archzfs
xxHash
archzfs | xxHash | |
---|---|---|
9 | 28 | |
390 | 8,520 | |
1.3% | - | |
5.9 | 8.3 | |
2 days ago | 2 days ago | |
Shell | C | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
archzfs
-
Can't create archlinux iso with zfs support
# This installs ZFS from the AUR by default. I now use archzfs. It must be setup first. # https://github.com/archzfs/archzfs/wiki paru -S archiso zfs-dkms zfs-utils qemu edk2-ovmf
-
Is anyone else having problems with the zfs AUR packages? Specifically, zfs-dkms?
Just want to add, I didn't have any of these problems using archzfs instead of the AUR packages.
-
arch zfs-dkms: distutils pacakge is deprecated
https://aur.archlinux.org/packages/zfs-linux and archzfs.com both get you back to https://github.com/archzfs/archzfs/wiki - have a look at the maintainers name: minextu. So both, the AUR as well as the pacman repo, contain both the very same packages as their storage backend is the same.
-
Not ever used DKMS before and trying to understand
Since it's a full kernel why are there issues like this https://github.com/archzfs/archzfs/issues/393? Why would it matter that upstream kernel is newer than archzfs package, how would that break anything?
-
No passphrase prompt when trying to boot zfs encrypted root from grub
Which packages are you using? Initcpio hook in AUR zfs-utils doesn't support encrypted root, use archzfs repo.
-
zfs-utils and kernel upgrades
I watch the aur/zfs-dkms comments and check in on the archzfs github/issues.
-
Is Zstd viable for long-term archiving?
No, my information is not outdated. Whether you are getting a package from AUR or from some unofficial repo that you add to your standard repositories doesn't matter. It is still unoffial and if you look at the actual packages in that archzfs repository you will see that the only packages in there are the kernels: https://github.com/archzfs/archzfs/tree/master/packages
-
Systemd-journal missing when /var on separate ZFS dataset
I tried reading zfs-utils mkinitcpio/hooks/zfs, and it looks like it mounts child datasets of root and legacy datasets only.
xxHash
-
The One Billion Row Challenge in CUDA: from 17 minutes to 17 seconds
> GPU Hash Table?
How bad would performance have suffered if you sha256'd the lines to build the map? I'm going to guess "badly"?
Maybe something like this in CUDA: https://github.com/Cyan4973/xxHash ?
- ETag and HTTP Caching
-
Day 64: Implementing a basic Bloom Filter Using Java BitSet api
Examples of fast, simple hashes that are independent enough includes murmur, xxHash, Fowler–Noll–Vo hash function and many others
- Closed-addressing hashtables implementation
-
NIST Retires SHA-1 Cryptographic Algorithm
If you're only using the hash for non-cryptographic applications, there are much faster hashes: https://github.com/Cyan4973/xxHash
-
Does the checksum algorithm crc32c-intel support AMD Ryzen series 3000 or newer?
I found the benchmark result of AMD ryzen 5950X
-
[Study Project] A memory-optimized JSON data structure
But what's the catch, you're thinking ? Well, it is a bit slower than its counterparts when it comes to deserializing (and marginally faster for serializing). To achieve smaller footprint, it uses a few tricks and notably a custom hash table to deduplicate strings. This comes at a cost of course (even when featuring xxHash to speed things up), but keeps the slowdown reasonable (I think).
-
What do you typically use for non-cryptographic hash functions?
Non cryptographic hashes has collisions, for example, assume you having content like "abcdefg" which hashed value is "123", in case of weak hash algorithm some other content like "abcdefZ" can also have a hash "123" which basically means such hash function is failed to be unique fingerprint of particular content. BLAKE3 for example can do 6-7Gb/s which make it pretty fast and secure. If your requirement accepts collision with defined error rate, I would advise you to take a look at XXH3 if you need very snappy hash algorithm, which can run at pace or RAM access (30GB/s+), but again, run tests at particular equipment you targeting, may be AES hardware accelerated MeowHash will serve you better.
- C++ gonna die😥
- rsync, article 3: How does rsync work?
What are some alternatives?
zfs - OpenZFS on Linux and FreeBSD
BLAKE3 - the official Rust and C implementations of the BLAKE3 cryptographic hash function
compsize - btrfs: find compression type/ratio on a file or set of files
meow_hash - Official version of the Meow hash, an extremely fast level 1 hash
systemd - The systemd System and Service Manager
xxh - 🚀 Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.
zfsbootmenu - ZFS Bootloader for root-on-ZFS systems with support for snapshots and native full disk encryption
blake3 - An AVX-512 accelerated implementation of the BLAKE3 cryptographic hash function
zfs-dkms-aur-pkg - NOTE: Use this patch at your own risk. Testing a patch for the zfs-dkms Arch Linux AUR package
smhasher - Hash function quality and speed tests
swift-crypto - Open-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
PostgreSQL - Mirror of the official PostgreSQL GIT repository. Note that this is just a *mirror* - we don't work with pull requests on github. To contribute, please see https://wiki.postgresql.org/wiki/Submitting_a_Patch