From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.7 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5670EC43600 for ; Mon, 10 May 2021 13:22:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3114A611CA for ; Mon, 10 May 2021 13:22:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240747AbhEJNXC (ORCPT ); Mon, 10 May 2021 09:23:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:43466 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237828AbhEJLy1 (ORCPT ); Mon, 10 May 2021 07:54:27 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2D6F161260; Mon, 10 May 2021 11:53:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620647600; bh=S/frYV+RL+gPG/czDS1AZnCnH7N9Us8XlnPZZt8DouE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=EyyqaPpShifpm3+DvC/xMWWpTE6D6ioh4bHqN0I8n7cXHAmLXt5pGbu8kWiCCFnFo qmszlMT/REpWHma/7WJtmKIR5M+X3VH7SUxea8zyKI6BKvvy/LnyCbDXDPEb/2swcM qbzhVkhFYC7e55zHxqOnQNkahK29ZNS2uycmTVIqSrJq/Zo03tjuXtzapp9NBAPUab k3zF5MxiGgTAr7JkCLjViKdBATNsyCxFv3cJhOvtpXMTaL1C4LKFugIpyb6AivbN2d IN7kw+HJQNtlF2Pl2UWqNhn1T9FTU3mcfgCnu+WI7D/lHZJ6kH9/rMy3JAeJ4mN6dh thEndIqa0kJpQ== Date: Mon, 10 May 2021 14:53:17 +0300 From: Leon Romanovsky To: Haris Iqbal Cc: Gioh Kim , linux-rdma@vger.kernel.org, bvanassche@acm.org, Doug Ledford , Jason Gunthorpe , Jinpu Wang , Gioh Kim Subject: Re: [PATCH for-next 03/20] RDMA/rtrs-clt: No need to check queue_depth when receiving Message-ID: References: <20210503114818.288896-1-gi-oh.kim@ionos.com> <20210503114818.288896-4-gi-oh.kim@ionos.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-rdma@vger.kernel.org On Mon, May 10, 2021 at 01:00:33PM +0200, Haris Iqbal wrote: > On Sun, May 9, 2021 at 1:24 PM Leon Romanovsky wrote: > > > > On Mon, May 03, 2021 at 01:48:01PM +0200, Gioh Kim wrote: > > > From: Gioh Kim > > > > > > The queue_depth size is sent from server and > > > server already checks validity of the value. > > > > Do you trust server? What will be if server is not reliable and sends > > garbage? > > Hi Leon, > > The server code checks for the queue_depth before sending. If the > server is really running malicious code, then the queue_depth is the > last thing that the client needs to worry about. Like what? for an example? Thanks