The maximum number of devices is limited by `MAX_VSOCK_NUM`.

Extends `vsock_transport` struct with 4 methods to support multi-devices:

* `get_virtio_vsock()`: It receives a CID, and returns a struct of virtio
  vsock. This method is designed to select a vsock device by its CID.
* `get_default_cid()`: It receives nothing, returns the default CID of the
  first vsock device registered to the kernel.
* `get_local_cids()`: It returns a vector of vsock devices' CIDs.
* `compare_order()`: It receives two different CIDs, named "left" and
  "right" respectively. It returns "-1" while the "left" is behind the
  "right". Otherwise, return "1".

`get_local_cid()` is retained, but returns "-1" if the transport supports
multi-devices.

Replaces the single instance of `virtio_vsock` with a list, named
`virtio_vsock_list`. The devices are inserted into the list when probing.

The kernel will deny devices from being registered if there are conflicts
existing in CIDs or orders.

Signed-off-by: Xuewei Niu <niuxuewei....@antgroup.com>
---
 include/net/af_vsock.h                  |  16 ++
 include/uapi/linux/vm_sockets.h         |   6 +
 net/vmw_vsock/af_vsock.c                |  82 ++++++--
 net/vmw_vsock/virtio_transport.c        | 246 ++++++++++++++++++------
 net/vmw_vsock/virtio_transport_common.c |  10 +-
 5 files changed, 293 insertions(+), 67 deletions(-)

diff --git a/include/net/af_vsock.h b/include/net/af_vsock.h
index 535701efc1e5..0151296a0bc5 100644
--- a/include/net/af_vsock.h
+++ b/include/net/af_vsock.h
@@ -174,6 +174,22 @@ struct vsock_transport {
 
        /* Addressing. */
        u32 (*get_local_cid)(void);
+       /* Held rcu read lock by the caller. */
+       struct virtio_vsock *(*get_virtio_vsock)(unsigned int cid);
+       unsigned int (*get_default_cid)(void);
+       /* Get an list containing all the CIDs of registered vsock.   Return
+        * the length of the list.
+        *
+        * Held rcu read lock by the caller.
+        */
+       int (*get_local_cids)(unsigned int *local_cids);
+       /* Compare the order of two devices.  Given the guest CIDs of two
+        * different devices, returns -1 while the left is behind the right.
+        * Otherwise, return 1.
+        *
+        * Held rcu read lock by the caller.
+        */
+       int (*compare_order)(unsigned int left, unsigned int right);
 
        /* Read a single skb */
        int (*read_skb)(struct vsock_sock *, skb_read_actor_t);
diff --git a/include/uapi/linux/vm_sockets.h b/include/uapi/linux/vm_sockets.h
index ed07181d4eff..36ca5023293a 100644
--- a/include/uapi/linux/vm_sockets.h
+++ b/include/uapi/linux/vm_sockets.h
@@ -189,6 +189,12 @@ struct sockaddr_vm {
                               sizeof(__u8)];
 };
 
+/* The maximum number of vsock devices.  Each vsock device has an exclusive
+ * context id.
+ */
+
+#define MAX_VSOCK_NUM 16
+
 #define IOCTL_VM_SOCKETS_GET_LOCAL_CID         _IO(7, 0xb9)
 
 /* MSG_ZEROCOPY notifications are encoded in the standard error format,
diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c
index 54ba7316f808..da06ddc940cd 100644
--- a/net/vmw_vsock/af_vsock.c
+++ b/net/vmw_vsock/af_vsock.c
@@ -234,19 +234,45 @@ static void __vsock_remove_connected(struct vsock_sock 
*vsk)
 
 static struct sock *__vsock_find_bound_socket(struct sockaddr_vm *addr)
 {
-       struct vsock_sock *vsk;
+       struct vsock_sock *vsk, *any_vsk = NULL;
 
+       rcu_read_lock();
        list_for_each_entry(vsk, vsock_bound_sockets(addr), bound_table) {
+               /* The highest priority: full match. */
                if (vsock_addr_equals_addr(addr, &vsk->local_addr))
-                       return sk_vsock(vsk);
+                       goto out;
 
-               if (addr->svm_port == vsk->local_addr.svm_port &&
-                   (vsk->local_addr.svm_cid == VMADDR_CID_ANY ||
-                    addr->svm_cid == VMADDR_CID_ANY))
-                       return sk_vsock(vsk);
+               /* Port match */
+               if (addr->svm_port == vsk->local_addr.svm_port) {
+                       /* The second priority: local cid is VMADDR_CID_ANY. */
+                       if (vsk->local_addr.svm_cid == VMADDR_CID_ANY)
+                               goto out;
+
+                       /* The third priority: local cid isn't VMADDR_CID_ANY. 
*/
+                       if (addr->svm_cid == VMADDR_CID_ANY) {
+                               if (!any_vsk) {
+                                       any_vsk = vsk;
+                                       continue;
+                               }
+                               // Use the device with smaller order
+                               if 
(vsk->transport->compare_order(any_vsk->local_addr.svm_cid,
+                                                                 
vsk->local_addr.svm_cid) < 0)
+                                       any_vsk = vsk;
+                       }
+               }
+       }
+       rcu_read_unlock();
+
+       if (any_vsk) {
+               pr_debug("matched a any_vsk at %p\n", any_vsk);
+               return sk_vsock(any_vsk);
        }
 
        return NULL;
+
+out:
+       rcu_read_unlock();
+       return sk_vsock(vsk);
 }
 
 static struct sock *__vsock_find_connected_socket(struct sockaddr_vm *src,
@@ -408,7 +434,11 @@ static bool vsock_use_local_transport(unsigned int 
remote_cid)
                return true;
 
        if (transport_g2h) {
-               return remote_cid == transport_g2h->get_local_cid();
+               if (transport_g2h->get_virtio_vsock)
+                       return transport_g2h->get_virtio_vsock(remote_cid) !=
+                              NULL;
+               else
+                       return remote_cid == transport_g2h->get_local_cid();
        } else {
                return remote_cid == VMADDR_CID_HOST;
        }
@@ -516,9 +546,26 @@ int vsock_assign_transport(struct vsock_sock *vsk, struct 
vsock_sock *psk)
 }
 EXPORT_SYMBOL_GPL(vsock_assign_transport);
 
+bool transport_g2h_verify_cid(unsigned int cid)
+{
+       /* transports that support multi devices */
+       rcu_read_lock();
+       if (transport_g2h->get_virtio_vsock &&
+           (cid == VMADDR_CID_ANY || transport_g2h->get_virtio_vsock(cid))) {
+               rcu_read_unlock();
+               return true;
+       }
+       rcu_read_unlock();
+       /* other transports */
+       if (cid == transport_g2h->get_local_cid())
+               return true;
+
+       return false;
+}
+
 bool vsock_find_cid(unsigned int cid)
 {
-       if (transport_g2h && cid == transport_g2h->get_local_cid())
+       if (transport_g2h && transport_g2h_verify_cid(cid))
                return true;
 
        if (transport_h2g && cid == VMADDR_CID_HOST)
@@ -697,7 +744,9 @@ static int __vsock_bind(struct sock *sk, struct sockaddr_vm 
*addr)
        /* Now bind to the provided address or select appropriate values if
         * none are provided (VMADDR_CID_ANY and VMADDR_PORT_ANY).  Note that
         * like AF_INET prevents binding to a non-local IP address (in most
-        * cases), we only allow binding to a local CID.
+        * cases), we only allow binding to a local CID. In the cases of
+        * multi-devices, only CIDs of vsock devices registered in the kernel
+        * are allowed.
         */
        if (addr->svm_cid != VMADDR_CID_ANY && !vsock_find_cid(addr->svm_cid))
                return -EADDRNOTAVAIL;
@@ -825,7 +874,6 @@ static void __vsock_release(struct sock *sk, int level)
                        __vsock_release(pending, SINGLE_DEPTH_NESTING);
                        sock_put(pending);
                }
-
                release_sock(sk);
                sock_put(sk);
        }
@@ -1181,7 +1229,12 @@ static int vsock_dgram_sendmsg(struct socket *sock, 
struct msghdr *msg,
                 */
 
                if (remote_addr->svm_cid == VMADDR_CID_ANY)
-                       remote_addr->svm_cid = transport->get_local_cid();
+                       if (transport->get_default_cid)
+                               remote_addr->svm_cid =
+                                       transport->get_default_cid();
+                       else
+                               remote_addr->svm_cid =
+                                       transport->get_local_cid();
 
                if (!vsock_addr_bound(remote_addr)) {
                        err = -EINVAL;
@@ -1191,7 +1244,12 @@ static int vsock_dgram_sendmsg(struct socket *sock, 
struct msghdr *msg,
                remote_addr = &vsk->remote_addr;
 
                if (remote_addr->svm_cid == VMADDR_CID_ANY)
-                       remote_addr->svm_cid = transport->get_local_cid();
+                       if (transport->get_default_cid)
+                               remote_addr->svm_cid =
+                                       transport->get_default_cid();
+                       else
+                               remote_addr->svm_cid =
+                                       transport->get_local_cid();
 
                /* XXX Should connect() or this function ensure remote_addr is
                 * bound?
diff --git a/net/vmw_vsock/virtio_transport.c b/net/vmw_vsock/virtio_transport.c
index ee5d306a96d0..93d25aeafb83 100644
--- a/net/vmw_vsock/virtio_transport.c
+++ b/net/vmw_vsock/virtio_transport.c
@@ -22,8 +22,8 @@
 #include <net/af_vsock.h>
 
 static struct workqueue_struct *virtio_vsock_workqueue;
-static struct virtio_vsock __rcu *the_virtio_vsock;
-static DEFINE_MUTEX(the_virtio_vsock_mutex); /* protects the_virtio_vsock */
+static LIST_HEAD(virtio_vsock_list); /* vsock multi-devices */
+static DEFINE_MUTEX(virtio_vsock_list_mutex); /* protects virtio_vsock_list */
 static struct virtio_transport virtio_transport; /* forward declaration */
 
 struct virtio_vsock {
@@ -62,6 +62,7 @@ struct virtio_vsock {
        struct virtio_vsock_event event_list[8];
 
        u32 guest_cid;
+       u32 order;
        bool seqpacket_allow;
 
        /* These fields are used only in tx path in function
@@ -74,24 +75,70 @@ struct virtio_vsock {
         */
        struct scatterlist *out_sgs[MAX_SKB_FRAGS + 1];
        struct scatterlist out_bufs[MAX_SKB_FRAGS + 1];
+
+       struct list_head node;
+       struct rcu_head rcu;
 };
 
 static u32 virtio_transport_get_local_cid(void)
+{
+       return VMADDR_CID_ANY;
+}
+
+/* Held rcu read lock by the caller. */
+static struct virtio_vsock *virtio_transport_get_virtio_vsock(unsigned int cid)
 {
        struct virtio_vsock *vsock;
-       u32 ret;
+       list_for_each_entry(vsock, &virtio_vsock_list, node) {
+               if (vsock->guest_cid == cid)
+                       return vsock;
+       }
+       return NULL;
+}
 
-       rcu_read_lock();
-       vsock = rcu_dereference(the_virtio_vsock);
-       if (!vsock) {
-               ret = VMADDR_CID_ANY;
-               goto out_rcu;
+static unsigned int virtio_transport_get_default_cid(void)
+{
+       struct virtio_vsock *vsock;
+
+       vsock = list_first_or_null_rcu(&virtio_vsock_list, struct virtio_vsock,
+                                      node);
+       if (!vsock)
+               return VMADDR_CID_ANY;
+
+       return vsock->guest_cid;
+}
+
+/* Held rcu read lock by the caller. */
+static int virtio_transport_get_local_cids(u32 *cids)
+{
+       int count = 0;
+       struct virtio_vsock *vsock;
+
+       if (!cids)
+               return -EFAULT;
+
+       list_for_each_entry(vsock, &virtio_vsock_list, node) {
+               cids[count++] = vsock->guest_cid;
        }
+       return count;
+}
 
-       ret = vsock->guest_cid;
-out_rcu:
-       rcu_read_unlock();
-       return ret;
+/* Held rcu read lock by the caller. */
+static int virtio_transport_compare_order(unsigned int left, unsigned int 
right)
+{
+       struct virtio_vsock *vsock;
+
+       if (left == right)
+               return 0;
+
+       list_for_each_entry(vsock, &virtio_vsock_list, node) {
+               if (right == vsock->guest_cid)
+                       return -1;
+               if (left == vsock->guest_cid)
+                       return 1;
+       }
+
+       return 0;
 }
 
 static void
@@ -201,12 +248,16 @@ virtio_transport_send_pkt(struct sk_buff *skb)
        struct virtio_vsock_hdr *hdr;
        struct virtio_vsock *vsock;
        int len = skb->len;
+       unsigned int src_cid;
 
        hdr = virtio_vsock_hdr(skb);
+       src_cid = le64_to_cpu(hdr->src_cid);
 
        rcu_read_lock();
-       vsock = rcu_dereference(the_virtio_vsock);
+       vsock = virtio_transport_get_virtio_vsock(src_cid);
        if (!vsock) {
+               pr_debug("pkt sending has been failed, as vsock with cid %u not 
found\n",
+                        src_cid);
                kfree_skb(skb);
                len = -ENODEV;
                goto out_rcu;
@@ -236,13 +287,17 @@ virtio_transport_cancel_pkt(struct vsock_sock *vsk)
        int cnt = 0, ret;
 
        rcu_read_lock();
-       vsock = rcu_dereference(the_virtio_vsock);
-       if (!vsock) {
+       if (list_empty(&virtio_vsock_list)) {
                ret = -ENODEV;
                goto out_rcu;
        }
 
-       cnt = virtio_transport_purge_skbs(vsk, &vsock->send_pkt_queue);
+       list_for_each_entry(vsock, &virtio_vsock_list, node) {
+               cnt = virtio_transport_purge_skbs(vsk, &vsock->send_pkt_queue);
+               /* Skbs for the vsk belong to one virtio_vsock */
+               if (cnt)
+                       break;
+       }
 
        if (cnt) {
                struct virtqueue *rx_vq = vsock->vqs[VSOCK_VQ_RX];
@@ -385,6 +440,16 @@ static void virtio_vsock_update_guest_cid(struct 
virtio_vsock *vsock)
        vsock->guest_cid = le64_to_cpu(guest_cid);
 }
 
+static void virtio_vsock_update_order(struct virtio_vsock *vsock)
+{
+       struct virtio_device *vdev = vsock->vdev;
+       __le64 order;
+
+       vdev->config->get(vdev, offsetof(struct virtio_vsock_config, order),
+                         &order, sizeof(order));
+       vsock->order = le64_to_cpu(order);
+}
+
 /* event_lock must be held */
 static void virtio_vsock_event_handle(struct virtio_vsock *vsock,
                                      struct virtio_vsock_event *event)
@@ -492,13 +557,17 @@ static bool virtio_transport_msgzerocopy_allow(void)
        return true;
 }
 
-static bool virtio_transport_seqpacket_allow(u32 remote_cid);
+static bool virtio_transport_seqpacket_allow(u32 src_cid, u32 remote_cid);
 
 static struct virtio_transport virtio_transport = {
        .transport = {
                .module                   = THIS_MODULE,
 
                .get_local_cid            = virtio_transport_get_local_cid,
+               .get_virtio_vsock         = virtio_transport_get_virtio_vsock,
+               .get_default_cid          = virtio_transport_get_default_cid,
+               .get_local_cids           = virtio_transport_get_local_cids,
+               .compare_order            = virtio_transport_compare_order,
 
                .init                     = virtio_transport_do_socket_init,
                .destruct                 = virtio_transport_destruct,
@@ -617,7 +686,38 @@ static void virtio_transport_rx_work(struct work_struct 
*work)
 static int virtio_vsock_vqs_init(struct virtio_vsock *vsock)
 {
        struct virtio_device *vdev = vsock->vdev;
-       static const char * const names[] = {
+       struct virtio_vsock *_vsock = NULL;
+       int i;
+       unsigned int guest_cid, order;
+
+       virtio_vsock_update_guest_cid(vsock);
+       virtio_vsock_update_order(vsock);
+       guest_cid = vsock->guest_cid;
+       order = vsock->order;
+
+       i = 0;
+       list_for_each_entry(_vsock, &virtio_vsock_list, node) {
+               if (++i > MAX_VSOCK_NUM) {
+                       pr_debug("vsock num reaches limit %d\n", MAX_VSOCK_NUM);
+                       return -ENOMEM;
+               }
+
+               /* Check for guest_cid conflicts */
+               if (unlikely(guest_cid == _vsock->guest_cid)) {
+                       pr_debug("conflict exists in vsock's guest_cid %u\n",
+                                guest_cid);
+                       return -EBUSY;
+               }
+
+               /* Check for order conflicts */
+               if (unlikely(order == _vsock->order)) {
+                       pr_debug("conflict exists in vsock's order %u\n",
+                                order);
+                       return -EBUSY;
+               }
+       }
+
+       static const char *const names[] = {
                "rx",
                "tx",
                "event",
@@ -634,8 +734,6 @@ static int virtio_vsock_vqs_init(struct virtio_vsock *vsock)
        if (ret < 0)
                return ret;
 
-       virtio_vsock_update_guest_cid(vsock);
-
        virtio_device_ready(vdev);
 
        return 0;
@@ -716,21 +814,14 @@ static void virtio_vsock_vqs_del(struct virtio_vsock 
*vsock)
 
 static int virtio_vsock_probe(struct virtio_device *vdev)
 {
-       struct virtio_vsock *vsock = NULL;
-       int ret;
-       int i;
+       struct virtio_vsock *vsock, *_vsock, *first_vsock;
+       int ret, i;
+       unsigned int guest_cid, order;
 
-       ret = mutex_lock_interruptible(&the_virtio_vsock_mutex);
+       ret = mutex_lock_interruptible(&virtio_vsock_list_mutex);
        if (ret)
                return ret;
 
-       /* Only one virtio-vsock device per guest is supported */
-       if (rcu_dereference_protected(the_virtio_vsock,
-                               lockdep_is_held(&the_virtio_vsock_mutex))) {
-               ret = -EBUSY;
-               goto out;
-       }
-
        vsock = kzalloc(sizeof(*vsock), GFP_KERNEL);
        if (!vsock) {
                ret = -ENOMEM;
@@ -764,28 +855,56 @@ static int virtio_vsock_probe(struct virtio_device *vdev)
        for (i = 0; i < ARRAY_SIZE(vsock->out_sgs); i++)
                vsock->out_sgs[i] = &vsock->out_bufs[i];
 
-       rcu_assign_pointer(the_virtio_vsock, vsock);
+       order = vsock->order;
+       guest_cid = vsock->guest_cid;
+       first_vsock =
+               list_first_entry(&virtio_vsock_list, struct virtio_vsock, node);
+       /* Insert virtio-vsock device into a proper location. */
+       if (list_empty(&virtio_vsock_list) || first_vsock->order > order) {
+               list_add_rcu(&vsock->node, &virtio_vsock_list);
+       } else {
+               list_for_each_entry(_vsock, &virtio_vsock_list, node) {
+                       struct virtio_vsock *next = 
container_of(_vsock->node.next,
+                               struct virtio_vsock, node);
+                       if (&next->node != &virtio_vsock_list &&
+                           next->order < order)
+                               continue;
+                       list_add_rcu(&vsock->node, &_vsock->node);
+                       break;
+               }
+       }
+
+       pr_debug("virtio_vsock@%p registered (cid = %u, order = %u)\n", vsock, 
guest_cid, order);
+
        virtio_vsock_vqs_start(vsock);
 
-       mutex_unlock(&the_virtio_vsock_mutex);
+       mutex_unlock(&virtio_vsock_list_mutex);
 
        return 0;
 
 out:
        kfree(vsock);
-       mutex_unlock(&the_virtio_vsock_mutex);
+       mutex_unlock(&virtio_vsock_list_mutex);
        return ret;
 }
 
 static void virtio_vsock_remove(struct virtio_device *vdev)
 {
-       struct virtio_vsock *vsock = vdev->priv;
+       struct virtio_vsock *vsock, *_vsock;
 
-       mutex_lock(&the_virtio_vsock_mutex);
+       vsock = vdev->priv;
+
+       mutex_lock(&virtio_vsock_list_mutex);
 
        vdev->priv = NULL;
-       rcu_assign_pointer(the_virtio_vsock, NULL);
-       synchronize_rcu();
+       /* Remove virtio-vsock device from the list. */
+       list_for_each_entry(_vsock, &virtio_vsock_list, node) {
+               if (vsock == _vsock) {
+                       list_del_rcu(&vsock->node);
+                       synchronize_rcu();
+                       break;
+               }
+       }
 
        virtio_vsock_vqs_del(vsock);
 
@@ -797,7 +916,7 @@ static void virtio_vsock_remove(struct virtio_device *vdev)
        flush_work(&vsock->event_work);
        flush_work(&vsock->send_pkt_work);
 
-       mutex_unlock(&the_virtio_vsock_mutex);
+       mutex_unlock(&virtio_vsock_list_mutex);
 
        kfree(vsock);
 }
@@ -805,43 +924,62 @@ static void virtio_vsock_remove(struct virtio_device 
*vdev)
 #ifdef CONFIG_PM_SLEEP
 static int virtio_vsock_freeze(struct virtio_device *vdev)
 {
-       struct virtio_vsock *vsock = vdev->priv;
+       struct virtio_vsock *vsock, *_vsock;
 
-       mutex_lock(&the_virtio_vsock_mutex);
+       vsock = vdev->priv;
 
-       rcu_assign_pointer(the_virtio_vsock, NULL);
-       synchronize_rcu();
+       mutex_lock(&virtio_vsock_list_mutex);
+
+       list_for_each_entry(_vsock, &virtio_vsock_list, node) {
+               if (vsock == _vsock) {
+                       list_del_rcu(&vsock->node);
+                       synchronize_rcu();
+                       break;
+               }
+       }
 
        virtio_vsock_vqs_del(vsock);
 
-       mutex_unlock(&the_virtio_vsock_mutex);
+       mutex_unlock(&virtio_vsock_list_mutex);
 
        return 0;
 }
 
 static int virtio_vsock_restore(struct virtio_device *vdev)
 {
-       struct virtio_vsock *vsock = vdev->priv;
+       struct virtio_vsock *vsock, *_vsock, *first_vsock;
        int ret;
+       unsigned int order;
 
-       mutex_lock(&the_virtio_vsock_mutex);
+       vsock = vdev->priv;
 
-       /* Only one virtio-vsock device per guest is supported */
-       if (rcu_dereference_protected(the_virtio_vsock,
-                               lockdep_is_held(&the_virtio_vsock_mutex))) {
-               ret = -EBUSY;
-               goto out;
-       }
+       mutex_lock(&virtio_vsock_list_mutex);
 
        ret = virtio_vsock_vqs_init(vsock);
        if (ret < 0)
                goto out;
 
-       rcu_assign_pointer(the_virtio_vsock, vsock);
+       order = vsock->order;
+       first_vsock =
+               list_first_entry(&virtio_vsock_list, struct virtio_vsock, node);
+       /* Insert virtio-vsock device into a proper location. */
+       if (list_empty(&virtio_vsock_list) || first_vsock->order > order) {
+               list_add_rcu(&vsock->node, &virtio_vsock_list);
+       } else {
+               list_for_each_entry(_vsock, &virtio_vsock_list, node) {
+                       struct virtio_vsock *next = 
container_of(_vsock->node.next,
+                               struct virtio_vsock, node);
+                       if (&next->node != &virtio_vsock_list &&
+                           next->order < order)
+                               continue;
+                       list_add_rcu(&vsock->node, &_vsock->node);
+                       break;
+               }
+       }
        virtio_vsock_vqs_start(vsock);
 
 out:
-       mutex_unlock(&the_virtio_vsock_mutex);
+       mutex_unlock(&virtio_vsock_list_mutex);
        return ret;
 }
 #endif /* CONFIG_PM_SLEEP */
diff --git a/net/vmw_vsock/virtio_transport_common.c 
b/net/vmw_vsock/virtio_transport_common.c
index 16ff976a86e3..bed75a41419e 100644
--- a/net/vmw_vsock/virtio_transport_common.c
+++ b/net/vmw_vsock/virtio_transport_common.c
@@ -340,7 +340,15 @@ static int virtio_transport_send_pkt_info(struct 
vsock_sock *vsk,
        if (unlikely(!t_ops))
                return -EFAULT;
 
-       src_cid = t_ops->transport.get_local_cid();
+       if (vsk->local_addr.svm_cid == VMADDR_CID_ANY) {
+               if (t_ops->transport.get_default_cid)
+                       src_cid = t_ops->transport.get_default_cid();
+               else
+                       src_cid = t_ops->transport.get_local_cid();
+       } else {
+               src_cid = vsk->local_addr.svm_cid;
+       }
+
        src_port = vsk->local_addr.svm_port;
        if (!info->remote_cid) {
                dst_cid = vsk->remote_addr.svm_cid;
-- 
2.34.1


Reply via email to