]> git.proxmox.com Git - mirror_frr.git/blobdiff - bgpd/bgp_pbr.c
Merge pull request #3688 from chiragshah6/evpn_dev
[mirror_frr.git] / bgpd / bgp_pbr.c
index 60b17a475de86e2e3567f90490302e6cb88e9e7a..c63eb83c1b2e026cb0f91f98d9b3bd3f89d2f81a 100644 (file)
@@ -38,6 +38,7 @@
 DEFINE_MTYPE_STATIC(BGPD, PBR_MATCH_ENTRY, "PBR match entry")
 DEFINE_MTYPE_STATIC(BGPD, PBR_MATCH, "PBR match")
 DEFINE_MTYPE_STATIC(BGPD, PBR_ACTION, "PBR action")
+DEFINE_MTYPE_STATIC(BGPD, PBR_RULE, "PBR rule")
 DEFINE_MTYPE_STATIC(BGPD, PBR, "BGP PBR Context")
 DEFINE_MTYPE_STATIC(BGPD, PBR_VALMASK, "BGP PBR Val Mask Value")
 
@@ -66,6 +67,25 @@ struct bgp_pbr_action_unique {
        struct bgp_pbr_action *bpa_found;
 };
 
+struct bgp_pbr_rule_unique {
+       uint32_t unique;
+       struct bgp_pbr_rule *bpr_found;
+};
+
+static int bgp_pbr_rule_walkcb(struct hash_backet *backet, void *arg)
+{
+       struct bgp_pbr_rule *bpr = (struct bgp_pbr_rule *)backet->data;
+       struct bgp_pbr_rule_unique *bpru = (struct bgp_pbr_rule_unique *)
+               arg;
+       uint32_t unique = bpru->unique;
+
+       if (bpr->unique == unique) {
+               bpru->bpr_found = bpr;
+               return HASHWALK_ABORT;
+       }
+       return HASHWALK_CONTINUE;
+}
+
 static int bgp_pbr_action_walkcb(struct hash_backet *backet, void *arg)
 {
        struct bgp_pbr_action *bpa = (struct bgp_pbr_action *)backet->data;
@@ -200,9 +220,11 @@ struct bgp_pbr_val_mask {
  * so that BGP can create pbr instructions to ZEBRA
  */
 struct bgp_pbr_filter {
+       uint8_t type;
        vrf_id_t vrf_id;
        struct prefix *src;
        struct prefix *dst;
+       uint8_t bitmask_iprule;
        uint8_t protocol;
        struct bgp_pbr_range_port *pkt_len;
        struct bgp_pbr_range_port *src_port;
@@ -448,6 +470,11 @@ static int bgp_pbr_validate_policy_route(struct bgp_pbr_entry_main *api)
 {
        bool enumerate_icmp = false;
 
+       if (api->type ==  BGP_PBR_UNDEFINED) {
+               if (BGP_DEBUG(pbr, PBR))
+                       zlog_debug("BGP: pbr entry undefined. cancel.");
+               return 0;
+       }
        /* because bgp pbr entry may contain unsupported
         * combinations, a message will be displayed here if
         * not supported.
@@ -612,13 +639,45 @@ static int bgp_pbr_validate_policy_route(struct bgp_pbr_entry_main *api)
                                 " too complex. ignoring.");
                return 0;
        }
-       if (!(api->match_bitmask & PREFIX_SRC_PRESENT) &&
-           !(api->match_bitmask & PREFIX_DST_PRESENT)) {
+       /* iprule only supports redirect IP */
+       if (api->type == BGP_PBR_IPRULE) {
+               int i;
+
+               for (i = 0; i < api->action_num; i++) {
+                       if (api->actions[i].action == ACTION_TRAFFICRATE &&
+                           api->actions[i].u.r.rate == 0) {
+                               if (BGP_DEBUG(pbr, PBR)) {
+                                       bgp_pbr_print_policy_route(api);
+                                       zlog_debug("BGP: iprule match actions"
+                                                  " drop not supported");
+                               }
+                               return 0;
+                       }
+                       if (api->actions[i].action == ACTION_MARKING) {
+                               if (BGP_DEBUG(pbr, PBR)) {
+                                       bgp_pbr_print_policy_route(api);
+                                       zlog_warn("PBR: iprule set DSCP %u"
+                                                 " not supported",
+                                               api->actions[i].u.marking_dscp);
+                               }
+                       }
+                       if (api->actions[i].action == ACTION_REDIRECT) {
+                               if (BGP_DEBUG(pbr, PBR)) {
+                                       bgp_pbr_print_policy_route(api);
+                                       zlog_warn("PBR: iprule redirect VRF %u"
+                                               " not supported",
+                                               api->actions[i].u.redirect_vrf);
+                               }
+                       }
+               }
+
+       } else if (!(api->match_bitmask & PREFIX_SRC_PRESENT) &&
+                  !(api->match_bitmask & PREFIX_DST_PRESENT)) {
                if (BGP_DEBUG(pbr, PBR)) {
                        bgp_pbr_print_policy_route(api);
                        zlog_debug("BGP: match actions without src"
-                                " or dst address can not operate."
-                                " ignoring.");
+                                  " or dst address can not operate."
+                                  " ignoring.");
                }
                return 0;
        }
@@ -626,8 +685,8 @@ static int bgp_pbr_validate_policy_route(struct bgp_pbr_entry_main *api)
 }
 
 /* return -1 if build or validation failed */
-static int bgp_pbr_build_and_validate_entry(struct prefix *p,
-                                           struct bgp_path_info *info,
+int bgp_pbr_build_and_validate_entry(struct prefix *p,
+                                           struct bgp_path_info *path,
                                            struct bgp_pbr_entry_main *api)
 {
        int ret;
@@ -638,6 +697,7 @@ static int bgp_pbr_build_and_validate_entry(struct prefix *p,
        struct prefix *src = NULL, *dst = NULL;
        int valid_prefix = 0;
        afi_t afi = AFI_IP;
+       struct bgp_pbr_entry_action *api_action_redirect_ip = NULL;
 
        /* extract match from flowspec entries */
        ret = bgp_flowspec_match_rules_fill((uint8_t *)p->u.prefix_flowspec.ptr,
@@ -645,8 +705,8 @@ static int bgp_pbr_build_and_validate_entry(struct prefix *p,
        if (ret < 0)
                return -1;
        /* extract actiosn from flowspec ecom list */
-       if (info && info->attr && info->attr->ecommunity) {
-               ecom = info->attr->ecommunity;
+       if (path && path->attr && path->attr->ecommunity) {
+               ecom = path->attr->ecommunity;
                for (i = 0; i < ecom->size; i++) {
                        ecom_eval = (struct ecommunity_val *)
                                (ecom->val + (i * ECOMMUNITY_SIZE));
@@ -688,10 +748,55 @@ static int bgp_pbr_build_and_validate_entry(struct prefix *p,
                                    (char)ECOMMUNITY_ENCODE_REDIRECT_IP_NH) &&
                                   (ecom_eval->val[1] ==
                                    (char)ECOMMUNITY_REDIRECT_IP_NH)) {
-                               api_action->action = ACTION_REDIRECT_IP;
-                               api_action->u.zr.redirect_ip_v4.s_addr =
-                                       info->attr->nexthop.s_addr;
-                               api_action->u.zr.duplicate = ecom_eval->val[7];
+                               /* in case the 2 ecom present,
+                                * do not overwrite
+                                * draft-ietf-idr-flowspec-redirect
+                                */
+                               if (api_action_redirect_ip) {
+                                       if (api_action_redirect_ip->u
+                                           .zr.redirect_ip_v4.s_addr)
+                                               continue;
+                                       if (!path->attr->nexthop.s_addr)
+                                               continue;
+                                       api_action_redirect_ip->u
+                                               .zr.redirect_ip_v4.s_addr =
+                                               path->attr->nexthop.s_addr;
+                                       api_action_redirect_ip->u.zr.duplicate
+                                               = ecom_eval->val[7];
+                                       continue;
+                               } else {
+                                       api_action->action = ACTION_REDIRECT_IP;
+                                       api_action->u.zr.redirect_ip_v4.s_addr =
+                                               path->attr->nexthop.s_addr;
+                                       api_action->u.zr.duplicate =
+                                               ecom_eval->val[7];
+                                       api_action_redirect_ip = api_action;
+                               }
+                       } else if ((ecom_eval->val[0] ==
+                                   (char)ECOMMUNITY_ENCODE_IP) &&
+                                  (ecom_eval->val[1] ==
+                                   (char)ECOMMUNITY_FLOWSPEC_REDIRECT_IPV4)) {
+                               /* in case the 2 ecom present,
+                                * overwrite simpson draft
+                                * update redirect ip fields
+                                */
+                               if (api_action_redirect_ip) {
+                                       memcpy(&(api_action_redirect_ip->u
+                                                .zr.redirect_ip_v4.s_addr),
+                                              (ecom_eval->val+2), 4);
+                                       api_action_redirect_ip->u
+                                               .zr.duplicate =
+                                               ecom_eval->val[7];
+                                       continue;
+                               } else {
+                                       api_action->action = ACTION_REDIRECT_IP;
+                                       memcpy(&(api_action->u
+                                                .zr.redirect_ip_v4.s_addr),
+                                              (ecom_eval->val+2), 4);
+                                       api_action->u.zr.duplicate =
+                                               ecom_eval->val[7];
+                                       api_action_redirect_ip = api_action;
+                               }
                        } else {
                                if (ecom_eval->val[0] !=
                                    (char)ECOMMUNITY_ENCODE_TRANS_EXP)
@@ -786,6 +891,34 @@ static void *bgp_pbr_match_alloc_intern(void *arg)
        return new;
 }
 
+static void bgp_pbr_rule_free(void *arg)
+{
+       struct bgp_pbr_rule *bpr;
+
+       bpr = (struct bgp_pbr_rule *)arg;
+
+       /* delete iprule */
+       if (bpr->installed) {
+               bgp_send_pbr_rule_action(bpr->action, bpr, false);
+               bpr->installed = false;
+               bpr->action->refcnt--;
+               bpr->action = NULL;
+       }
+       XFREE(MTYPE_PBR_RULE, bpr);
+}
+
+static void *bgp_pbr_rule_alloc_intern(void *arg)
+{
+       struct bgp_pbr_rule *bpr, *new;
+
+       bpr = (struct bgp_pbr_rule *)arg;
+
+       new = XCALLOC(MTYPE_PBR_RULE, sizeof(*new));
+       memcpy(new, bpr, sizeof(*bpr));
+
+       return new;
+}
+
 static void bgp_pbr_action_free(void *arg)
 {
        struct bgp_pbr_action *bpa;
@@ -794,7 +927,7 @@ static void bgp_pbr_action_free(void *arg)
 
        if (bpa->refcnt == 0) {
                if (bpa->installed && bpa->table_id != 0) {
-                       bgp_send_pbr_rule_action(bpa, false);
+                       bgp_send_pbr_rule_action(bpa, NULL, false);
                        bgp_zebra_announce_default(bpa->bgp, &(bpa->nh),
                                                   AFI_IP,
                                                   bpa->table_id,
@@ -847,7 +980,7 @@ uint32_t bgp_pbr_match_hash_key(void *arg)
        return jhash_1word(pbm->type, key);
 }
 
-int bgp_pbr_match_hash_equal(const void *arg1, const void *arg2)
+bool bgp_pbr_match_hash_equal(const void *arg1, const void *arg2)
 {
        const struct bgp_pbr_match *r1, *r2;
 
@@ -855,35 +988,73 @@ int bgp_pbr_match_hash_equal(const void *arg1, const void *arg2)
        r2 = (const struct bgp_pbr_match *)arg2;
 
        if (r1->vrf_id != r2->vrf_id)
-               return 0;
+               return false;
 
        if (r1->type != r2->type)
-               return 0;
+               return false;
 
        if (r1->flags != r2->flags)
-               return 0;
+               return false;
 
        if (r1->action != r2->action)
-               return 0;
+               return false;
 
        if (r1->pkt_len_min != r2->pkt_len_min)
-               return 0;
+               return false;
 
        if (r1->pkt_len_max != r2->pkt_len_max)
-               return 0;
+               return false;
 
        if (r1->tcp_flags != r2->tcp_flags)
-               return 0;
+               return false;
 
        if (r1->tcp_mask_flags != r2->tcp_mask_flags)
-               return 0;
+               return false;
 
        if (r1->dscp_value != r2->dscp_value)
-               return 0;
+               return false;
 
        if (r1->fragment != r2->fragment)
-               return 0;
-       return 1;
+               return false;
+       return true;
+}
+
+uint32_t bgp_pbr_rule_hash_key(void *arg)
+{
+       struct bgp_pbr_rule *pbr = (struct bgp_pbr_rule *)arg;
+       uint32_t key;
+
+       key = prefix_hash_key(&pbr->src);
+       key = jhash_1word(pbr->vrf_id, key);
+       key = jhash_1word(pbr->flags, key);
+       return jhash_1word(prefix_hash_key(&pbr->dst), key);
+}
+
+bool bgp_pbr_rule_hash_equal(const void *arg1, const void *arg2)
+{
+       const struct bgp_pbr_rule *r1, *r2;
+
+       r1 = (const struct bgp_pbr_rule *)arg1;
+       r2 = (const struct bgp_pbr_rule *)arg2;
+
+       if (r1->vrf_id != r2->vrf_id)
+               return false;
+
+       if (r1->flags != r2->flags)
+               return false;
+
+       if (r1->action != r2->action)
+               return false;
+
+       if ((r1->flags & MATCH_IP_SRC_SET) &&
+           !prefix_same(&r1->src, &r2->src))
+               return false;
+
+       if ((r1->flags & MATCH_IP_DST_SET) &&
+           !prefix_same(&r1->dst, &r2->dst))
+               return false;
+
+       return true;
 }
 
 uint32_t bgp_pbr_match_entry_hash_key(void *arg)
@@ -903,45 +1074,41 @@ uint32_t bgp_pbr_match_entry_hash_key(void *arg)
        return key;
 }
 
-int bgp_pbr_match_entry_hash_equal(const void *arg1, const void *arg2)
+bool bgp_pbr_match_entry_hash_equal(const void *arg1, const void *arg2)
 {
        const struct bgp_pbr_match_entry *r1, *r2;
 
        r1 = (const struct bgp_pbr_match_entry *)arg1;
        r2 = (const struct bgp_pbr_match_entry *)arg2;
 
-       /* on updates, comparing
-        * backpointer is not necessary
-        */
-
-       /* unique value is self calculated
-        */
-
-       /* rate is ignored for now
+       /*
+        * on updates, comparing backpointer is not necessary
+        * unique value is self calculated
+        * rate is ignored for now
         */
 
        if (!prefix_same(&r1->src, &r2->src))
-               return 0;
+               return false;
 
        if (!prefix_same(&r1->dst, &r2->dst))
-               return 0;
+               return false;
 
        if (r1->src_port_min != r2->src_port_min)
-               return 0;
+               return false;
 
        if (r1->dst_port_min != r2->dst_port_min)
-               return 0;
+               return false;
 
        if (r1->src_port_max != r2->src_port_max)
-               return 0;
+               return false;
 
        if (r1->dst_port_max != r2->dst_port_max)
-               return 0;
+               return false;
 
        if (r1->proto != r2->proto)
-               return 0;
+               return false;
 
-       return 1;
+       return true;
 }
 
 uint32_t bgp_pbr_action_hash_key(void *arg)
@@ -955,7 +1122,7 @@ uint32_t bgp_pbr_action_hash_key(void *arg)
        return key;
 }
 
-int bgp_pbr_action_hash_equal(const void *arg1, const void *arg2)
+bool bgp_pbr_action_hash_equal(const void *arg1, const void *arg2)
 {
        const struct bgp_pbr_action *r1, *r2;
 
@@ -967,11 +1134,26 @@ int bgp_pbr_action_hash_equal(const void *arg1, const void *arg2)
         * rate is ignored
         */
        if (r1->vrf_id != r2->vrf_id)
-               return 0;
+               return false;
 
        if (memcmp(&r1->nh, &r2->nh, sizeof(struct nexthop)))
-               return 0;
-       return 1;
+               return false;
+
+       return true;
+}
+
+struct bgp_pbr_rule *bgp_pbr_rule_lookup(vrf_id_t vrf_id,
+                                        uint32_t unique)
+{
+       struct bgp *bgp = bgp_lookup_by_vrf_id(vrf_id);
+       struct bgp_pbr_rule_unique bpru;
+
+       if (!bgp || unique == 0)
+               return NULL;
+       bpru.unique = unique;
+       bpru.bpr_found = NULL;
+       hash_walk(bgp->pbr_rule_hash, bgp_pbr_rule_walkcb, &bpru);
+       return bpru.bpr_found;
 }
 
 struct bgp_pbr_action *bgp_pbr_action_rule_lookup(vrf_id_t vrf_id,
@@ -1047,6 +1229,11 @@ void bgp_pbr_cleanup(struct bgp *bgp)
                hash_free(bgp->pbr_match_hash);
                bgp->pbr_match_hash = NULL;
        }
+       if (bgp->pbr_rule_hash) {
+               hash_clean(bgp->pbr_rule_hash, bgp_pbr_rule_free);
+               hash_free(bgp->pbr_rule_hash);
+               bgp->pbr_rule_hash = NULL;
+       }
        if (bgp->pbr_action_hash) {
                hash_clean(bgp->pbr_action_hash, bgp_pbr_action_free);
                hash_free(bgp->pbr_action_hash);
@@ -1070,6 +1257,11 @@ void bgp_pbr_init(struct bgp *bgp)
                                 bgp_pbr_action_hash_equal,
                                 "Match Hash Entry");
 
+       bgp->pbr_rule_hash =
+               hash_create_size(8, bgp_pbr_rule_hash_key,
+                                bgp_pbr_rule_hash_equal,
+                                "Match Rule");
+
        bgp->bgp_pbr_cfg = XCALLOC(MTYPE_PBR, sizeof(struct bgp_pbr_config));
        bgp->bgp_pbr_cfg->pbr_interface_any_ipv4 = true;
 }
@@ -1210,6 +1402,42 @@ void bgp_pbr_print_policy_route(struct bgp_pbr_entry_main *api)
        zlog_info("%s", return_string);
 }
 
+static void bgp_pbr_flush_iprule(struct bgp *bgp, struct bgp_pbr_action *bpa,
+                                 struct bgp_pbr_rule *bpr)
+{
+       /* if bpr is null, do nothing
+        */
+       if (bpr == NULL)
+               return;
+       if (bpr->installed) {
+               bgp_send_pbr_rule_action(bpa, bpr, false);
+               bpr->installed = false;
+               bpr->action->refcnt--;
+               bpr->action = NULL;
+               if (bpr->path) {
+                       struct bgp_path_info *path;
+                       struct bgp_path_info_extra *extra;
+
+                       /* unlink path to bpme */
+                       path = (struct bgp_path_info *)bpr->path;
+                       extra = bgp_path_info_extra_get(path);
+                       listnode_delete(extra->bgp_fs_iprule, bpr);
+                       bpr->path = NULL;
+               }
+       }
+       hash_release(bgp->pbr_rule_hash, bpr);
+       if (bpa->refcnt == 0) {
+               if (bpa->installed && bpa->table_id != 0) {
+                       bgp_send_pbr_rule_action(bpa, NULL, false);
+                       bgp_zebra_announce_default(bpa->bgp, &(bpa->nh),
+                                                  AFI_IP,
+                                                  bpa->table_id,
+                                                  false);
+                       bpa->installed = false;
+               }
+       }
+}
+
 static void bgp_pbr_flush_entry(struct bgp *bgp, struct bgp_pbr_action *bpa,
                                struct bgp_pbr_match *bpm,
                                struct bgp_pbr_match_entry *bpme)
@@ -1227,11 +1455,10 @@ static void bgp_pbr_flush_entry(struct bgp *bgp, struct bgp_pbr_action *bpa,
                        struct bgp_path_info *path;
                        struct bgp_path_info_extra *extra;
 
-                       /* unlink bgp_path_info to bpme */
+                       /* unlink path to bpme */
                        path = (struct bgp_path_info *)bpme->path;
                        extra = bgp_path_info_extra_get(path);
-                       if (extra->bgp_fs_pbr)
-                               listnode_delete(extra->bgp_fs_pbr, bpme);
+                       listnode_delete(extra->bgp_fs_pbr, bpme);
                        bpme->path = NULL;
                }
        }
@@ -1257,7 +1484,7 @@ static void bgp_pbr_flush_entry(struct bgp *bgp, struct bgp_pbr_action *bpa,
        }
        if (bpa->refcnt == 0) {
                if (bpa->installed && bpa->table_id != 0) {
-                       bgp_send_pbr_rule_action(bpa, false);
+                       bgp_send_pbr_rule_action(bpa, NULL, false);
                        bgp_zebra_announce_default(bpa->bgp, &(bpa->nh),
                                                   AFI_IP,
                                                   bpa->table_id,
@@ -1272,6 +1499,50 @@ struct bgp_pbr_match_entry_remain {
        struct bgp_pbr_match_entry *bpme_found;
 };
 
+struct bgp_pbr_rule_remain {
+       struct bgp_pbr_rule *bpr_to_match;
+       struct bgp_pbr_rule *bpr_found;
+};
+
+static int bgp_pbr_get_same_rule(struct hash_backet *backet, void *arg)
+{
+       struct bgp_pbr_rule *r1 = (struct bgp_pbr_rule *)backet->data;
+       struct bgp_pbr_rule_remain *ctxt =
+               (struct bgp_pbr_rule_remain *)arg;
+       struct bgp_pbr_rule *r2;
+
+       r2 = ctxt->bpr_to_match;
+
+       if (r1->vrf_id != r2->vrf_id)
+               return HASHWALK_CONTINUE;
+
+       if (r1->flags != r2->flags)
+               return HASHWALK_CONTINUE;
+
+       if ((r1->flags & MATCH_IP_SRC_SET) &&
+           !prefix_same(&r1->src, &r2->src))
+               return HASHWALK_CONTINUE;
+
+       if ((r1->flags & MATCH_IP_DST_SET) &&
+           !prefix_same(&r1->dst, &r2->dst))
+               return HASHWALK_CONTINUE;
+
+       /* this function is used for two cases:
+        * - remove an entry upon withdraw request
+        * (case r2->action is null)
+        * - replace an old iprule with different action
+        * (case r2->action is != null)
+        * the old one is removed after the new one
+        * this is to avoid disruption in traffic
+        */
+       if (r2->action == NULL ||
+           r1->action != r2->action) {
+               ctxt->bpr_found = r1;
+               return HASHWALK_ABORT;
+       }
+       return HASHWALK_CONTINUE;
+}
+
 static int bgp_pbr_get_remaining_entry(struct hash_backet *backet, void *arg)
 {
        struct bgp_pbr_match *bpm = (struct bgp_pbr_match *)backet->data;
@@ -1309,12 +1580,15 @@ static void bgp_pbr_policyroute_remove_from_zebra_unit(
 {
        struct bgp_pbr_match temp;
        struct bgp_pbr_match_entry temp2;
+       struct bgp_pbr_rule pbr_rule;
+       struct bgp_pbr_rule *bpr;
        struct bgp_pbr_match *bpm;
        struct bgp_pbr_match_entry *bpme;
        struct bgp_pbr_match_entry_remain bpmer;
        struct bgp_pbr_range_port *src_port;
        struct bgp_pbr_range_port *dst_port;
        struct bgp_pbr_range_port *pkt_len;
+       struct bgp_pbr_rule_remain bprr;
 
        if (!bpf)
                return;
@@ -1331,6 +1605,37 @@ static void bgp_pbr_policyroute_remove_from_zebra_unit(
         */
        memset(&temp2, 0, sizeof(temp2));
        memset(&temp, 0, sizeof(temp));
+
+       if (bpf->type == BGP_PBR_IPRULE) {
+               memset(&pbr_rule, 0, sizeof(pbr_rule));
+               pbr_rule.vrf_id = bpf->vrf_id;
+               if (bpf->src) {
+                       prefix_copy(&pbr_rule.src, bpf->src);
+                       pbr_rule.flags |= MATCH_IP_SRC_SET;
+               }
+               if (bpf->dst) {
+                       prefix_copy(&pbr_rule.dst, bpf->dst);
+                       pbr_rule.flags |= MATCH_IP_DST_SET;
+               }
+               bpr = &pbr_rule;
+               /* A previous entry may already exist
+                * flush previous entry if necessary
+                */
+               bprr.bpr_to_match = bpr;
+               bprr.bpr_found = NULL;
+               hash_walk(bgp->pbr_rule_hash, bgp_pbr_get_same_rule, &bprr);
+               if (bprr.bpr_found) {
+                       static struct bgp_pbr_rule *local_bpr;
+                       static struct bgp_pbr_action *local_bpa;
+
+                       local_bpr = bprr.bpr_found;
+                       local_bpa = local_bpr->action;
+                       bgp_pbr_flush_iprule(bgp, local_bpa,
+                                            local_bpr);
+               }
+               return;
+       }
+
        if (bpf->src) {
                temp.flags |= MATCH_IP_SRC_SET;
                prefix_copy(&temp2.src, bpf->src);
@@ -1511,9 +1816,10 @@ static void bgp_pbr_policyroute_remove_from_zebra_recursive(
        struct list *orig_list;
        struct bgp_pbr_val_mask **target_val;
 
-       if (type_entry == 0)
-               return bgp_pbr_policyroute_remove_from_zebra_unit(bgp, path,
-                                                                 bpf);
+       if (type_entry == 0) {
+               bgp_pbr_policyroute_remove_from_zebra_unit(bgp, path, bpf);
+               return;
+       }
        next_type_entry = bgp_pbr_next_type_entry(type_entry);
        if (type_entry == FLOWSPEC_TCP_FLAGS && bpof->tcpflags) {
                orig_list = bpof->tcpflags;
@@ -1533,8 +1839,9 @@ static void bgp_pbr_policyroute_remove_from_zebra_recursive(
                bgp_pbr_icmp_action(bgp, path, bpf, bpof, false, NULL, NULL);
                return;
        } else {
-               return bgp_pbr_policyroute_remove_from_zebra_recursive(
+               bgp_pbr_policyroute_remove_from_zebra_recursive(
                        bgp, path, bpf, bpof, next_type_entry);
+               return;
        }
        for (ALL_LIST_ELEMENTS(orig_list, node, nnode, valmask)) {
                *target_val = valmask;
@@ -1547,9 +1854,10 @@ static void bgp_pbr_policyroute_remove_from_zebra(
        struct bgp *bgp, struct bgp_path_info *path, struct bgp_pbr_filter *bpf,
        struct bgp_pbr_or_filter *bpof)
 {
-       if (!bpof)
-               return bgp_pbr_policyroute_remove_from_zebra_unit(bgp, path,
-                                                                 bpf);
+       if (!bpof) {
+               bgp_pbr_policyroute_remove_from_zebra_unit(bgp, path, bpf);
+               return;
+       }
        if (bpof->tcpflags)
                bgp_pbr_policyroute_remove_from_zebra_recursive(
                        bgp, path, bpf, bpof, FLOWSPEC_TCP_FLAGS);
@@ -1686,9 +1994,13 @@ static void bgp_pbr_policyroute_add_to_zebra_unit(struct bgp *bgp,
        struct bgp_pbr_action temp3;
        struct bgp_pbr_action *bpa = NULL;
        struct bgp_pbr_match_entry_remain bpmer;
+       struct bgp_pbr_rule_remain bprr;
        struct bgp_pbr_range_port *src_port;
        struct bgp_pbr_range_port *dst_port;
        struct bgp_pbr_range_port *pkt_len;
+       struct bgp_pbr_rule pbr_rule;
+       struct bgp_pbr_rule *bpr;
+       bool bpr_found = false;
        bool bpme_found = false;
 
        if (!bpf)
@@ -1725,7 +2037,69 @@ static void bgp_pbr_policyroute_add_to_zebra_unit(struct bgp *bgp,
                /* 0 value is forbidden */
                bpa->install_in_progress = false;
        }
+       if (bpf->type == BGP_PBR_IPRULE) {
+               memset(&pbr_rule, 0, sizeof(pbr_rule));
+               pbr_rule.vrf_id = bpf->vrf_id;
+               pbr_rule.priority = 20;
+               if (bpf->src) {
+                       pbr_rule.flags |= MATCH_IP_SRC_SET;
+                       prefix_copy(&pbr_rule.src, bpf->src);
+               }
+               if (bpf->dst) {
+                       pbr_rule.flags |= MATCH_IP_DST_SET;
+                       prefix_copy(&pbr_rule.dst, bpf->dst);
+               }
+               pbr_rule.action = bpa;
+               bpr = hash_get(bgp->pbr_rule_hash, &pbr_rule,
+                              bgp_pbr_rule_alloc_intern);
+               if (bpr && bpr->unique == 0) {
+                       bpr->unique = ++bgp_pbr_action_counter_unique;
+                       bpr->installed = false;
+                       bpr->install_in_progress = false;
+                       /* link bgp info to bpr */
+                       bpr->path = (void *)path;
+               } else
+                       bpr_found = true;
+               /* already installed */
+               if (bpr_found && bpr) {
+                       struct bgp_path_info_extra *extra =
+                               bgp_path_info_extra_get(path);
+
+                       if (extra && listnode_lookup(extra->bgp_fs_iprule,
+                                                    bpr)) {
+                               if (BGP_DEBUG(pbr, PBR_ERROR))
+                                       zlog_err("%s: entry %p/%p already "
+                                                "installed in bgp pbr iprule",
+                                                __func__, path, bpr);
+                               return;
+                       }
+               }
+               if (!bpa->installed && !bpa->install_in_progress) {
+                       bgp_send_pbr_rule_action(bpa, NULL, true);
+                       bgp_zebra_announce_default(bgp, nh,
+                                                  AFI_IP, bpa->table_id, true);
+               }
+               /* ip rule add */
+               if (bpr && !bpr->installed)
+                       bgp_send_pbr_rule_action(bpa, bpr, true);
 
+               /* A previous entry may already exist
+                * flush previous entry if necessary
+                */
+               bprr.bpr_to_match = bpr;
+               bprr.bpr_found = NULL;
+               hash_walk(bgp->pbr_rule_hash, bgp_pbr_get_same_rule, &bprr);
+               if (bprr.bpr_found) {
+                       static struct bgp_pbr_rule *local_bpr;
+                       static struct bgp_pbr_action *local_bpa;
+
+                       local_bpr = bprr.bpr_found;
+                       local_bpa = local_bpr->action;
+                       bgp_pbr_flush_iprule(bgp, local_bpa,
+                                            local_bpr);
+               }
+               return;
+       }
        /* then look for bpm */
        memset(&temp, 0, sizeof(temp));
        temp.vrf_id = bpf->vrf_id;
@@ -1839,8 +2213,7 @@ static void bgp_pbr_policyroute_add_to_zebra_unit(struct bgp *bgp,
                struct bgp_path_info_extra *extra =
                        bgp_path_info_extra_get(path);
 
-               if (extra && extra->bgp_fs_pbr &&
-                   listnode_lookup(extra->bgp_fs_pbr, bpme)) {
+               if (extra && listnode_lookup(extra->bgp_fs_pbr, bpme)) {
                        if (BGP_DEBUG(pbr, PBR_ERROR))
                                zlog_err(
                                        "%s: entry %p/%p already installed in bgp pbr",
@@ -1860,7 +2233,7 @@ static void bgp_pbr_policyroute_add_to_zebra_unit(struct bgp *bgp,
         */
        /* ip rule add */
        if (!bpa->installed && !bpa->install_in_progress) {
-               bgp_send_pbr_rule_action(bpa, true);
+               bgp_send_pbr_rule_action(bpa, NULL, true);
                bgp_zebra_announce_default(bgp, nh,
                                           AFI_IP, bpa->table_id, true);
        }
@@ -1906,9 +2279,10 @@ static void bgp_pbr_policyroute_add_to_zebra_recursive(
        struct list *orig_list;
        struct bgp_pbr_val_mask **target_val;
 
-       if (type_entry == 0)
-               return bgp_pbr_policyroute_add_to_zebra_unit(bgp, path, bpf, nh,
-                                                            rate);
+       if (type_entry == 0) {
+               bgp_pbr_policyroute_add_to_zebra_unit(bgp, path, bpf, nh, rate);
+               return;
+       }
        next_type_entry = bgp_pbr_next_type_entry(type_entry);
        if (type_entry == FLOWSPEC_TCP_FLAGS && bpof->tcpflags) {
                orig_list = bpof->tcpflags;
@@ -1928,8 +2302,9 @@ static void bgp_pbr_policyroute_add_to_zebra_recursive(
                bgp_pbr_icmp_action(bgp, path, bpf, bpof, true, nh, rate);
                return;
        } else {
-               return bgp_pbr_policyroute_add_to_zebra_recursive(
+               bgp_pbr_policyroute_add_to_zebra_recursive(
                        bgp, path, bpf, bpof, nh, rate, next_type_entry);
+               return;
        }
        for (ALL_LIST_ELEMENTS(orig_list, node, nnode, valmask)) {
                *target_val = valmask;
@@ -1944,9 +2319,10 @@ static void bgp_pbr_policyroute_add_to_zebra(struct bgp *bgp,
                                             struct bgp_pbr_or_filter *bpof,
                                             struct nexthop *nh, float *rate)
 {
-       if (!bpof)
-               return bgp_pbr_policyroute_add_to_zebra_unit(bgp, path, bpf, nh,
-                                                            rate);
+       if (!bpof) {
+               bgp_pbr_policyroute_add_to_zebra_unit(bgp, path, bpf, nh, rate);
+               return;
+       }
        if (bpof->tcpflags)
                bgp_pbr_policyroute_add_to_zebra_recursive(
                        bgp, path, bpf, bpof, nh, rate, FLOWSPEC_TCP_FLAGS);
@@ -1999,10 +2375,16 @@ static void bgp_pbr_handle_entry(struct bgp *bgp, struct bgp_path_info *path,
        memset(&nh, 0, sizeof(struct nexthop));
        memset(&bpf, 0, sizeof(struct bgp_pbr_filter));
        memset(&bpof, 0, sizeof(struct bgp_pbr_or_filter));
-       if (api->match_bitmask & PREFIX_SRC_PRESENT)
+       if (api->match_bitmask & PREFIX_SRC_PRESENT ||
+           (api->type == BGP_PBR_IPRULE &&
+            api->match_bitmask_iprule & PREFIX_SRC_PRESENT))
                src = &api->src_prefix;
-       if (api->match_bitmask & PREFIX_DST_PRESENT)
+       if (api->match_bitmask & PREFIX_DST_PRESENT ||
+           (api->type == BGP_PBR_IPRULE &&
+            api->match_bitmask_iprule & PREFIX_DST_PRESENT))
                dst = &api->dst_prefix;
+       if (api->type == BGP_PBR_IPRULE)
+               bpf.type = api->type;
        memset(&nh, 0, sizeof(struct nexthop));
        nh.vrf_id = VRF_UNKNOWN;
        if (api->match_protocol_num)
@@ -2115,9 +2497,10 @@ static void bgp_pbr_handle_entry(struct bgp *bgp, struct bgp_path_info *path,
        bpf.protocol = proto;
        bpf.src_port = srcp;
        bpf.dst_port = dstp;
-       if (!add)
-               return bgp_pbr_policyroute_remove_from_zebra(bgp, path, &bpf,
-                                                            &bpof);
+       if (!add) {
+               bgp_pbr_policyroute_remove_from_zebra(bgp, path, &bpf, &bpof);
+               return;
+       }
        /* no action for add = true */
        for (i = 0; i < api->action_num; i++) {
                switch (api->actions[i].action) {