I wonder if this improves a dual raid nvme system at all and not just quad or higher groups? I am using a pair of gen 4 drives in raid 0 and when I have tried games it appears that most of the load time is decompression/processing the data, not loading off a disk.
Optimizing Linux MD Bitmap Code Yields 89% Throughput Boost For Quad SSDs
Collapse
X
-
Fine I will be the douche that says it: this comes from Chinese researchers working at a Chinese university, last time we trusted anything from a Chinese developer it took 2 years to realize that a backdoor existed.
I don't care who reviews this code, I can see the articles in a few years already about how this compromised systems that used it and no one noticed until a Microsoft engineer was having problems with his system.
Comment
-
-
Originally posted by sophisticles View PostFine I will be the douche that says it: this comes from Chinese researchers working at a Chinese university, last time we trusted anything from a Chinese developer it took 2 years to realize that a backdoor existed.
I don't care who reviews this code, I can see the articles in a few years already about how this compromised systems that used it and no one noticed until a Microsoft engineer was having problems with his system.
Comment
-
-
Originally posted by npwx View Post
Assuming you're not just trolling, that is something exceptionally stupid to say, even for your standards. There are plenty of chinese developers regulary contributing code to the Linux kernel and elsewhere.
I don't need "plenty", just one, and he or she needs to be contributing code at regular intervals and must be physically located in China and working for a Chinese university.
Just one.
Comment
-
-
Originally posted by npwx View Post
Assuming you're not just trolling, that is something exceptionally stupid to say, even for your standards. There are plenty of chinese developers regulary contributing code to the Linux kernel and elsewhere.
Comment
-
-
Originally posted by lowflyer View PostNo. that's NOT stupid. Not even remotely exceptionally. It's just the kind of prudence that should be enforced by now. The signs of changing time's are getting obvious by now. You must be living under a rock if you don't see them.
That's not to say we shouldn't concern with what's being submitted to the kernel, but rather, being sourced from China isn't a compelling reason to care more; all code from all sources should be vetted.
Comment
-
-
Originally posted by schmidtbag View PostIt's stupid if you think other governments aren't just as capable of doing the same thing. At least if the Chinese government is spying on me, I can probably extrapolate what it is they're trying to find and what they intend to do with it.
That's not to say we shouldn't concern with what's being submitted to the kernel, but rather, being sourced from China isn't a compelling reason to care more; all code from all sources should be vetted.
Thinking that "you can extrapolate the intentions" of a malicious actor is blue-eyed. You would not even know that you have been set-up.
Commonplaces like "all code from all sources should be vetted" do not help because that's like saying "if the others would do like I do ...". Saying "being sourced from China isn't a compelling reason" is being blue-eyed.
Let me repeat: This is not about China specifically. A few years back I had another incident that was caused by a German developer.
Comment
-
-
Originally posted by lowflyer View PostI did not mention "China". But having had an issue with a Chinese developer recently in our company I'd say it is foolish to assume that similar issues do not happen in open source projects. This is not against China specifically. There are numerous "forces" attempting to exercise power over their adversaries. Open source projects are a prime target for them because they are ... exactly: "open".
Open source's weakness is also its strength: while just about anyone can make malicious/devious changes without much restriction, just about anyone can identify such changes too. So really, if large open-source projects are to be safe, all it really takes is having enough eyes (ideally anonymous) inspect the commits for suspicious activity. Personally, I think this is necessary beyond security reasons - it's also good to identify potential conflicts or inefficient code.
Thinking that "you can extrapolate the intentions" of a malicious actor is blue-eyed. You would not even know that you have been set-up.
I would be more worried about a NATO country spying on me, since they have a lot more power over my life.
Commonplaces like "all code from all sources should be vetted" do not help because that's like saying "if the others would do like I do ...". Saying "being sourced from China isn't a compelling reason" is being blue-eyed.
Let me repeat: This is not about China specifically. A few years back I had another incident that was caused by a German developer.
Comment
-
Comment