From patchwork Thu May 21 19:26:18 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 1295630 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=default header.b=asPMJFNl; dkim-atps=neutral Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 49Sg304hPGz9sPK for ; Fri, 22 May 2020 05:41:00 +1000 (AEST) Received: from localhost ([::1]:35564 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jbr3q-0004kM-4m for incoming@patchwork.ozlabs.org; Thu, 21 May 2020 15:40:58 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:39140) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jbqpj-0007PZ-2f for qemu-devel@nongnu.org; Thu, 21 May 2020 15:26:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:46286) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jbqph-0002Vp-3p for qemu-devel@nongnu.org; Thu, 21 May 2020 15:26:21 -0400 Received: from localhost (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AF82B207D3; Thu, 21 May 2020 19:26:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590089178; bh=ki94ysDPLd0jah7a7GG1kI1agnwvLUey3EkW+g+S+Gc=; h=Date:From:To:cc:Subject:From; b=asPMJFNlyLCZJ2E/gkSHZd33sAik4bs6qHyGyZnytRz+Cq8pzED5dIpmXAFmoWe1L v5GL2a+obyvUg2uowyU+IrgD1P3CjD0zU7Qi4jE+chbnBx+OlPwuKVlxLPafybJUdb nmysKgzTn4sm/zpAlo4nKUm3Yi6E4Ko+mo1irOn4= Date: Thu, 21 May 2020 12:26:18 -0700 (PDT) From: Stefano Stabellini X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s To: groug@kaod.org, qemu_oss@crudebyte.com Subject: [PATCH v2 0/3] revert 9pfs reply truncation, wait for free room to reply Message-ID: User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Received-SPF: pass client-ip=198.145.29.99; envelope-from=sstabellini@kernel.org; helo=mail.kernel.org X-detected-operating-system: by eggs.gnu.org: First seen = 2020/05/21 15:26:19 X-ACL-Warn: Detected OS = Linux 3.11 and newer X-Spam_score_int: -70 X-Spam_score: -7.1 X-Spam_bar: ------- X-Spam_report: (-7.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001 autolearn=_AUTOLEARN X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: anthony.perard@citrix.com, sstabellini@kernel.org, qemu-devel@nongnu.org, paul@xen.org Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: "Qemu-devel" Hi all, This short series reverts commit 16724a173049ac29c7b5ade741da93a0f46edff becauses it is the cause for https://bugs.launchpad.net/bugs/1877688. The original issue addressed by 16724a173049ac29c7b5ade741da93a0f46edff is solved differently in this series by using qemu_coroutine_yield() to wait for the client to free more data from the ring before sending the reply. Cheers, Stefano Changes in v2: - add comments on barriers - add patch to increase ring size to the max allowed