From mboxrd@z Thu Jan 1 00:00:00 1970 From: Theodore Ts'o Subject: Re: light weight write barriers Date: Mon, 5 Nov 2012 18:00:51 -0500 Message-ID: <20121105230051.GA31623@thunk.org> References: <20121025060231.GC9860@thunk.org> <20121025140327.GB13562@thunk.org> <20121025182948.GB16257@thunk.org> <20121105200348.GB15821@xo-6d-61-c0.localdomain> <20121105220440.GB25378@thunk.org> Reply-To: General Discussion of SQLite Database Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: david-gFPdbfVZQbY@public.gmane.org, General Discussion of SQLite Database , drh-X1OJI8nnyKUAvxtiuMwx3w@public.gmane.org, linux-kernel , Pavel Machek , linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: Richard Hipp Return-path: Content-Disposition: inline In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: sqlite-users-bounces-CzDROfG0BjIdnm+yROfE0A@public.gmane.org Errors-To: sqlite-users-bounces-CzDROfG0BjIdnm+yROfE0A@public.gmane.org List-Id: linux-fsdevel.vger.kernel.org On Mon, Nov 05, 2012 at 05:37:02PM -0500, Richard Hipp wrote: > > Per the docs: "Only the superuser or a process possessing the > CAP_SYS_RESOURCE capability can set or clear this attribute." That > prevents most applications that run SQLite from being able to take > advantage of this, since most such applications lack elevated privileges. If this feature would prove useful to sqllite, that's something we could address. I could image making this available to processes that belong to a specific group that would be specified in the superblock or as a mount option. (We already have something like that which allows a specific uid or gid to use the reserved space in the superblock.) - Ted