On Tue, 2018-09-18 at 08:55 -0400, Jamal Hadi Salim wrote: > Execute permission kind of thing? i.e if i understood you correctly > if acl is "rwx" then attribute can only be written to (or read from) if > the "thing executing" is complete But it's not an attribute that you're executing, it's some kind of command, and then you get the return value of that command in that attribute? Say you want to scan for wifi networks - you trigger a scan, later you get a notification giving you some data about the scan (let's say the time it took) - there's no way you can set that time attribute. (NB: it doesn't work this way, we don't have that attribute now, but I didn't want to pick a more complicated example) > > What would the practical difference be though? Hopefully you wouldn't > > have write-only attributes, and then NLA_REJECT is basically equivalent? > > > > If ACL says "-w-" then reading should get explicit permission denied > code possibly with an extack which is more descriptive that reading > is not allowed. Perhaps. But NLA_REJECT comes with an extack string to tell you, so ... I dunno. I think we already bloated the policies too much by including the validation_data pointer, and would hate to add more to that :-) johannes