net: flow_dissector: avoid indirect call to DSA .flow_dissect for generic case
authorVladimir Oltean <vladimir.oltean@nxp.com>
Sat, 26 Sep 2020 19:32:08 +0000 (22:32 +0300)
committerDavid S. Miller <davem@davemloft.net>
Sat, 26 Sep 2020 21:17:59 +0000 (14:17 -0700)
With the recent mitigations against speculative execution exploits,
indirect function calls are more expensive and it would be good to avoid
them where possible.

In the case of DSA, most switch taggers will shift the EtherType and
next headers by a fixed amount equal to that tag's length in bytes.
So we can use a generic procedure to determine that, without calling
into custom tagger code. However we still leave the flow_dissect method
inside struct dsa_device_ops as an override for the generic function.

Suggested-by: Andrew Lunn <andrew@lunn.ch>
Signed-off-by: Vladimir Oltean <vladimir.oltean@nxp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/core/flow_dissector.c

index 13cc4c0..e21950a 100644 (file)
@@ -932,8 +932,14 @@ bool __skb_flow_dissect(const struct net *net,
                        int offset = 0;
 
                        ops = skb->dev->dsa_ptr->tag_ops;
-                       if (ops->flow_dissect) {
-                               ops->flow_dissect(skb, &proto, &offset);
+                       /* Tail taggers don't break flow dissection */
+                       if (!ops->tail_tag) {
+                               if (ops->flow_dissect)
+                                       ops->flow_dissect(skb, &proto, &offset);
+                               else
+                                       dsa_tag_generic_flow_dissect(skb,
+                                                                    &proto,
+                                                                    &offset);
                                hlen -= offset;
                                nhoff += offset;
                        }