From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:33746) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1VwP1F-0008UQ-HL for qemu-devel@nongnu.org; Thu, 26 Dec 2013 23:27:38 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1VwP18-0008Je-MZ for qemu-devel@nongnu.org; Thu, 26 Dec 2013 23:27:29 -0500 Received: from e23smtp09.au.ibm.com ([202.81.31.142]:43953) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1VwP18-0008JX-1C for qemu-devel@nongnu.org; Thu, 26 Dec 2013 23:27:22 -0500 Received: from /spool/local by e23smtp09.au.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 27 Dec 2013 14:27:15 +1000 Received: from d23relay04.au.ibm.com (d23relay04.au.ibm.com [9.190.234.120]) by d23dlp01.au.ibm.com (Postfix) with ESMTP id 537E22CE8054 for ; Fri, 27 Dec 2013 15:27:13 +1100 (EST) Received: from d23av03.au.ibm.com (d23av03.au.ibm.com [9.190.234.97]) by d23relay04.au.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id rBR48fF87209322 for ; Fri, 27 Dec 2013 15:08:42 +1100 Received: from d23av03.au.ibm.com (localhost [127.0.0.1]) by d23av03.au.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id rBR4RBb4006746 for ; Fri, 27 Dec 2013 15:27:11 +1100 Message-ID: <52BD01A3.50603@linux.vnet.ibm.com> Date: Fri, 27 Dec 2013 12:27:15 +0800 From: Wenchao Xia MIME-Version: 1.0 References: <1386940979-3824-1-git-send-email-kwolf@redhat.com> In-Reply-To: <1386940979-3824-1-git-send-email-kwolf@redhat.com> Content-Type: text/plain; charset=GB2312 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH v2 00/24] block: Support for 512b-on-4k emulatio List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Kevin Wolf , qemu-devel@nongnu.org Cc: pbonzini@redhat.com, pl@kamp.de, stefanha@redhat.com For patch 9, 11-18, 20-24 Reviewed-by: Wenchao Xia For patch 10, I am not sure whether there is a risk to bypass I/O limit when bytes is too small: bdrv_io_limits_intercept(bs, bytes >> BDRV_SECTOR_BITS, false);