->name && strmatch(vrf->name, VRF_DEFAULT_NAME)) { |
274 | XFREE(MTYPE_BGP, bgp->name); | |
275 | bgp->name = NULL; | |
276 | XFREE(MTYPE_BGP, bgp->name_pretty); | |
277 | bgp->name_pretty = XSTRDUP(MTYPE_BGP, "VRF default"); | |
d5f31d5f PG |
278 | bgp->inst_type = BGP_INSTANCE_TYPE_DEFAULT; |
279 | #if ENABLE_BGP_VNC | |
280 | if (!bgp->rfapi) { | |
281 | bgp->rfapi = bgp_rfapi_new(bgp); | |
282 | assert(bgp->rfapi); | |
283 | assert(bgp->rfapi_cfg); | |
284 | } | |
285 | #endif /* ENABLE_BGP_VNC */ | |
9a8bdf1c | 286 | } |
d62a17ae | 287 | old_vrf_id = bgp->vrf_id; |
288 | /* We have instance configured, link to VRF and make it "up". */ | |
289 | bgp_vrf_link(bgp, vrf); | |
290 | ||
e5619c28 | 291 | bgp_handle_socket(bgp, vrf, old_vrf_id, true); |
401d56cc | 292 | /* Update any redistribution if vrf_id changed */ |
d62a17ae | 293 | if (old_vrf_id != bgp->vrf_id) |
401d56cc | 294 | bgp_redistribute_redo(bgp); |
d62a17ae | 295 | bgp_instance_up(bgp); |
ddb5b488 PZ |
296 | vpn_leak_zebra_vrf_label_update(bgp, AFI_IP); |
297 | vpn_leak_zebra_vrf_label_update(bgp, AFI_IP6); | |
e504cf3b DS |
298 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP, |
299 | bgp_get_default(), bgp); | |
300 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP, | |
301 | bgp_get_default(), bgp); | |
302 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP6, | |
303 | bgp_get_default(), bgp); | |
304 | vpn_leak_postchange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP6, | |
305 | bgp_get_default(), bgp); | |
d62a17ae | 306 | } |
307 | ||
308 | return 0; | |
2fcc254e DS |
309 | } |
310 | ||
d62a17ae | 311 | static int bgp_vrf_disable(struct vrf *vrf) |
2fcc254e | 312 | { |
d62a17ae | 313 | struct bgp *bgp; |
314 | vrf_id_t old_vrf_id; | |
315 | ||
316 | if (vrf->vrf_id == VRF_DEFAULT) | |
317 | return 0; | |
318 | ||
319 | if (BGP_DEBUG(zebra, ZEBRA)) | |
320 | zlog_debug("VRF disable %s id %d", vrf->name, vrf->vrf_id); | |
321 | ||
322 | bgp = bgp_lookup_by_name(vrf->name); | |
323 | if (bgp) { | |
ddb5b488 PZ |
324 | |
325 | vpn_leak_zebra_vrf_label_withdraw(bgp, AFI_IP); | |
326 | vpn_leak_zebra_vrf_label_withdraw(bgp, AFI_IP6); | |
e504cf3b DS |
327 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP, |
328 | bgp_get_default(), bgp); | |
329 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP, | |
330 | bgp_get_default(), bgp); | |
331 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_TOVPN, AFI_IP6, | |
332 | bgp_get_default(), bgp); | |
333 | vpn_leak_prechange(BGP_VPN_POLICY_DIR_FROMVPN, AFI_IP6, | |
334 | bgp_get_default(), bgp); | |
ddb5b488 | 335 | |
d62a17ae | 336 | old_vrf_id = bgp->vrf_id; |
e5619c28 | 337 | bgp_handle_socket(bgp, vrf, VRF_UNKNOWN, false); |
d62a17ae | 338 | /* We have instance configured, unlink from VRF and make it |
339 | * "down". */ | |
340 | bgp_vrf_unlink(bgp, vrf); | |
401d56cc | 341 | /* Delete any redistribute vrf bitmaps if the vrf_id changed */ |
d62a17ae | 342 | if (old_vrf_id != bgp->vrf_id) |
401d56cc | 343 | bgp_unset_redist_vrf_bitmaps(bgp, old_vrf_id); |
d62a17ae | 344 | bgp_instance_down(bgp); |
345 | } | |
346 | ||
347 | /* Note: This is a callback, the VRF will be deleted by the caller. */ | |
348 | return 0; | |
2fcc254e DS |
349 | } |
350 | ||
d62a17ae | 351 | static void bgp_vrf_init(void) |
2fcc254e | 352 | { |
ecbc5a37 | 353 | vrf_init(bgp_vrf_new, bgp_vrf_enable, bgp_vrf_disable, |
d5f31d5f | 354 | bgp_vrf_delete, bgp_vrf_enable); |
2fcc254e DS |
355 | } |
356 | ||
d62a17ae | 357 | static void bgp_vrf_terminate(void) |
021530c1 | 358 | { |
d62a17ae | 359 | vrf_terminate(); |
021530c1 | 360 | } |
361 | ||
0d8c7a26 | 362 | static const struct frr_yang_module_info *const bgpd_yang_modules[] = { |
91835f1f RZ |
363 | &frr_interface_info, |
364 | &frr_route_map_info, | |
8fcdd0d6 RW |
365 | }; |
366 | ||
d62a17ae | 367 | FRR_DAEMON_INFO(bgpd, BGP, .vty_port = BGP_VTY_PORT, |
4f04a76b | 368 | |
d62a17ae | 369 | .proghelp = "Implementation of the BGP routing protocol.", |
4f04a76b | 370 | |
d62a17ae | 371 | .signals = bgp_signals, .n_signals = array_size(bgp_signals), |
4f04a76b | 372 | |
8fcdd0d6 RW |
373 | .privs = &bgpd_privs, .yang_modules = bgpd_yang_modules, |
374 | .n_yang_modules = array_size(bgpd_yang_modules), ) | |
4f04a76b | 375 | |
f28963f7 | 376 | #define DEPRECATED_OPTIONS "" |
c8dde10f | 377 | |
718e3744 | 378 | /* Main routine of bgpd. Treatment of argument and start bgp finite |
379 | state machine is handled at here. */ | |
d62a17ae | 380 | int main(int argc, char **argv) |
718e3744 | 381 | { |
d62a17ae | 382 | int opt; |
383 | int tmp_port; | |
384 | ||
385 | int bgp_port = BGP_PORT_DEFAULT; | |
386 | char *bgp_address = NULL; | |
387 | int no_fib_flag = 0; | |
0b014ea6 | 388 | int no_zebra_flag = 0; |
d62a17ae | 389 | int skip_runas = 0; |
f533be73 | 390 | int instance = 0; |
c2d020ad | 391 | int buffer_size = BGP_SOCKET_SNDBUF_SIZE; |
d62a17ae | 392 | |
393 | frr_preinit(&bgpd_di, argc, argv); | |
394 | frr_opt_add( | |
c2d020ad | 395 | "p:l:SnZe:I:s:" DEPRECATED_OPTIONS, longopts, |
580f8636 | 396 | " -p, --bgp_port Set BGP listen port number (0 means do not listen).\n" |
d62a17ae | 397 | " -l, --listenon Listen on specified address (implies -n)\n" |
d62a17ae | 398 | " -n, --no_kernel Do not install route to kernel.\n" |
0b014ea6 | 399 | " -Z, --no_zebra Do not communicate with Zebra.\n" |
d62a17ae | 400 | " -S, --skip_runas Skip capabilities checks, and changing user and group IDs.\n" |
f533be73 | 401 | " -e, --ecmp Specify ECMP to use.\n" |
c2d020ad DS |
402 | " -I, --int_num Set instance number (label-manager)\n" |
403 | " -s, --socket_size Set BGP peer socket send buffer size\n"); | |
d62a17ae | 404 | |
405 | /* Command line argument treatment. */ | |
406 | while (1) { | |
407 | opt = frr_getopt(argc, argv, 0); | |
408 | ||
c8dde10f QY |
409 | if (opt && opt < 128 && strchr(DEPRECATED_OPTIONS, opt)) { |
410 | fprintf(stderr, | |
411 | "The -%c option no longer exists.\nPlease refer to the manual.\n", | |
412 | opt); | |
413 | continue; | |
414 | } | |
415 | ||
d62a17ae | 416 | if (opt == EOF) |
417 | break; | |
418 | ||
419 | switch (opt) { | |
420 | case 0: | |
421 | break; | |
422 | case 'p': | |
423 | tmp_port = atoi(optarg); | |
580f8636 | 424 | if (tmp_port < 0 || tmp_port > 0xffff) |
d62a17ae | 425 | bgp_port = BGP_PORT_DEFAULT; |
426 | else | |
427 | bgp_port = tmp_port; | |
428 | break; | |
429 | case 'e': | |
430 | multipath_num = atoi(optarg); | |
431 | if (multipath_num > MULTIPATH_NUM | |
432 | || multipath_num <= 0) { | |
af4c2728 | 433 | flog_err( |
e50f7cfd | 434 | EC_BGP_MULTIPATH, |
d62a17ae | 435 | "Multipath Number specified must be less than %d and greater than 0", |
436 | MULTIPATH_NUM); | |
437 | return 1; | |
438 | } | |
439 | break; | |
d62a17ae | 440 | case 'l': |
441 | bgp_address = optarg; | |
442 | /* listenon implies -n */ | |
443 | /* fallthru */ | |
444 | case 'n': | |
445 | no_fib_flag = 1; | |
446 | break; | |
0b014ea6 PG |
447 | case 'Z': |
448 | no_zebra_flag = 1; | |
449 | break; | |
d62a17ae | 450 | case 'S': |
451 | skip_runas = 1; | |
452 | break; | |
f533be73 | 453 | case 'I': |
454 | instance = atoi(optarg); | |
455 | if (instance > (unsigned short)-1) | |
456 | zlog_err("Instance %i out of range (0..%u)", | |
457 | instance, (unsigned short)-1); | |
458 | break; | |
c2d020ad DS |
459 | case 's': |
460 | buffer_size = atoi(optarg); | |
461 | break; | |
d62a17ae | 462 | default: |
463 | frr_help_exit(1); | |
464 | break; | |
465 | } | |
718e3744 | 466 | } |
d62a17ae | 467 | if (skip_runas) |
468 | memset(&bgpd_privs, 0, sizeof(bgpd_privs)); | |
718e3744 | 469 | |
d62a17ae | 470 | /* BGP master init. */ |
c2d020ad | 471 | bgp_master_init(frr_init(), buffer_size); |
d62a17ae | 472 | bm->port = bgp_port; |
580f8636 | 473 | if (bgp_port == 0) |
474 | bgp_option_set(BGP_OPT_NO_LISTEN); | |
d62a17ae | 475 | bm->address = bgp_address; |
0b014ea6 | 476 | if (no_fib_flag || no_zebra_flag) |
d62a17ae | 477 | bgp_option_set(BGP_OPT_NO_FIB); |
0b014ea6 PG |
478 | if (no_zebra_flag) |
479 | bgp_option_set(BGP_OPT_NO_ZEBRA); | |
def31c13 | 480 | bgp_error_init(); |
d62a17ae | 481 | /* Initializations. */ |
482 | bgp_vrf_init(); | |
718e3744 | 483 | |
d62a17ae | 484 | /* BGP related initialization. */ |
f533be73 | 485 | bgp_init((unsigned short)instance); |
718e3744 | 486 | |
d62a17ae | 487 | snprintf(bgpd_di.startinfo, sizeof(bgpd_di.startinfo), ", bgp@%s:%d", |
488 | (bm->address ? bm->address : "<all>"), bm->port); | |
718e3744 | 489 | |
d62a17ae | 490 | frr_config_fork(); |
2d4ee774 | 491 | /* must be called after fork() */ |
034e185d | 492 | bgp_gr_apply_running_config(); |
419dfe6a | 493 | bgp_pthreads_run(); |
d62a17ae | 494 | frr_run(bm->master); |
718e3744 | 495 | |
d62a17ae | 496 | /* Not reached. */ |
497 | return (0); | |
718e3744 | 498 | } |