The reason for that full cache fetching when called with --noflush even before looking at any input data was that there might be a command requiring a rule cache following some rule add/insert ones which don't. At that point one needs to fetch rules from kernel and try to insert the local ones at the right spot which is non-trivial. At the same time there is a performance-critical use-case for --noflush, namely fast insertion of a bunch of rules in one go, avoiding the process spawn overhead. Optimize for this use-case by preloading input into a 64KB buffer to see if it fits. If so, search for commands requiring a rule cache. If there are none, skip initial full cache fetching. The above algorithm may abort at any point, so actual input parsing must happen in three stages: 1) parse all preloaded lines from 64KB buffer 2) parse any leftover line in line buffer (happens if input exceeds the preload buffer size) 3) parse remaining input from input file pointer Signed-off-by: Phil Sutter <phil@xxxxxx> --- iptables/xtables-restore.c | 88 +++++++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 7 deletions(-) diff --git a/iptables/xtables-restore.c b/iptables/xtables-restore.c index 5a534ca227379..120b444f4b8a5 100644 --- a/iptables/xtables-restore.c +++ b/iptables/xtables-restore.c @@ -248,22 +248,96 @@ static void xtables_restore_parse_line(struct nft_handle *h, } } +/* Return true if given iptables-restore line will require a full cache. + * Typically these are commands referring to an existing rule + * (either by number or content) or commands listing the ruleset. */ +static bool cmd_needs_full_cache(char *cmd) +{ + char c, chain[32]; + int rulenum, mcount; + + mcount = sscanf(cmd, "-%c %31s %d", &c, chain, &rulenum); + + if (mcount == 3) + return true; + if (mcount < 1) + return false; + + switch (c) { + case 'D': + case 'C': + case 'S': + case 'L': + return true; + } + + return false; +} + +#define PREBUFSIZ 65536 + void xtables_restore_parse(struct nft_handle *h, const struct nft_xt_restore_parse *p) { struct nft_xt_restore_state state = {}; - char buffer[10240]; + char preload_buffer[PREBUFSIZ] = {}, buffer[10240], *ptr; - line = 0; - - if (!h->noflush) + if (!h->noflush) { nft_fake_cache(h); - else - nft_build_cache(h, NULL); + } else { + ssize_t pblen = sizeof(preload_buffer); + bool do_cache = false; + + ptr = preload_buffer; + while (fgets(buffer, sizeof(buffer), p->in)) { + size_t blen = strlen(buffer); + + /* drop trailing newline; add_param_to_argv() changes + * it into nul, causing unpredictable string delimiting + * in preload_buffer */ + if (buffer[blen - 1] == '\n') + buffer[blen - 1] = '\0'; + else + blen++; + + pblen -= blen; + if (pblen <= 0) { + /* buffer exhausted */ + do_cache = true; + break; + } - /* Grab standard input. */ + if (cmd_needs_full_cache(buffer)) { + do_cache = true; + break; + } + + /* copy string including terminating nul-char */ + memcpy(ptr, buffer, blen); + ptr += blen; + buffer[0] = '\0'; + } + + if (do_cache) + nft_build_cache(h, NULL); + } + + line = 0; + ptr = preload_buffer; + while (*ptr) { + h->error.lineno = ++line; + DEBUGP("%s: buffered line %d: '%s'\n", __func__, line, ptr); + xtables_restore_parse_line(h, p, &state, ptr); + ptr += strlen(ptr) + 1; + } + if (*buffer) { + h->error.lineno = ++line; + DEBUGP("%s: overrun line %d: '%s'\n", __func__, line, buffer); + xtables_restore_parse_line(h, p, &state, buffer); + } while (fgets(buffer, sizeof(buffer), p->in)) { h->error.lineno = ++line; + DEBUGP("%s: input line %d: '%s'\n", __func__, line, buffer); xtables_restore_parse_line(h, p, &state, buffer); } if (state.in_table && p->commit) { -- 2.23.0