From mboxrd@z Thu Jan 1 00:00:00 1970 From: Theodore Ts'o Subject: Re: light weight write barriers Date: Mon, 5 Nov 2012 18:00:51 -0500 Message-ID: <20121105230051.GA31623@thunk.org> References: <20121025060231.GC9860@thunk.org> <20121025140327.GB13562@thunk.org> <20121025182948.GB16257@thunk.org> <20121105200348.GB15821@xo-6d-61-c0.localdomain> <20121105220440.GB25378@thunk.org> Reply-To: General Discussion of SQLite Database Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: david-gFPdbfVZQbY@public.gmane.org, General Discussion of SQLite Database , drh-X1OJI8nnyKUAvxtiuMwx3w@public.gmane.org, linux-kernel , Pavel Machek , linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: Richard Hipp Return-path: Content-Disposition: inline In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: sqlite-users-bounces-CzDROfG0BjIdnm+yROfE0A@public.gmane.org Errors-To: sqlite-users-bounces-CzDROfG0BjIdnm+yROfE0A@public.gmane.org List-Id: linux-fsdevel.vger.kernel.org On Mon, Nov 05, 2012 at 05:37:02PM -0500, Richard Hipp wrote: > > Per the docs: "Only the superuser or a process possessing the > CAP_SYS_RESOURCE capability can set or clear this attribute." That > prevents most applications that run SQLite from being able to take > advantage of this, since most such applications lack elevated privileges. If this feature would prove useful to sqllite, that's something we could address. I could image making this available to processes that belong to a specific group that would be specified in the superblock or as a mount option. (We already have something like that which allows a specific uid or gid to use the reserved space in the superblock.) - Ted From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754946Ab2KEXBG (ORCPT ); Mon, 5 Nov 2012 18:01:06 -0500 Received: from li9-11.members.linode.com ([67.18.176.11]:59504 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751184Ab2KEXBE (ORCPT ); Mon, 5 Nov 2012 18:01:04 -0500 Date: Mon, 5 Nov 2012 18:00:51 -0500 From: "Theodore Ts'o" To: Richard Hipp Cc: General Discussion of SQLite Database , Pavel Machek , david@lang.hm, Nico Williams , ????????? Yang Su Li , linux-fsdevel@vger.kernel.org, linux-kernel , drh@hwaci.com Subject: Re: [sqlite] light weight write barriers Message-ID: <20121105230051.GA31623@thunk.org> Mail-Followup-To: Theodore Ts'o , Richard Hipp , General Discussion of SQLite Database , Pavel Machek , david@lang.hm, Nico Williams , ????????? Yang Su Li , linux-fsdevel@vger.kernel.org, linux-kernel , drh@hwaci.com References: <20121025060231.GC9860@thunk.org> <20121025140327.GB13562@thunk.org> <20121025182948.GB16257@thunk.org> <20121105200348.GB15821@xo-6d-61-c0.localdomain> <20121105220440.GB25378@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 05, 2012 at 05:37:02PM -0500, Richard Hipp wrote: > > Per the docs: "Only the superuser or a process possessing the > CAP_SYS_RESOURCE capability can set or clear this attribute." That > prevents most applications that run SQLite from being able to take > advantage of this, since most such applications lack elevated privileges. If this feature would prove useful to sqllite, that's something we could address. I could image making this available to processes that belong to a specific group that would be specified in the superblock or as a mount option. (We already have something like that which allows a specific uid or gid to use the reserved space in the superblock.) - Ted