New upstream version 18.05
[deb_dpdk.git] / examples / ip_pipeline / pipeline / pipeline_firewall_be.c
diff --git a/examples/ip_pipeline/pipeline/pipeline_firewall_be.c b/examples/ip_pipeline/pipeline/pipeline_firewall_be.c
deleted file mode 100644 (file)
index bd5e1b2..0000000
+++ /dev/null
@@ -1,856 +0,0 @@
-/* SPDX-License-Identifier: BSD-3-Clause
- * Copyright(c) 2010-2016 Intel Corporation
- */
-
-#include <string.h>
-
-#include <rte_common.h>
-#include <rte_malloc.h>
-#include <rte_ether.h>
-#include <rte_ip.h>
-#include <rte_tcp.h>
-#include <rte_byteorder.h>
-#include <rte_table_acl.h>
-
-#include "pipeline_firewall_be.h"
-#include "parser.h"
-
-struct pipeline_firewall {
-       struct pipeline p;
-       pipeline_msg_req_handler custom_handlers[PIPELINE_FIREWALL_MSG_REQS];
-
-       uint32_t n_rules;
-       uint32_t n_rule_fields;
-       struct rte_acl_field_def *field_format;
-       uint32_t field_format_size;
-} __rte_cache_aligned;
-
-static void *
-pipeline_firewall_msg_req_custom_handler(struct pipeline *p, void *msg);
-
-static pipeline_msg_req_handler handlers[] = {
-       [PIPELINE_MSG_REQ_PING] =
-               pipeline_msg_req_ping_handler,
-       [PIPELINE_MSG_REQ_STATS_PORT_IN] =
-               pipeline_msg_req_stats_port_in_handler,
-       [PIPELINE_MSG_REQ_STATS_PORT_OUT] =
-               pipeline_msg_req_stats_port_out_handler,
-       [PIPELINE_MSG_REQ_STATS_TABLE] =
-               pipeline_msg_req_stats_table_handler,
-       [PIPELINE_MSG_REQ_PORT_IN_ENABLE] =
-               pipeline_msg_req_port_in_enable_handler,
-       [PIPELINE_MSG_REQ_PORT_IN_DISABLE] =
-               pipeline_msg_req_port_in_disable_handler,
-       [PIPELINE_MSG_REQ_CUSTOM] =
-               pipeline_firewall_msg_req_custom_handler,
-};
-
-static void *
-pipeline_firewall_msg_req_add_handler(struct pipeline *p, void *msg);
-
-static void *
-pipeline_firewall_msg_req_del_handler(struct pipeline *p, void *msg);
-
-static void *
-pipeline_firewall_msg_req_add_bulk_handler(struct pipeline *p, void *msg);
-
-static void *
-pipeline_firewall_msg_req_del_bulk_handler(struct pipeline *p, void *msg);
-
-static void *
-pipeline_firewall_msg_req_add_default_handler(struct pipeline *p, void *msg);
-
-static void *
-pipeline_firewall_msg_req_del_default_handler(struct pipeline *p, void *msg);
-
-static pipeline_msg_req_handler custom_handlers[] = {
-       [PIPELINE_FIREWALL_MSG_REQ_ADD] =
-               pipeline_firewall_msg_req_add_handler,
-       [PIPELINE_FIREWALL_MSG_REQ_DEL] =
-               pipeline_firewall_msg_req_del_handler,
-       [PIPELINE_FIREWALL_MSG_REQ_ADD_BULK] =
-               pipeline_firewall_msg_req_add_bulk_handler,
-       [PIPELINE_FIREWALL_MSG_REQ_DEL_BULK] =
-               pipeline_firewall_msg_req_del_bulk_handler,
-       [PIPELINE_FIREWALL_MSG_REQ_ADD_DEFAULT] =
-               pipeline_firewall_msg_req_add_default_handler,
-       [PIPELINE_FIREWALL_MSG_REQ_DEL_DEFAULT] =
-               pipeline_firewall_msg_req_del_default_handler,
-};
-
-/*
- * Firewall table
- */
-struct firewall_table_entry {
-       struct rte_pipeline_table_entry head;
-};
-
-static struct rte_acl_field_def field_format_ipv4[] = {
-       /* Protocol */
-       [0] = {
-               .type = RTE_ACL_FIELD_TYPE_BITMASK,
-               .size = sizeof(uint8_t),
-               .field_index = 0,
-               .input_index = 0,
-               .offset = sizeof(struct ether_hdr) +
-                       offsetof(struct ipv4_hdr, next_proto_id),
-       },
-
-       /* Source IP address (IPv4) */
-       [1] = {
-               .type = RTE_ACL_FIELD_TYPE_MASK,
-               .size = sizeof(uint32_t),
-               .field_index = 1,
-               .input_index = 1,
-               .offset = sizeof(struct ether_hdr) +
-                       offsetof(struct ipv4_hdr, src_addr),
-       },
-
-       /* Destination IP address (IPv4) */
-       [2] = {
-               .type = RTE_ACL_FIELD_TYPE_MASK,
-               .size = sizeof(uint32_t),
-               .field_index = 2,
-               .input_index = 2,
-               .offset = sizeof(struct ether_hdr) +
-                       offsetof(struct ipv4_hdr, dst_addr),
-       },
-
-       /* Source Port */
-       [3] = {
-               .type = RTE_ACL_FIELD_TYPE_RANGE,
-               .size = sizeof(uint16_t),
-               .field_index = 3,
-               .input_index = 3,
-               .offset = sizeof(struct ether_hdr) +
-                       sizeof(struct ipv4_hdr) +
-                       offsetof(struct tcp_hdr, src_port),
-       },
-
-       /* Destination Port */
-       [4] = {
-               .type = RTE_ACL_FIELD_TYPE_RANGE,
-               .size = sizeof(uint16_t),
-               .field_index = 4,
-               .input_index = 3,
-               .offset = sizeof(struct ether_hdr) +
-                       sizeof(struct ipv4_hdr) +
-                       offsetof(struct tcp_hdr, dst_port),
-       },
-};
-
-#define SIZEOF_VLAN_HDR                          4
-
-static struct rte_acl_field_def field_format_vlan_ipv4[] = {
-       /* Protocol */
-       [0] = {
-               .type = RTE_ACL_FIELD_TYPE_BITMASK,
-               .size = sizeof(uint8_t),
-               .field_index = 0,
-               .input_index = 0,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_VLAN_HDR +
-                       offsetof(struct ipv4_hdr, next_proto_id),
-       },
-
-       /* Source IP address (IPv4) */
-       [1] = {
-               .type = RTE_ACL_FIELD_TYPE_MASK,
-               .size = sizeof(uint32_t),
-               .field_index = 1,
-               .input_index = 1,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_VLAN_HDR +
-                       offsetof(struct ipv4_hdr, src_addr),
-       },
-
-       /* Destination IP address (IPv4) */
-       [2] = {
-               .type = RTE_ACL_FIELD_TYPE_MASK,
-               .size = sizeof(uint32_t),
-               .field_index = 2,
-               .input_index = 2,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_VLAN_HDR +
-                       offsetof(struct ipv4_hdr, dst_addr),
-       },
-
-       /* Source Port */
-       [3] = {
-               .type = RTE_ACL_FIELD_TYPE_RANGE,
-               .size = sizeof(uint16_t),
-               .field_index = 3,
-               .input_index = 3,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_VLAN_HDR +
-                       sizeof(struct ipv4_hdr) +
-                       offsetof(struct tcp_hdr, src_port),
-       },
-
-       /* Destination Port */
-       [4] = {
-               .type = RTE_ACL_FIELD_TYPE_RANGE,
-               .size = sizeof(uint16_t),
-               .field_index = 4,
-               .input_index = 3,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_VLAN_HDR +
-                       sizeof(struct ipv4_hdr) +
-                       offsetof(struct tcp_hdr, dst_port),
-       },
-};
-
-#define SIZEOF_QINQ_HEADER                       8
-
-static struct rte_acl_field_def field_format_qinq_ipv4[] = {
-       /* Protocol */
-       [0] = {
-               .type = RTE_ACL_FIELD_TYPE_BITMASK,
-               .size = sizeof(uint8_t),
-               .field_index = 0,
-               .input_index = 0,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_QINQ_HEADER +
-                       offsetof(struct ipv4_hdr, next_proto_id),
-       },
-
-       /* Source IP address (IPv4) */
-       [1] = {
-               .type = RTE_ACL_FIELD_TYPE_MASK,
-               .size = sizeof(uint32_t),
-               .field_index = 1,
-               .input_index = 1,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_QINQ_HEADER +
-                       offsetof(struct ipv4_hdr, src_addr),
-       },
-
-       /* Destination IP address (IPv4) */
-       [2] = {
-               .type = RTE_ACL_FIELD_TYPE_MASK,
-               .size = sizeof(uint32_t),
-               .field_index = 2,
-               .input_index = 2,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_QINQ_HEADER +
-                       offsetof(struct ipv4_hdr, dst_addr),
-       },
-
-       /* Source Port */
-       [3] = {
-               .type = RTE_ACL_FIELD_TYPE_RANGE,
-               .size = sizeof(uint16_t),
-               .field_index = 3,
-               .input_index = 3,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_QINQ_HEADER +
-                       sizeof(struct ipv4_hdr) +
-                       offsetof(struct tcp_hdr, src_port),
-       },
-
-       /* Destination Port */
-       [4] = {
-               .type = RTE_ACL_FIELD_TYPE_RANGE,
-               .size = sizeof(uint16_t),
-               .field_index = 4,
-               .input_index = 3,
-               .offset = sizeof(struct ether_hdr) +
-                       SIZEOF_QINQ_HEADER +
-                       sizeof(struct ipv4_hdr) +
-                       offsetof(struct tcp_hdr, dst_port),
-       },
-};
-
-static int
-pipeline_firewall_parse_args(struct pipeline_firewall *p,
-       struct pipeline_params *params)
-{
-       uint32_t n_rules_present = 0;
-       uint32_t pkt_type_present = 0;
-       uint32_t i;
-
-       /* defaults */
-       p->n_rules = 4 * 1024;
-       p->n_rule_fields = RTE_DIM(field_format_ipv4);
-       p->field_format = field_format_ipv4;
-       p->field_format_size = sizeof(field_format_ipv4);
-
-       for (i = 0; i < params->n_args; i++) {
-               char *arg_name = params->args_name[i];
-               char *arg_value = params->args_value[i];
-
-               if (strcmp(arg_name, "n_rules") == 0) {
-                       int status;
-
-                       PIPELINE_PARSE_ERR_DUPLICATE(
-                               n_rules_present == 0, params->name,
-                               arg_name);
-                       n_rules_present = 1;
-
-                       status = parser_read_uint32(&p->n_rules,
-                               arg_value);
-                       PIPELINE_PARSE_ERR_INV_VAL((status != -EINVAL),
-                               params->name, arg_name, arg_value);
-                       PIPELINE_PARSE_ERR_OUT_RNG((status != -ERANGE),
-                               params->name, arg_name, arg_value);
-                       continue;
-               }
-
-               if (strcmp(arg_name, "pkt_type") == 0) {
-                       PIPELINE_PARSE_ERR_DUPLICATE(
-                               pkt_type_present == 0, params->name,
-                               arg_name);
-                       pkt_type_present = 1;
-
-                       /* ipv4 */
-                       if (strcmp(arg_value, "ipv4") == 0) {
-                               p->n_rule_fields = RTE_DIM(field_format_ipv4);
-                               p->field_format = field_format_ipv4;
-                               p->field_format_size =
-                                       sizeof(field_format_ipv4);
-                               continue;
-                       }
-
-                       /* vlan_ipv4 */
-                       if (strcmp(arg_value, "vlan_ipv4") == 0) {
-                               p->n_rule_fields =
-                                       RTE_DIM(field_format_vlan_ipv4);
-                               p->field_format = field_format_vlan_ipv4;
-                               p->field_format_size =
-                                       sizeof(field_format_vlan_ipv4);
-                               continue;
-                       }
-
-                       /* qinq_ipv4 */
-                       if (strcmp(arg_value, "qinq_ipv4") == 0) {
-                               p->n_rule_fields =
-                                       RTE_DIM(field_format_qinq_ipv4);
-                               p->field_format = field_format_qinq_ipv4;
-                               p->field_format_size =
-                                       sizeof(field_format_qinq_ipv4);
-                               continue;
-                       }
-
-                       /* other */
-                       PIPELINE_PARSE_ERR_INV_VAL(0, params->name,
-                               arg_name, arg_value);
-               }
-
-               /* other */
-               PIPELINE_PARSE_ERR_INV_ENT(0, params->name, arg_name);
-       }
-
-       return 0;
-}
-
-static void *
-pipeline_firewall_init(struct pipeline_params *params,
-       __rte_unused void *arg)
-{
-       struct pipeline *p;
-       struct pipeline_firewall *p_fw;
-       uint32_t size, i;
-
-       /* Check input arguments */
-       if ((params == NULL) ||
-               (params->n_ports_in == 0) ||
-               (params->n_ports_out == 0))
-               return NULL;
-
-       /* Memory allocation */
-       size = RTE_CACHE_LINE_ROUNDUP(sizeof(struct pipeline_firewall));
-       p = rte_zmalloc(NULL, size, RTE_CACHE_LINE_SIZE);
-       p_fw = (struct pipeline_firewall *) p;
-       if (p == NULL)
-               return NULL;
-
-       strcpy(p->name, params->name);
-       p->log_level = params->log_level;
-
-       PLOG(p, HIGH, "Firewall");
-
-       /* Parse arguments */
-       if (pipeline_firewall_parse_args(p_fw, params))
-               return NULL;
-
-       /* Pipeline */
-       {
-               struct rte_pipeline_params pipeline_params = {
-                       .name = params->name,
-                       .socket_id = params->socket_id,
-                       .offset_port_id = 0,
-               };
-
-               p->p = rte_pipeline_create(&pipeline_params);
-               if (p->p == NULL) {
-                       rte_free(p);
-                       return NULL;
-               }
-       }
-
-       /* Input ports */
-       p->n_ports_in = params->n_ports_in;
-       for (i = 0; i < p->n_ports_in; i++) {
-               struct rte_pipeline_port_in_params port_params = {
-                       .ops = pipeline_port_in_params_get_ops(
-                               &params->port_in[i]),
-                       .arg_create = pipeline_port_in_params_convert(
-                               &params->port_in[i]),
-                       .f_action = NULL,
-                       .arg_ah = NULL,
-                       .burst_size = params->port_in[i].burst_size,
-               };
-
-               int status = rte_pipeline_port_in_create(p->p,
-                       &port_params,
-                       &p->port_in_id[i]);
-
-               if (status) {
-                       rte_pipeline_free(p->p);
-                       rte_free(p);
-                       return NULL;
-               }
-       }
-
-       /* Output ports */
-       p->n_ports_out = params->n_ports_out;
-       for (i = 0; i < p->n_ports_out; i++) {
-               struct rte_pipeline_port_out_params port_params = {
-                       .ops = pipeline_port_out_params_get_ops(
-                               &params->port_out[i]),
-                       .arg_create = pipeline_port_out_params_convert(
-                               &params->port_out[i]),
-                       .f_action = NULL,
-                       .arg_ah = NULL,
-               };
-
-               int status = rte_pipeline_port_out_create(p->p,
-                       &port_params,
-                       &p->port_out_id[i]);
-
-               if (status) {
-                       rte_pipeline_free(p->p);
-                       rte_free(p);
-                       return NULL;
-               }
-       }
-
-       /* Tables */
-       p->n_tables = 1;
-       {
-               struct rte_table_acl_params table_acl_params = {
-                       .name = params->name,
-                       .n_rules = p_fw->n_rules,
-                       .n_rule_fields = p_fw->n_rule_fields,
-               };
-
-               struct rte_pipeline_table_params table_params = {
-                               .ops = &rte_table_acl_ops,
-                               .arg_create = &table_acl_params,
-                               .f_action_hit = NULL,
-                               .f_action_miss = NULL,
-                               .arg_ah = NULL,
-                               .action_data_size =
-                                       sizeof(struct firewall_table_entry) -
-                                       sizeof(struct rte_pipeline_table_entry),
-                       };
-
-               int status;
-
-               memcpy(table_acl_params.field_format,
-                       p_fw->field_format,
-                       p_fw->field_format_size);
-
-               status = rte_pipeline_table_create(p->p,
-                       &table_params,
-                       &p->table_id[0]);
-
-               if (status) {
-                       rte_pipeline_free(p->p);
-                       rte_free(p);
-                       return NULL;
-               }
-       }
-
-       /* Connecting input ports to tables */
-       for (i = 0; i < p->n_ports_in; i++) {
-               int status = rte_pipeline_port_in_connect_to_table(p->p,
-                       p->port_in_id[i],
-                       p->table_id[0]);
-
-               if (status) {
-                       rte_pipeline_free(p->p);
-                       rte_free(p);
-                       return NULL;
-               }
-       }
-
-       /* Enable input ports */
-       for (i = 0; i < p->n_ports_in; i++) {
-               int status = rte_pipeline_port_in_enable(p->p,
-                       p->port_in_id[i]);
-
-               if (status) {
-                       rte_pipeline_free(p->p);
-                       rte_free(p);
-                       return NULL;
-               }
-       }
-
-       /* Check pipeline consistency */
-       if (rte_pipeline_check(p->p) < 0) {
-               rte_pipeline_free(p->p);
-               rte_free(p);
-               return NULL;
-       }
-
-       /* Message queues */
-       p->n_msgq = params->n_msgq;
-       for (i = 0; i < p->n_msgq; i++)
-               p->msgq_in[i] = params->msgq_in[i];
-       for (i = 0; i < p->n_msgq; i++)
-               p->msgq_out[i] = params->msgq_out[i];
-
-       /* Message handlers */
-       memcpy(p->handlers, handlers, sizeof(p->handlers));
-       memcpy(p_fw->custom_handlers,
-               custom_handlers,
-               sizeof(p_fw->custom_handlers));
-
-       return p;
-}
-
-static int
-pipeline_firewall_free(void *pipeline)
-{
-       struct pipeline *p = (struct pipeline *) pipeline;
-
-       /* Check input arguments */
-       if (p == NULL)
-               return -1;
-
-       /* Free resources */
-       rte_pipeline_free(p->p);
-       rte_free(p);
-       return 0;
-}
-
-static int
-pipeline_firewall_timer(void *pipeline)
-{
-       struct pipeline *p = (struct pipeline *) pipeline;
-
-       pipeline_msg_req_handle(p);
-       rte_pipeline_flush(p->p);
-
-       return 0;
-}
-
-void *
-pipeline_firewall_msg_req_custom_handler(struct pipeline *p,
-       void *msg)
-{
-       struct pipeline_firewall *p_fw = (struct pipeline_firewall *) p;
-       struct pipeline_custom_msg_req *req = msg;
-       pipeline_msg_req_handler f_handle;
-
-       f_handle = (req->subtype < PIPELINE_FIREWALL_MSG_REQS) ?
-               p_fw->custom_handlers[req->subtype] :
-               pipeline_msg_req_invalid_handler;
-
-       if (f_handle == NULL)
-               f_handle = pipeline_msg_req_invalid_handler;
-
-       return f_handle(p, req);
-}
-
-void *
-pipeline_firewall_msg_req_add_handler(struct pipeline *p, void *msg)
-{
-       struct pipeline_firewall_add_msg_req *req = msg;
-       struct pipeline_firewall_add_msg_rsp *rsp = msg;
-
-       struct rte_table_acl_rule_add_params params;
-       struct firewall_table_entry entry = {
-               .head = {
-                       .action = RTE_PIPELINE_ACTION_PORT,
-                       {.port_id = p->port_out_id[req->port_id]},
-               },
-       };
-
-       memset(&params, 0, sizeof(params));
-
-       switch (req->key.type) {
-       case PIPELINE_FIREWALL_IPV4_5TUPLE:
-               params.priority = req->priority;
-               params.field_value[0].value.u8 =
-                       req->key.key.ipv4_5tuple.proto;
-               params.field_value[0].mask_range.u8 =
-                       req->key.key.ipv4_5tuple.proto_mask;
-               params.field_value[1].value.u32 =
-                       req->key.key.ipv4_5tuple.src_ip;
-               params.field_value[1].mask_range.u32 =
-                       req->key.key.ipv4_5tuple.src_ip_mask;
-               params.field_value[2].value.u32 =
-                       req->key.key.ipv4_5tuple.dst_ip;
-               params.field_value[2].mask_range.u32 =
-                       req->key.key.ipv4_5tuple.dst_ip_mask;
-               params.field_value[3].value.u16 =
-                       req->key.key.ipv4_5tuple.src_port_from;
-               params.field_value[3].mask_range.u16 =
-                       req->key.key.ipv4_5tuple.src_port_to;
-               params.field_value[4].value.u16 =
-                       req->key.key.ipv4_5tuple.dst_port_from;
-               params.field_value[4].mask_range.u16 =
-                       req->key.key.ipv4_5tuple.dst_port_to;
-               break;
-
-       default:
-               rsp->status = -1; /* Error */
-               return rsp;
-       }
-
-       rsp->status = rte_pipeline_table_entry_add(p->p,
-               p->table_id[0],
-               &params,
-               (struct rte_pipeline_table_entry *) &entry,
-               &rsp->key_found,
-               (struct rte_pipeline_table_entry **) &rsp->entry_ptr);
-
-       return rsp;
-}
-
-void *
-pipeline_firewall_msg_req_del_handler(struct pipeline *p, void *msg)
-{
-       struct pipeline_firewall_del_msg_req *req = msg;
-       struct pipeline_firewall_del_msg_rsp *rsp = msg;
-
-       struct rte_table_acl_rule_delete_params params;
-
-       memset(&params, 0, sizeof(params));
-
-       switch (req->key.type) {
-       case PIPELINE_FIREWALL_IPV4_5TUPLE:
-               params.field_value[0].value.u8 =
-                       req->key.key.ipv4_5tuple.proto;
-               params.field_value[0].mask_range.u8 =
-                       req->key.key.ipv4_5tuple.proto_mask;
-               params.field_value[1].value.u32 =
-                       req->key.key.ipv4_5tuple.src_ip;
-               params.field_value[1].mask_range.u32 =
-                       req->key.key.ipv4_5tuple.src_ip_mask;
-               params.field_value[2].value.u32 =
-                       req->key.key.ipv4_5tuple.dst_ip;
-               params.field_value[2].mask_range.u32 =
-                       req->key.key.ipv4_5tuple.dst_ip_mask;
-               params.field_value[3].value.u16 =
-                       req->key.key.ipv4_5tuple.src_port_from;
-               params.field_value[3].mask_range.u16 =
-                       req->key.key.ipv4_5tuple.src_port_to;
-               params.field_value[4].value.u16 =
-                       req->key.key.ipv4_5tuple.dst_port_from;
-               params.field_value[4].mask_range.u16 =
-                       req->key.key.ipv4_5tuple.dst_port_to;
-               break;
-
-       default:
-               rsp->status = -1; /* Error */
-               return rsp;
-       }
-
-       rsp->status = rte_pipeline_table_entry_delete(p->p,
-               p->table_id[0],
-               &params,
-               &rsp->key_found,
-               NULL);
-
-       return rsp;
-}
-
-static void *
-pipeline_firewall_msg_req_add_bulk_handler(struct pipeline *p, void *msg)
-{
-       struct pipeline_firewall_add_bulk_msg_req *req = msg;
-       struct pipeline_firewall_add_bulk_msg_rsp *rsp = msg;
-
-       struct rte_table_acl_rule_add_params *params[req->n_keys];
-       struct firewall_table_entry *entries[req->n_keys];
-
-       uint32_t i, n_keys;
-
-       n_keys = req->n_keys;
-
-       for (i = 0; i < n_keys; i++) {
-               entries[i] = rte_zmalloc(NULL,
-                               sizeof(struct firewall_table_entry),
-                               RTE_CACHE_LINE_SIZE);
-               if (entries[i] == NULL) {
-                       rsp->status = -1;
-                       return rsp;
-               }
-
-               params[i] = rte_zmalloc(NULL,
-                               sizeof(struct rte_table_acl_rule_add_params),
-                               RTE_CACHE_LINE_SIZE);
-               if (params[i] == NULL) {
-                       rsp->status = -1;
-                       return rsp;
-               }
-
-               entries[i]->head.action = RTE_PIPELINE_ACTION_PORT;
-               entries[i]->head.port_id = p->port_out_id[req->port_ids[i]];
-
-               switch (req->keys[i].type) {
-               case PIPELINE_FIREWALL_IPV4_5TUPLE:
-                       params[i]->priority = req->priorities[i];
-                       params[i]->field_value[0].value.u8 =
-                               req->keys[i].key.ipv4_5tuple.proto;
-                       params[i]->field_value[0].mask_range.u8 =
-                               req->keys[i].key.ipv4_5tuple.proto_mask;
-                       params[i]->field_value[1].value.u32 =
-                               req->keys[i].key.ipv4_5tuple.src_ip;
-                       params[i]->field_value[1].mask_range.u32 =
-                               req->keys[i].key.ipv4_5tuple.src_ip_mask;
-                       params[i]->field_value[2].value.u32 =
-                               req->keys[i].key.ipv4_5tuple.dst_ip;
-                       params[i]->field_value[2].mask_range.u32 =
-                               req->keys[i].key.ipv4_5tuple.dst_ip_mask;
-                       params[i]->field_value[3].value.u16 =
-                               req->keys[i].key.ipv4_5tuple.src_port_from;
-                       params[i]->field_value[3].mask_range.u16 =
-                               req->keys[i].key.ipv4_5tuple.src_port_to;
-                       params[i]->field_value[4].value.u16 =
-                               req->keys[i].key.ipv4_5tuple.dst_port_from;
-                       params[i]->field_value[4].mask_range.u16 =
-                               req->keys[i].key.ipv4_5tuple.dst_port_to;
-                       break;
-
-               default:
-                       rsp->status = -1; /* Error */
-
-                       for (i = 0; i < n_keys; i++) {
-                               rte_free(entries[i]);
-                               rte_free(params[i]);
-                       }
-
-                       return rsp;
-               }
-       }
-
-       rsp->status = rte_pipeline_table_entry_add_bulk(p->p, p->table_id[0],
-                       (void *)params, (struct rte_pipeline_table_entry **)entries,
-                       n_keys, req->keys_found,
-                       (struct rte_pipeline_table_entry **)req->entries_ptr);
-
-       for (i = 0; i < n_keys; i++) {
-               rte_free(entries[i]);
-               rte_free(params[i]);
-       }
-
-       return rsp;
-}
-
-static void *
-pipeline_firewall_msg_req_del_bulk_handler(struct pipeline *p, void *msg)
-{
-       struct pipeline_firewall_del_bulk_msg_req *req = msg;
-       struct pipeline_firewall_del_bulk_msg_rsp *rsp = msg;
-
-       struct rte_table_acl_rule_delete_params *params[req->n_keys];
-
-       uint32_t i, n_keys;
-
-       n_keys = req->n_keys;
-
-       for (i = 0; i < n_keys; i++) {
-               params[i] = rte_zmalloc(NULL,
-                               sizeof(struct rte_table_acl_rule_delete_params),
-                               RTE_CACHE_LINE_SIZE);
-               if (params[i] == NULL) {
-                       rsp->status = -1;
-                       return rsp;
-               }
-
-               switch (req->keys[i].type) {
-               case PIPELINE_FIREWALL_IPV4_5TUPLE:
-                       params[i]->field_value[0].value.u8 =
-                               req->keys[i].key.ipv4_5tuple.proto;
-                       params[i]->field_value[0].mask_range.u8 =
-                               req->keys[i].key.ipv4_5tuple.proto_mask;
-                       params[i]->field_value[1].value.u32 =
-                               req->keys[i].key.ipv4_5tuple.src_ip;
-                       params[i]->field_value[1].mask_range.u32 =
-                               req->keys[i].key.ipv4_5tuple.src_ip_mask;
-                       params[i]->field_value[2].value.u32 =
-                               req->keys[i].key.ipv4_5tuple.dst_ip;
-                       params[i]->field_value[2].mask_range.u32 =
-                               req->keys[i].key.ipv4_5tuple.dst_ip_mask;
-                       params[i]->field_value[3].value.u16 =
-                               req->keys[i].key.ipv4_5tuple.src_port_from;
-                       params[i]->field_value[3].mask_range.u16 =
-                               req->keys[i].key.ipv4_5tuple.src_port_to;
-                       params[i]->field_value[4].value.u16 =
-                               req->keys[i].key.ipv4_5tuple.dst_port_from;
-                       params[i]->field_value[4].mask_range.u16 =
-                               req->keys[i].key.ipv4_5tuple.dst_port_to;
-                       break;
-
-               default:
-                       rsp->status = -1; /* Error */
-
-                       for (i = 0; i < n_keys; i++)
-                               rte_free(params[i]);
-
-                       return rsp;
-               }
-       }
-
-       rsp->status = rte_pipeline_table_entry_delete_bulk(p->p, p->table_id[0],
-                       (void **)&params, n_keys, req->keys_found, NULL);
-
-       for (i = 0; i < n_keys; i++)
-               rte_free(params[i]);
-
-       return rsp;
-}
-
-void *
-pipeline_firewall_msg_req_add_default_handler(struct pipeline *p, void *msg)
-{
-       struct pipeline_firewall_add_default_msg_req *req = msg;
-       struct pipeline_firewall_add_default_msg_rsp *rsp = msg;
-
-       struct firewall_table_entry default_entry = {
-               .head = {
-                       .action = RTE_PIPELINE_ACTION_PORT,
-                       {.port_id = p->port_out_id[req->port_id]},
-               },
-       };
-
-       rsp->status = rte_pipeline_table_default_entry_add(p->p,
-               p->table_id[0],
-               (struct rte_pipeline_table_entry *) &default_entry,
-               (struct rte_pipeline_table_entry **) &rsp->entry_ptr);
-
-       return rsp;
-}
-
-void *
-pipeline_firewall_msg_req_del_default_handler(struct pipeline *p, void *msg)
-{
-       struct pipeline_firewall_del_default_msg_rsp *rsp = msg;
-
-       rsp->status = rte_pipeline_table_default_entry_delete(p->p,
-               p->table_id[0],
-               NULL);
-
-       return rsp;
-}
-
-struct pipeline_be_ops pipeline_firewall_be_ops = {
-       .f_init = pipeline_firewall_init,
-       .f_free = pipeline_firewall_free,
-       .f_run = NULL,
-       .f_timer = pipeline_firewall_timer,
-};