/*-
 *   BSD LICENSE
 *
 *   Copyright(c) 2010-2016 Intel Corporation. All rights reserved.
 *   All rights reserved.
 *
 *   Redistribution and use in source and binary forms, with or without
 *   modification, are permitted provided that the following conditions
 *   are met:
 *
 *     * Redistributions of source code must retain the above copyright
 *       notice, this list of conditions and the following disclaimer.
 *     * Redistributions in binary form must reproduce the above copyright
 *       notice, this list of conditions and the following disclaimer in
 *       the documentation and/or other materials provided with the
 *       distribution.
 *     * Neither the name of Intel Corporation nor the names of its
 *       contributors may be used to endorse or promote products derived
 *       from this software without specific prior written permission.
 *
 *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <string.h>

#include <rte_common.h>
#include <rte_malloc.h>
#include <rte_ether.h>
#include <rte_ip.h>
#include <rte_tcp.h>
#include <rte_byteorder.h>
#include <rte_table_acl.h>

#include "pipeline_firewall_be.h"
#include "parser.h"

struct pipeline_firewall {
	struct pipeline p;
	pipeline_msg_req_handler custom_handlers[PIPELINE_FIREWALL_MSG_REQS];

	uint32_t n_rules;
	uint32_t n_rule_fields;
	struct rte_acl_field_def *field_format;
	uint32_t field_format_size;
} __rte_cache_aligned;

static void *
pipeline_firewall_msg_req_custom_handler(struct pipeline *p, void *msg);

static pipeline_msg_req_handler handlers[] = {
	[PIPELINE_MSG_REQ_PING] =
		pipeline_msg_req_ping_handler,
	[PIPELINE_MSG_REQ_STATS_PORT_IN] =
		pipeline_msg_req_stats_port_in_handler,
	[PIPELINE_MSG_REQ_STATS_PORT_OUT] =
		pipeline_msg_req_stats_port_out_handler,
	[PIPELINE_MSG_REQ_STATS_TABLE] =
		pipeline_msg_req_stats_table_handler,
	[PIPELINE_MSG_REQ_PORT_IN_ENABLE] =
		pipeline_msg_req_port_in_enable_handler,
	[PIPELINE_MSG_REQ_PORT_IN_DISABLE] =
		pipeline_msg_req_port_in_disable_handler,
	[PIPELINE_MSG_REQ_CUSTOM] =
		pipeline_firewall_msg_req_custom_handler,
};

static void *
pipeline_firewall_msg_req_add_handler(struct pipeline *p, void *msg);

static void *
pipeline_firewall_msg_req_del_handler(struct pipeline *p, void *msg);

static void *
pipeline_firewall_msg_req_add_bulk_handler(struct pipeline *p, void *msg);

static void *
pipeline_firewall_msg_req_del_bulk_handler(struct pipeline *p, void *msg);

static void *
pipeline_firewall_msg_req_add_default_handler(struct pipeline *p, void *msg);

static void *
pipeline_firewall_msg_req_del_default_handler(struct pipeline *p, void *msg);

static pipeline_msg_req_handler custom_handlers[] = {
	[PIPELINE_FIREWALL_MSG_REQ_ADD] =
		pipeline_firewall_msg_req_add_handler,
	[PIPELINE_FIREWALL_MSG_REQ_DEL] =
		pipeline_firewall_msg_req_del_handler,
	[PIPELINE_FIREWALL_MSG_REQ_ADD_BULK] =
		pipeline_firewall_msg_req_add_bulk_handler,
	[PIPELINE_FIREWALL_MSG_REQ_DEL_BULK] =
		pipeline_firewall_msg_req_del_bulk_handler,
	[PIPELINE_FIREWALL_MSG_REQ_ADD_DEFAULT] =
		pipeline_firewall_msg_req_add_default_handler,
	[PIPELINE_FIREWALL_MSG_REQ_DEL_DEFAULT] =
		pipeline_firewall_msg_req_del_default_handler,
};

/*
 * Firewall table
 */
struct firewall_table_entry {
	struct rte_pipeline_table_entry head;
};

static struct rte_acl_field_def field_format_ipv4[] = {
	/* Protocol */
	[0] = {
		.type = RTE_ACL_FIELD_TYPE_BITMASK,
		.size = sizeof(uint8_t),
		.field_index = 0,
		.input_index = 0,
		.offset = sizeof(struct ether_hdr) +
			offsetof(struct ipv4_hdr, next_proto_id),
	},

	/* Source IP address (IPv4) */
	[1] = {
		.type = RTE_ACL_FIELD_TYPE_MASK,
		.size = sizeof(uint32_t),
		.field_index = 1,
		.input_index = 1,
		.offset = sizeof(struct ether_hdr) +
			offsetof(struct ipv4_hdr, src_addr),
	},

	/* Destination IP address (IPv4) */
	[2] = {
		.type = RTE_ACL_FIELD_TYPE_MASK,
		.size = sizeof(uint32_t),
		.field_index = 2,
		.input_index = 2,
		.offset = sizeof(struct ether_hdr) +
			offsetof(struct ipv4_hdr, dst_addr),
	},

	/* Source Port */
	[3] = {
		.type = RTE_ACL_FIELD_TYPE_RANGE,
		.size = sizeof(uint16_t),
		.field_index = 3,
		.input_index = 3,
		.offset = sizeof(struct ether_hdr) +
			sizeof(struct ipv4_hdr) +
			offsetof(struct tcp_hdr, src_port),
	},

	/* Destination Port */
	[4] = {
		.type = RTE_ACL_FIELD_TYPE_RANGE,
		.size = sizeof(uint16_t),
		.field_index = 4,
		.input_index = 4,
		.offset = sizeof(struct ether_hdr) +
			sizeof(struct ipv4_hdr) +
			offsetof(struct tcp_hdr, dst_port),
	},
};

#define SIZEOF_VLAN_HDR                          4

static struct rte_acl_field_def field_format_vlan_ipv4[] = {
	/* Protocol */
	[0] = {
		.type = RTE_ACL_FIELD_TYPE_BITMASK,
		.size = sizeof(uint8_t),
		.field_index = 0,
		.input_index = 0,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_VLAN_HDR +
			offsetof(struct ipv4_hdr, next_proto_id),
	},

	/* Source IP address (IPv4) */
	[1] = {
		.type = RTE_ACL_FIELD_TYPE_MASK,
		.size = sizeof(uint32_t),
		.field_index = 1,
		.input_index = 1,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_VLAN_HDR +
			offsetof(struct ipv4_hdr, src_addr),
	},

	/* Destination IP address (IPv4) */
	[2] = {
		.type = RTE_ACL_FIELD_TYPE_MASK,
		.size = sizeof(uint32_t),
		.field_index = 2,
		.input_index = 2,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_VLAN_HDR +
			offsetof(struct ipv4_hdr, dst_addr),
	},

	/* Source Port */
	[3] = {
		.type = RTE_ACL_FIELD_TYPE_RANGE,
		.size = sizeof(uint16_t),
		.field_index = 3,
		.input_index = 3,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_VLAN_HDR +
			sizeof(struct ipv4_hdr) +
			offsetof(struct tcp_hdr, src_port),
	},

	/* Destination Port */
	[4] = {
		.type = RTE_ACL_FIELD_TYPE_RANGE,
		.size = sizeof(uint16_t),
		.field_index = 4,
		.input_index = 4,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_VLAN_HDR +
			sizeof(struct ipv4_hdr) +
			offsetof(struct tcp_hdr, dst_port),
	},
};

#define SIZEOF_QINQ_HEADER                       8

static struct rte_acl_field_def field_format_qinq_ipv4[] = {
	/* Protocol */
	[0] = {
		.type = RTE_ACL_FIELD_TYPE_BITMASK,
		.size = sizeof(uint8_t),
		.field_index = 0,
		.input_index = 0,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_QINQ_HEADER +
			offsetof(struct ipv4_hdr, next_proto_id),
	},

	/* Source IP address (IPv4) */
	[1] = {
		.type = RTE_ACL_FIELD_TYPE_MASK,
		.size = sizeof(uint32_t),
		.field_index = 1,
		.input_index = 1,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_QINQ_HEADER +
			offsetof(struct ipv4_hdr, src_addr),
	},

	/* Destination IP address (IPv4) */
	[2] = {
		.type = RTE_ACL_FIELD_TYPE_MASK,
		.size = sizeof(uint32_t),
		.field_index = 2,
		.input_index = 2,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_QINQ_HEADER +
			offsetof(struct ipv4_hdr, dst_addr),
	},

	/* Source Port */
	[3] = {
		.type = RTE_ACL_FIELD_TYPE_RANGE,
		.size = sizeof(uint16_t),
		.field_index = 3,
		.input_index = 3,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_QINQ_HEADER +
			sizeof(struct ipv4_hdr) +
			offsetof(struct tcp_hdr, src_port),
	},

	/* Destination Port */
	[4] = {
		.type = RTE_ACL_FIELD_TYPE_RANGE,
		.size = sizeof(uint16_t),
		.field_index = 4,
		.input_index = 4,
		.offset = sizeof(struct ether_hdr) +
			SIZEOF_QINQ_HEADER +
			sizeof(struct ipv4_hdr) +
			offsetof(struct tcp_hdr, dst_port),
	},
};

static int
pipeline_firewall_parse_args(struct pipeline_firewall *p,
	struct pipeline_params *params)
{
	uint32_t n_rules_present = 0;
	uint32_t pkt_type_present = 0;
	uint32_t i;

	/* defaults */
	p->n_rules = 4 * 1024;
	p->n_rule_fields = RTE_DIM(field_format_ipv4);
	p->field_format = field_format_ipv4;
	p->field_format_size = sizeof(field_format_ipv4);

	for (i = 0; i < params->n_args; i++) {
		char *arg_name = params->args_name[i];
		char *arg_value = params->args_value[i];

		if (strcmp(arg_name, "n_rules") == 0) {
			int status;

			PIPELINE_PARSE_ERR_DUPLICATE(
				n_rules_present == 0, params->name,
				arg_name);
			n_rules_present = 1;

			status = parser_read_uint32(&p->n_rules,
				arg_value);
			PIPELINE_PARSE_ERR_INV_VAL((status != -EINVAL),
				params->name, arg_name, arg_value);
			PIPELINE_PARSE_ERR_OUT_RNG((status != -ERANGE),
				params->name, arg_name, arg_value);
			continue;
		}

		if (strcmp(arg_name, "pkt_type") == 0) {
			PIPELINE_PARSE_ERR_DUPLICATE(
				pkt_type_present == 0, params->name,
				arg_name);
			pkt_type_present = 1;

			/* ipv4 */
			if (strcmp(arg_value, "ipv4") == 0) {
				p->n_rule_fields = RTE_DIM(field_format_ipv4);
				p->field_format = field_format_ipv4;
				p->field_format_size =
					sizeof(field_format_ipv4);
				continue;
			}

			/* vlan_ipv4 */
			if (strcmp(arg_value, "vlan_ipv4") == 0) {
				p->n_rule_fields =
					RTE_DIM(field_format_vlan_ipv4);
				p->field_format = field_format_vlan_ipv4;
				p->field_format_size =
					sizeof(field_format_vlan_ipv4);
				continue;
			}

			/* qinq_ipv4 */
			if (strcmp(arg_value, "qinq_ipv4") == 0) {
				p->n_rule_fields =
					RTE_DIM(field_format_qinq_ipv4);
				p->field_format = field_format_qinq_ipv4;
				p->field_format_size =
					sizeof(field_format_qinq_ipv4);
				continue;
			}

			/* other */
			PIPELINE_PARSE_ERR_INV_VAL(0, params->name,
				arg_name, arg_value);
		}

		/* other */
		PIPELINE_PARSE_ERR_INV_ENT(0, params->name, arg_name);
	}

	return 0;
}

static void *
pipeline_firewall_init(struct pipeline_params *params,
	__rte_unused void *arg)
{
	struct pipeline *p;
	struct pipeline_firewall *p_fw;
	uint32_t size, i;

	/* Check input arguments */
	if ((params == NULL) ||
		(params->n_ports_in == 0) ||
		(params->n_ports_out == 0))
		return NULL;

	/* Memory allocation */
	size = RTE_CACHE_LINE_ROUNDUP(sizeof(struct pipeline_firewall));
	p = rte_zmalloc(NULL, size, RTE_CACHE_LINE_SIZE);
	p_fw = (struct pipeline_firewall *) p;
	if (p == NULL)
		return NULL;

	strcpy(p->name, params->name);
	p->log_level = params->log_level;

	PLOG(p, HIGH, "Firewall");

	/* Parse arguments */
	if (pipeline_firewall_parse_args(p_fw, params))
		return NULL;

	/* Pipeline */
	{
		struct rte_pipeline_params pipeline_params = {
			.name = params->name,
			.socket_id = params->socket_id,
			.offset_port_id = 0,
		};

		p->p = rte_pipeline_create(&pipeline_params);
		if (p->p == NULL) {
			rte_free(p);
			return NULL;
		}
	}

	/* Input ports */
	p->n_ports_in = params->n_ports_in;
	for (i = 0; i < p->n_ports_in; i++) {
		struct rte_pipeline_port_in_params port_params = {
			.ops = pipeline_port_in_params_get_ops(
				&params->port_in[i]),
			.arg_create = pipeline_port_in_params_convert(
				&params->port_in[i]),
			.f_action = NULL,
			.arg_ah = NULL,
			.burst_size = params->port_in[i].burst_size,
		};

		int status = rte_pipeline_port_in_create(p->p,
			&port_params,
			&p->port_in_id[i]);

		if (status) {
			rte_pipeline_free(p->p);
			rte_free(p);
			return NULL;
		}
	}

	/* Output ports */
	p->n_ports_out = params->n_ports_out;
	for (i = 0; i < p->n_ports_out; i++) {
		struct rte_pipeline_port_out_params port_params = {
			.ops = pipeline_port_out_params_get_ops(
				&params->port_out[i]),
			.arg_create = pipeline_port_out_params_convert(
				&params->port_out[i]),
			.f_action = NULL,
			.arg_ah = NULL,
		};

		int status = rte_pipeline_port_out_create(p->p,
			&port_params,
			&p->port_out_id[i]);

		if (status) {
			rte_pipeline_free(p->p);
			rte_free(p);
			return NULL;
		}
	}

	/* Tables */
	p->n_tables = 1;
	{
		struct rte_table_acl_params table_acl_params = {
			.name = params->name,
			.n_rules = p_fw->n_rules,
			.n_rule_fields = p_fw->n_rule_fields,
		};

		struct rte_pipeline_table_params table_params = {
				.ops = &rte_table_acl_ops,
				.arg_create = &table_acl_params,
				.f_action_hit = NULL,
				.f_action_miss = NULL,
				.arg_ah = NULL,
				.action_data_size =
					sizeof(struct firewall_table_entry) -
					sizeof(struct rte_pipeline_table_entry),
			};

		int status;

		memcpy(table_acl_params.field_format,
			p_fw->field_format,
			p_fw->field_format_size);

		status = rte_pipeline_table_create(p->p,
			&table_params,
			&p->table_id[0]);

		if (status) {
			rte_pipeline_free(p->p);
			rte_free(p);
			return NULL;
		}
	}

	/* Connecting input ports to tables */
	for (i = 0; i < p->n_ports_in; i++) {
		int status = rte_pipeline_port_in_connect_to_table(p->p,
			p->port_in_id[i],
			p->table_id[0]);

		if (status) {
			rte_pipeline_free(p->p);
			rte_free(p);
			return NULL;
		}
	}

	/* Enable input ports */
	for (i = 0; i < p->n_ports_in; i++) {
		int status = rte_pipeline_port_in_enable(p->p,
			p->port_in_id[i]);

		if (status) {
			rte_pipeline_free(p->p);
			rte_free(p);
			return NULL;
		}
	}

	/* Check pipeline consistency */
	if (rte_pipeline_check(p->p) < 0) {
		rte_pipeline_free(p->p);
		rte_free(p);
		return NULL;
	}

	/* Message queues */
	p->n_msgq = params->n_msgq;
	for (i = 0; i < p->n_msgq; i++)
		p->msgq_in[i] = params->msgq_in[i];
	for (i = 0; i < p->n_msgq; i++)
		p->msgq_out[i] = params->msgq_out[i];

	/* Message handlers */
	memcpy(p->handlers, handlers, sizeof(p->handlers));
	memcpy(p_fw->custom_handlers,
		custom_handlers,
		sizeof(p_fw->custom_handlers));

	return p;
}

static int
pipeline_firewall_free(void *pipeline)
{
	struct pipeline *p = (struct pipeline *) pipeline;

	/* Check input arguments */
	if (p == NULL)
		return -1;

	/* Free resources */
	rte_pipeline_free(p->p);
	rte_free(p);
	return 0;
}

static int
pipeline_firewall_timer(void *pipeline)
{
	struct pipeline *p = (struct pipeline *) pipeline;

	pipeline_msg_req_handle(p);
	rte_pipeline_flush(p->p);

	return 0;
}

void *
pipeline_firewall_msg_req_custom_handler(struct pipeline *p,
	void *msg)
{
	struct pipeline_firewall *p_fw = (struct pipeline_firewall *) p;
	struct pipeline_custom_msg_req *req = msg;
	pipeline_msg_req_handler f_handle;

	f_handle = (req->subtype < PIPELINE_FIREWALL_MSG_REQS) ?
		p_fw->custom_handlers[req->subtype] :
		pipeline_msg_req_invalid_handler;

	if (f_handle == NULL)
		f_handle = pipeline_msg_req_invalid_handler;

	return f_handle(p, req);
}

void *
pipeline_firewall_msg_req_add_handler(struct pipeline *p, void *msg)
{
	struct pipeline_firewall_add_msg_req *req = msg;
	struct pipeline_firewall_add_msg_rsp *rsp = msg;

	struct rte_table_acl_rule_add_params params;
	struct firewall_table_entry entry = {
		.head = {
			.action = RTE_PIPELINE_ACTION_PORT,
			{.port_id = p->port_out_id[req->port_id]},
		},
	};

	memset(&params, 0, sizeof(params));

	switch (req->key.type) {
	case PIPELINE_FIREWALL_IPV4_5TUPLE:
		params.priority = req->priority;
		params.field_value[0].value.u8 =
			req->key.key.ipv4_5tuple.proto;
		params.field_value[0].mask_range.u8 =
			req->key.key.ipv4_5tuple.proto_mask;
		params.field_value[1].value.u32 =
			req->key.key.ipv4_5tuple.src_ip;
		params.field_value[1].mask_range.u32 =
			req->key.key.ipv4_5tuple.src_ip_mask;
		params.field_value[2].value.u32 =
			req->key.key.ipv4_5tuple.dst_ip;
		params.field_value[2].mask_range.u32 =
			req->key.key.ipv4_5tuple.dst_ip_mask;
		params.field_value[3].value.u16 =
			req->key.key.ipv4_5tuple.src_port_from;
		params.field_value[3].mask_range.u16 =
			req->key.key.ipv4_5tuple.src_port_to;
		params.field_value[4].value.u16 =
			req->key.key.ipv4_5tuple.dst_port_from;
		params.field_value[4].mask_range.u16 =
			req->key.key.ipv4_5tuple.dst_port_to;
		break;

	default:
		rsp->status = -1; /* Error */
		return rsp;
	}

	rsp->status = rte_pipeline_table_entry_add(p->p,
		p->table_id[0],
		&params,
		(struct rte_pipeline_table_entry *) &entry,
		&rsp->key_found,
		(struct rte_pipeline_table_entry **) &rsp->entry_ptr);

	return rsp;
}

void *
pipeline_firewall_msg_req_del_handler(struct pipeline *p, void *msg)
{
	struct pipeline_firewall_del_msg_req *req = msg;
	struct pipeline_firewall_del_msg_rsp *rsp = msg;

	struct rte_table_acl_rule_delete_params params;

	memset(&params, 0, sizeof(params));

	switch (req->key.type) {
	case PIPELINE_FIREWALL_IPV4_5TUPLE:
		params.field_value[0].value.u8 =
			req->key.key.ipv4_5tuple.proto;
		params.field_value[0].mask_range.u8 =
			req->key.key.ipv4_5tuple.proto_mask;
		params.field_value[1].value.u32 =
			req->key.key.ipv4_5tuple.src_ip;
		params.field_value[1].mask_range.u32 =
			req->key.key.ipv4_5tuple.src_ip_mask;
		params.field_value[2].value.u32 =
			req->key.key.ipv4_5tuple.dst_ip;
		params.field_value[2].mask_range.u32 =
			req->key.key.ipv4_5tuple.dst_ip_mask;
		params.field_value[3].value.u16 =
			req->key.key.ipv4_5tuple.src_port_from;
		params.field_value[3].mask_range.u16 =
			req->key.key.ipv4_5tuple.src_port_to;
		params.field_value[4].value.u16 =
			req->key.key.ipv4_5tuple.dst_port_from;
		params.field_value[4].mask_range.u16 =
			req->key.key.ipv4_5tuple.dst_port_to;
		break;

	default:
		rsp->status = -1; /* Error */
		return rsp;
	}

	rsp->status = rte_pipeline_table_entry_delete(p->p,
		p->table_id[0],
		&params,
		&rsp->key_found,
		NULL);

	return rsp;
}

static void *
pipeline_firewall_msg_req_add_bulk_handler(struct pipeline *p, void *msg)
{
	struct pipeline_firewall_add_bulk_msg_req *req = msg;
	struct pipeline_firewall_add_bulk_msg_rsp *rsp = msg;

	struct rte_table_acl_rule_add_params *params[req->n_keys];
	struct firewall_table_entry *entries[req->n_keys];

	uint32_t i, n_keys;

	n_keys = req->n_keys;

	for (i = 0; i < n_keys; i++) {
		entries[i] = rte_zmalloc(NULL,
				sizeof(struct firewall_table_entry),
				RTE_CACHE_LINE_SIZE);
		if (entries[i] == NULL) {
			rsp->status = -1;
			return rsp;
		}

		params[i] = rte_zmalloc(NULL,
				sizeof(struct rte_table_acl_rule_add_params),
				RTE_CACHE_LINE_SIZE);
		if (params[i] == NULL) {
			rsp->status = -1;
			return rsp;
		}

		entries[i]->head.action = RTE_PIPELINE_ACTION_PORT;
		entries[i]->head.port_id = p->port_out_id[req->port_ids[i]];

		switch (req->keys[i].type) {
		case PIPELINE_FIREWALL_IPV4_5TUPLE:
			params[i]->priority = req->priorities[i];
			params[i]->field_value[0].value.u8 =
				req->keys[i].key.ipv4_5tuple.proto;
			params[i]->field_value[0].mask_range.u8 =
				req->keys[i].key.ipv4_5tuple.proto_mask;
			params[i]->field_value[1].value.u32 =
				req->keys[i].key.ipv4_5tuple.src_ip;
			params[i]->field_value[1].mask_range.u32 =
				req->keys[i].key.ipv4_5tuple.src_ip_mask;
			params[i]->field_value[2].value.u32 =
				req->keys[i].key.ipv4_5tuple.dst_ip;
			params[i]->field_value[2].mask_range.u32 =
				req->keys[i].key.ipv4_5tuple.dst_ip_mask;
			params[i]->field_value[3].value.u16 =
				req->keys[i].key.ipv4_5tuple.src_port_from;
			params[i]->field_value[3].mask_range.u16 =
				req->keys[i].key.ipv4_5tuple.src_port_to;
			params[i]->field_value[4].value.u16 =
				req->keys[i].key.ipv4_5tuple.dst_port_from;
			params[i]->field_value[4].mask_range.u16 =
				req->keys[i].key.ipv4_5tuple.dst_port_to;
			break;

		default:
			rsp->status = -1; /* Error */

			for (i = 0; i < n_keys; i++) {
				rte_free(entries[i]);
				rte_free(params[i]);
			}

			return rsp;
		}
	}

	rsp->status = rte_pipeline_table_entry_add_bulk(p->p, p->table_id[0],
			(void *)params, (struct rte_pipeline_table_entry **)entries,
			n_keys, req->keys_found,
			(struct rte_pipeline_table_entry **)req->entries_ptr);

	for (i = 0; i < n_keys; i++) {
		rte_free(entries[i]);
		rte_free(params[i]);
	}

	return rsp;
}

static void *
pipeline_firewall_msg_req_del_bulk_handler(struct pipeline *p, void *msg)
{
	struct pipeline_firewall_del_bulk_msg_req *req = msg;
	struct pipeline_firewall_del_bulk_msg_rsp *rsp = msg;

	struct rte_table_acl_rule_delete_params *params[req->n_keys];

	uint32_t i, n_keys;

	n_keys = req->n_keys;

	for (i = 0; i < n_keys; i++) {
		params[i] = rte_zmalloc(NULL,
				sizeof(struct rte_table_acl_rule_delete_params),
				RTE_CACHE_LINE_SIZE);
		if (params[i] == NULL) {
			rsp->status = -1;
			return rsp;
		}

		switch (req->keys[i].type) {
		case PIPELINE_FIREWALL_IPV4_5TUPLE:
			params[i]->field_value[0].value.u8 =
				req->keys[i].key.ipv4_5tuple.proto;
			params[i]->field_value[0].mask_range.u8 =
				req->keys[i].key.ipv4_5tuple.proto_mask;
			params[i]->field_value[1].value.u32 =
				req->keys[i].key.ipv4_5tuple.src_ip;
			params[i]->field_value[1].mask_range.u32 =
				req->keys[i].key.ipv4_5tuple.src_ip_mask;
			params[i]->field_value[2].value.u32 =
				req->keys[i].key.ipv4_5tuple.dst_ip;
			params[i]->field_value[2].mask_range.u32 =
				req->keys[i].key.ipv4_5tuple.dst_ip_mask;
			params[i]->field_value[3].value.u16 =
				req->keys[i].key.ipv4_5tuple.src_port_from;
			params[i]->field_value[3].mask_range.u16 =
				req->keys[i].key.ipv4_5tuple.src_port_to;
			params[i]->field_value[4].value.u16 =
				req->keys[i].key.ipv4_5tuple.dst_port_from;
			params[i]->field_value[4].mask_range.u16 =
				req->keys[i].key.ipv4_5tuple.dst_port_to;
			break;

		default:
			rsp->status = -1; /* Error */

			for (i = 0; i < n_keys; i++)
				rte_free(params[i]);

			return rsp;
		}
	}

	rsp->status = rte_pipeline_table_entry_delete_bulk(p->p, p->table_id[0],
			(void **)&params, n_keys, req->keys_found, NULL);

	for (i = 0; i < n_keys; i++)
		rte_free(params[i]);

	return rsp;
}

void *
pipeline_firewall_msg_req_add_default_handler(struct pipeline *p, void *msg)
{
	struct pipeline_firewall_add_default_msg_req *req = msg;
	struct pipeline_firewall_add_default_msg_rsp *rsp = msg;

	struct firewall_table_entry default_entry = {
		.head = {
			.action = RTE_PIPELINE_ACTION_PORT,
			{.port_id = p->port_out_id[req->port_id]},
		},
	};

	rsp->status = rte_pipeline_table_default_entry_add(p->p,
		p->table_id[0],
		(struct rte_pipeline_table_entry *) &default_entry,
		(struct rte_pipeline_table_entry **) &rsp->entry_ptr);

	return rsp;
}

void *
pipeline_firewall_msg_req_del_default_handler(struct pipeline *p, void *msg)
{
	struct pipeline_firewall_del_default_msg_rsp *rsp = msg;

	rsp->status = rte_pipeline_table_default_entry_delete(p->p,
		p->table_id[0],
		NULL);

	return rsp;
}

struct pipeline_be_ops pipeline_firewall_be_ops = {
	.f_init = pipeline_firewall_init,
	.f_free = pipeline_firewall_free,
	.f_run = NULL,
	.f_timer = pipeline_firewall_timer,
};