Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp6933792rwp; Tue, 18 Jul 2023 07:49:27 -0700 (PDT) X-Google-Smtp-Source: APBJJlGUKkYRXslc3BaN8nlW2Y02wUPTdx/Tl7ouVepDpri0kGh6/nSf0KeH99e2gY8hl9juBjiv X-Received: by 2002:aa7:c902:0:b0:521:7417:1131 with SMTP id b2-20020aa7c902000000b0052174171131mr123791edt.15.1689691767027; Tue, 18 Jul 2023 07:49:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689691767; cv=none; d=google.com; s=arc-20160816; b=Nv/ENj66gXBRq3DifWkPFSvdEomc2tNVlmMOXgMXCRAQAfLTPxAY3nt2wEnHrZRQM3 WTwZk14NnQ05a1L4FUyrmnU/BkkFuGKwBOJZkXmg64S9u4OXGxiSpSeiDXA3kClS5Bpf rBEyUydsfyw8xEP8kA7s7rFWIu0Adbe7JJTYfERn/Wyl0KyUCE/+A4s74skHckk+UKRQ Mf4gEcDtiSNesYQrK1OJsZKQF+qiTxAxaLdNP1ITY3nHos6qOveM7WdBDNeXnRt0ztvi iZHWui7NfreSfQW0dW6VfcJHNEKhDMpsNd6sVY2Mn3fbPvHLlACDoyJy5qpfwbd84uS/ R6kA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=J4WeGNbJrUj4slNt8EO38bouft/VykBtoV/D4iepF0A=; fh=FBCngLSclSvkf9FjQEHY1DqVXfX9xwi+ODgaWM375u8=; b=md9Qp/cFYgJ+tQfqcxPwHHMJs1+Hp8nc8ACDBI+wG++dDM9btUk6E0+GoZbmUJ/C+I hb+jSU4TaGe08Duw7jUwf8bYxvWBUUUHRFP5Zn4G2FRIO9J+WWUze+nyL3TLfiWZc+bd zoP7s0sp77MRx1gJOCzMFyQ8RJW9gFZyhntxcJVBM8PBJ/7MyINnuugCqJMMw116AidC ErHa5KfZq4ZWCCfrg6r1M0/5X4yZD2inKTm/BsH67jhaK3muC7Wjtwy3LzKqhObsGNK5 DmuxFudUfaske5v2RhrgXmHKUhRoaznQnr8o+M3Ou5pGvzn+mjbXJ6O6oORaagQPl6s1 Qwkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sberdevices.ru header.s=mail header.b=o6QUySkH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=sberdevices.ru Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y15-20020aa7c24f000000b0052166bfe68asi1284357edo.429.2023.07.18.07.49.02; Tue, 18 Jul 2023 07:49:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@sberdevices.ru header.s=mail header.b=o6QUySkH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=sberdevices.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232742AbjGROPz (ORCPT + 99 others); Tue, 18 Jul 2023 10:15:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42098 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230243AbjGROPy (ORCPT ); Tue, 18 Jul 2023 10:15:54 -0400 Received: from mx1.sberdevices.ru (mx2.sberdevices.ru [45.89.224.132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 47A99170F; Tue, 18 Jul 2023 07:15:46 -0700 (PDT) Received: from p-infra-ksmg-sc-msk02 (localhost [127.0.0.1]) by mx1.sberdevices.ru (Postfix) with ESMTP id 412A312005D; Tue, 18 Jul 2023 17:15:43 +0300 (MSK) DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.sberdevices.ru 412A312005D DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sberdevices.ru; s=mail; t=1689689743; bh=J4WeGNbJrUj4slNt8EO38bouft/VykBtoV/D4iepF0A=; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type:From; b=o6QUySkHBYphYfJ3jTkrwpHpFEIVFN4nNPmdwoqCfAsfFAyDyPuxFwklKtZeLrISE iGFIOumkJGd6xG1bLVzcMDyRCrSXEqqUOLHRUU6btVjQ155bwVk2oj1Psa3ebiYJ7G zGbCi4RL3igCnYiitdtHuR8ha5oYFY2yaAooxjcz//qghMN+HIny7CdgZAoYpz8Jzn pzDonxzFTZ6YpD4ICO8IEKV4Kn0N6kx0iOG3RG1Fn7yXE9STaub7IkCwtLHz0RF7xo FuC/geyUUZSfhdMTgkfYK2m04MtlXpR5p8jGd7SAWgs5AvTP7r/yFCwHtwjgnJc0Qm TP81ElbWWmqKw== Received: from p-i-exch-sc-m01.sberdevices.ru (p-i-exch-sc-m01.sberdevices.ru [172.16.192.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.sberdevices.ru (Postfix) with ESMTPS; Tue, 18 Jul 2023 17:15:43 +0300 (MSK) Received: from [192.168.0.12] (100.64.160.123) by p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.30; Tue, 18 Jul 2023 17:15:42 +0300 Message-ID: <9850943f-9ace-f4e2-edfb-aea9ff6c08e0@sberdevices.ru> Date: Tue, 18 Jul 2023 17:10:16 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Subject: Re: [PATCH net-next v1 4/4] vsock/virtio: MSG_ZEROCOPY flag support To: Stefano Garzarella CC: Stefan Hajnoczi , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , "Michael S. Tsirkin" , Jason Wang , Bobby Eshleman , , , , , , References: <20230717210051.856388-1-AVKrasnov@sberdevices.ru> <20230717210051.856388-5-AVKrasnov@sberdevices.ru> Content-Language: en-US From: Arseniy Krasnov In-Reply-To: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [100.64.160.123] X-ClientProxiedBy: p-i-exch-sc-m02.sberdevices.ru (172.16.192.103) To p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) X-KSMG-Rule-ID: 10 X-KSMG-Message-Action: clean X-KSMG-AntiSpam-Lua-Profiles: 178689 [Jul 18 2023] X-KSMG-AntiSpam-Version: 5.9.59.0 X-KSMG-AntiSpam-Envelope-From: AVKrasnov@sberdevices.ru X-KSMG-AntiSpam-Rate: 0 X-KSMG-AntiSpam-Status: not_detected X-KSMG-AntiSpam-Method: none X-KSMG-AntiSpam-Auth: dkim=none X-KSMG-AntiSpam-Info: LuaCore: 524 524 9753033d6953787301affc41bead8ed49c47b39d, {Tracking_from_domain_doesnt_match_to}, p-i-exch-sc-m01.sberdevices.ru:7.1.1,5.0.1;sberdevices.ru:7.1.1,5.0.1;127.0.0.199:7.1.2;d41d8cd98f00b204e9800998ecf8427e.com:7.1.1;100.64.160.123:7.1.2, FromAlignment: s, {Tracking_white_helo}, ApMailHostAddress: 100.64.160.123 X-MS-Exchange-Organization-SCL: -1 X-KSMG-AntiSpam-Interceptor-Info: scan successful X-KSMG-AntiPhishing: Clean X-KSMG-LinksScanning: Clean X-KSMG-AntiVirus: Kaspersky Secure Mail Gateway, version 2.0.1.6960, bases: 2023/07/18 10:40:00 #21633168 X-KSMG-AntiVirus-Status: Clean, skipped X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 18.07.2023 16:51, Stefano Garzarella wrote: > On Tue, Jul 18, 2023 at 12:00:51AM +0300, Arseniy Krasnov wrote: >> This adds handling of MSG_ZEROCOPY flag on transmission path: if this >> flag is set and zerocopy transmission is possible, then non-linear skb >> will be created and filled with the pages of user's buffer. Pages of >> user's buffer are locked in memory by 'get_user_pages()'. Second thing >> that this patch does is replace type of skb owning: instead of calling >> 'skb_set_owner_sk_safe()' it calls 'skb_set_owner_w()'. Reason of this >> change is that '__zerocopy_sg_from_iter()' increments 'sk_wmem_alloc' >> of socket, so to decrease this field correctly proper skb destructor is >> needed: 'sock_wfree()'. This destructor is set by 'skb_set_owner_w()'. >> >> Signed-off-by: Arseniy Krasnov >> --- >> Changelog: >> v5(big patchset) -> v1: >>  * Refactorings of 'if' conditions. >>  * Remove extra blank line. >>  * Remove 'frag_off' field unneeded init. >>  * Add function 'virtio_transport_fill_skb()' which fills both linear >>    and non-linear skb with provided data. >> >> net/vmw_vsock/virtio_transport_common.c | 260 ++++++++++++++++++------ >> 1 file changed, 197 insertions(+), 63 deletions(-) >> >> diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c >> index 26a4d10da205..1fb0a0f694c6 100644 >> --- a/net/vmw_vsock/virtio_transport_common.c >> +++ b/net/vmw_vsock/virtio_transport_common.c >> @@ -37,73 +37,115 @@ virtio_transport_get_ops(struct vsock_sock *vsk) >>     return container_of(t, struct virtio_transport, transport); >> } >> >> -/* Returns a new packet on success, otherwise returns NULL. >> - * >> - * If NULL is returned, errp is set to a negative errno. >> - */ >> -static struct sk_buff * >> -virtio_transport_alloc_skb(struct virtio_vsock_pkt_info *info, >> -               size_t len, >> -               u32 src_cid, >> -               u32 src_port, >> -               u32 dst_cid, >> -               u32 dst_port) >> -{ >> -    const size_t skb_len = VIRTIO_VSOCK_SKB_HEADROOM + len; >> -    struct virtio_vsock_hdr *hdr; >> -    struct sk_buff *skb; >> -    void *payload; >> -    int err; >> +static bool virtio_transport_can_zcopy(struct virtio_vsock_pkt_info *info, >> +                       size_t max_to_send) >> +{ >> +    struct iov_iter *iov_iter; >> >> -    skb = virtio_vsock_alloc_skb(skb_len, GFP_KERNEL); >> -    if (!skb) >> -        return NULL; >> +    if (!info->msg) >> +        return false; >> >> -    hdr = virtio_vsock_hdr(skb); >> -    hdr->type    = cpu_to_le16(info->type); >> -    hdr->op        = cpu_to_le16(info->op); >> -    hdr->src_cid    = cpu_to_le64(src_cid); >> -    hdr->dst_cid    = cpu_to_le64(dst_cid); >> -    hdr->src_port    = cpu_to_le32(src_port); >> -    hdr->dst_port    = cpu_to_le32(dst_port); >> -    hdr->flags    = cpu_to_le32(info->flags); >> -    hdr->len    = cpu_to_le32(len); >> +    iov_iter = &info->msg->msg_iter; >> >> -    if (info->msg && len > 0) { >> -        payload = skb_put(skb, len); >> -        err = memcpy_from_msg(payload, info->msg, len); >> -        if (err) >> -            goto out; >> +    /* Data is simple buffer. */ >> +    if (iter_is_ubuf(iov_iter)) >> +        return true; >> >> -        if (msg_data_left(info->msg) == 0 && >> -            info->type == VIRTIO_VSOCK_TYPE_SEQPACKET) { >> -            hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOM); >> +    if (!iter_is_iovec(iov_iter)) >> +        return false; >> >> -            if (info->msg->msg_flags & MSG_EOR) >> -                hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOR); >> -        } >> +    if (iov_iter->iov_offset) >> +        return false; >> + >> +    /* We can't send whole iov. */ >> +    if (iov_iter->count > max_to_send) >> +        return false; >> + >> +    return true; >> +} >> + >> +static int virtio_transport_init_zcopy_skb(struct vsock_sock *vsk, >> +                       struct sk_buff *skb, >> +                       struct msghdr *msg, >> +                       bool zerocopy) >> +{ >> +    struct ubuf_info *uarg; >> + >> +    if (msg->msg_ubuf) { >> +        uarg = msg->msg_ubuf; >> +        net_zcopy_get(uarg); >> +    } else { >> +        struct iov_iter *iter = &msg->msg_iter; >> +        struct ubuf_info_msgzc *uarg_zc; >> +        int len; >> + >> +        /* Only ITER_IOVEC or ITER_UBUF are allowed and >> +         * checked before. >> +         */ >> +        if (iter_is_iovec(iter)) >> +            len = iov_length(iter->__iov, iter->nr_segs); >> +        else >> +            len = iter->count; >> + >> +        uarg = msg_zerocopy_realloc(sk_vsock(vsk), >> +                        len, >> +                        NULL); >> +        if (!uarg) >> +            return -1; >> + >> +        uarg_zc = uarg_to_msgzc(uarg); >> +        uarg_zc->zerocopy = zerocopy ? 1 : 0; >>     } >> >> -    if (info->reply) >> -        virtio_vsock_skb_set_reply(skb); >> +    skb_zcopy_init(skb, uarg); >> >> -    trace_virtio_transport_alloc_pkt(src_cid, src_port, >> -                     dst_cid, dst_port, >> -                     len, >> -                     info->type, >> -                     info->op, >> -                     info->flags); >> +    return 0; >> +} >> >> -    if (info->vsk && !skb_set_owner_sk_safe(skb, sk_vsock(info->vsk))) { >> -        WARN_ONCE(1, "failed to allocate skb on vsock socket with sk_refcnt == 0\n"); >> -        goto out; >> +static int virtio_transport_fill_skb(struct sk_buff *skb, >> +                     struct virtio_vsock_pkt_info *info, >> +                     size_t len, >> +                     bool zcopy) >> +{ >> +    if (zcopy) { >> +        return __zerocopy_sg_from_iter(info->msg, NULL, skb, >> +                          &info->msg->msg_iter, >> +                          len); >> +    } else { >> +        void *payload; >> +        int err; >> + >> +        payload = skb_put(skb, len); >> +        err = memcpy_from_msg(payload, info->msg, len); >> +        if (err) >> +            return -1; >> + >> +        if (msg_data_left(info->msg)) >> +            return 0; >> + >> +        return 0; >>     } >> +} >> >> -    return skb; >> +static void virtio_transport_init_hdr(struct sk_buff *skb, >> +                      struct virtio_vsock_pkt_info *info, >> +                      u32 src_cid, >> +                      u32 src_port, >> +                      u32 dst_cid, >> +                      u32 dst_port, >> +                      size_t len) >> +{ >> +    struct virtio_vsock_hdr *hdr; >> >> -out: >> -    kfree_skb(skb); >> -    return NULL; >> +    hdr = virtio_vsock_hdr(skb); >> +    hdr->type    = cpu_to_le16(info->type); >> +    hdr->op        = cpu_to_le16(info->op); >> +    hdr->src_cid    = cpu_to_le64(src_cid); >> +    hdr->dst_cid    = cpu_to_le64(dst_cid); >> +    hdr->src_port    = cpu_to_le32(src_port); >> +    hdr->dst_port    = cpu_to_le32(dst_port); >> +    hdr->flags    = cpu_to_le32(info->flags); >> +    hdr->len    = cpu_to_le32(len); >> } >> >> static void virtio_transport_copy_nonlinear_skb(const struct sk_buff *skb, >> @@ -214,6 +256,70 @@ static u16 virtio_transport_get_type(struct sock *sk) >>         return VIRTIO_VSOCK_TYPE_SEQPACKET; >> } >> >> +static struct sk_buff *virtio_transport_alloc_skb(struct vsock_sock *vsk, >> +                          struct virtio_vsock_pkt_info *info, >> +                          size_t payload_len, >> +                          bool zcopy, >> +                          u32 dst_cid, >> +                          u32 dst_port, >> +                          u32 src_cid, >> +                          u32 src_port) > > Before this patch the order of dst_* and src_* fields were reversed > for virtio_transport_alloc_skb(), why are we changing it? > > I think putting them back as before (and following the same ordering in > the new functions as well) makes the patch easier to review and the code > easier to maintain. Yes, exactly! I'll fix it. Seems I just didn't pay attention on this during coding... Thanks, Arseniy > > Thanks, > Stefano > >> +{ >> +    struct sk_buff *skb; >> +    size_t skb_len; >> + >> +    skb_len = VIRTIO_VSOCK_SKB_HEADROOM; >> + >> +    if (!zcopy) >> +        skb_len += payload_len; >> + >> +    skb = virtio_vsock_alloc_skb(skb_len, GFP_KERNEL); >> +    if (!skb) >> +        return NULL; >> + >> +    virtio_transport_init_hdr(skb, info, src_cid, src_port, >> +                  dst_cid, dst_port, >> +                  payload_len); >> + >> +    /* Set owner here, because '__zerocopy_sg_from_iter()' uses >> +     * owner of skb without check to update 'sk_wmem_alloc'. >> +     */ >> +    if (vsk) >> +        skb_set_owner_w(skb, sk_vsock(vsk)); >> + >> +    if (info->msg && payload_len > 0) { >> +        int err; >> + >> +        err = virtio_transport_fill_skb(skb, info, payload_len, zcopy); >> +        if (err) >> +            goto out; >> + >> +        if (info->type == VIRTIO_VSOCK_TYPE_SEQPACKET) { >> +            struct virtio_vsock_hdr *hdr = virtio_vsock_hdr(skb); >> + >> +            hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOM); >> + >> +            if (info->msg->msg_flags & MSG_EOR) >> +                hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOR); >> +        } >> +    } >> + >> +    if (info->reply) >> +        virtio_vsock_skb_set_reply(skb); >> + >> +    trace_virtio_transport_alloc_pkt(src_cid, src_port, >> +                     dst_cid, dst_port, >> +                     payload_len, >> +                     info->type, >> +                     info->op, >> +                     info->flags); >> + >> +    return skb; >> +out: >> +    kfree_skb(skb); >> +    return NULL; >> +} >> + >> /* This function can only be used on connecting/connected sockets, >>  * since a socket assigned to a transport is required. >>  * >> @@ -222,10 +328,12 @@ static u16 virtio_transport_get_type(struct sock *sk) >> static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, >>                       struct virtio_vsock_pkt_info *info) >> { >> +    u32 max_skb_len = VIRTIO_VSOCK_MAX_PKT_BUF_SIZE; >>     u32 src_cid, src_port, dst_cid, dst_port; >>     const struct virtio_transport *t_ops; >>     struct virtio_vsock_sock *vvs; >>     u32 pkt_len = info->pkt_len; >> +    bool can_zcopy = false; >>     u32 rest_len; >>     int ret; >> >> @@ -254,22 +362,48 @@ static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, >>     if (pkt_len == 0 && info->op == VIRTIO_VSOCK_OP_RW) >>         return pkt_len; >> >> +    if (info->msg) { >> +        /* If zerocopy is not enabled by 'setsockopt()', we behave as >> +         * there is no MSG_ZEROCOPY flag set. >> +         */ >> +        if (!sock_flag(sk_vsock(vsk), SOCK_ZEROCOPY)) >> +            info->msg->msg_flags &= ~MSG_ZEROCOPY; >> + >> +        if (info->msg->msg_flags & MSG_ZEROCOPY) >> +            can_zcopy = virtio_transport_can_zcopy(info, pkt_len); >> + >> +        if (can_zcopy) >> +            max_skb_len = min_t(u32, VIRTIO_VSOCK_MAX_PKT_BUF_SIZE, >> +                        (MAX_SKB_FRAGS * PAGE_SIZE)); >> +    } >> + >>     rest_len = pkt_len; >> >>     do { >>         struct sk_buff *skb; >>         size_t skb_len; >> >> -        skb_len = min_t(u32, VIRTIO_VSOCK_MAX_PKT_BUF_SIZE, rest_len); >> +        skb_len = min(max_skb_len, rest_len); >> >> -        skb = virtio_transport_alloc_skb(info, skb_len, >> -                         src_cid, src_port, >> -                         dst_cid, dst_port); >> +        skb = virtio_transport_alloc_skb(vsk, info, skb_len, can_zcopy, >> +                         dst_cid, dst_port, >> +                         src_cid, src_port); >>         if (!skb) { >>             ret = -ENOMEM; >>             break; >>         } >> >> +        /* This is last skb to send this portion of data. */ >> +        if (info->msg && info->msg->msg_flags & MSG_ZEROCOPY && >> +            skb_len == rest_len && info->op == VIRTIO_VSOCK_OP_RW) { >> +            if (virtio_transport_init_zcopy_skb(vsk, skb, >> +                                info->msg, >> +                                can_zcopy)) { >> +                ret = -ENOMEM; >> +                break; >> +            } >> +        } >> + >>         virtio_transport_inc_tx_pkt(vvs, skb); >> >>         ret = t_ops->send_pkt(skb); >> @@ -934,11 +1068,11 @@ static int virtio_transport_reset_no_sock(const struct virtio_transport *t, >>     if (!t) >>         return -ENOTCONN; >> >> -    reply = virtio_transport_alloc_skb(&info, 0, >> -                       le64_to_cpu(hdr->dst_cid), >> -                       le32_to_cpu(hdr->dst_port), >> +    reply = virtio_transport_alloc_skb(NULL, &info, 0, false, >>                        le64_to_cpu(hdr->src_cid), >> -                       le32_to_cpu(hdr->src_port)); >> +                       le32_to_cpu(hdr->src_port), >> +                       le64_to_cpu(hdr->dst_cid), >> +                       le32_to_cpu(hdr->dst_port)); >>     if (!reply) >>         return -ENOMEM; >> >> --  >> 2.25.1 >> >