Posts
475
Following
90
Followers
94
n00b Kernel Hacker
- Linux Kernel Developer @ Oracle (Linux Kernel MM) (2025.02 ~ Present)
- Ex-Intern @ SK Hynix (Linux Kernel MM) (2024.12 ~ 2025.01)
- Ex-Intern @ NVIDIA Korea (Security System Software) (2024.06 ~ 2024.11)
- Ex-Intern @ Panmneisa (CXL emulation stuff) (2023.09 ~ 2023.12)
- Undergraduate majoring CSE (estimated graduation: Feb. 2025)
- Working as reviewer at Linux Slab subsystem
- Born in August 6, 2000

Opinions are my own.

My interests are:
Memory Management,
Computer Architecture,
Circuit Design,
Virtualization

Well well, look what the cat dragged in
https://nostarch.com/linux-memory-manager

4
14
2

Very happy to announce my book The Linux Memory Manager is now available to pre-order at

https://nostarch.com/linux-memory-manager

It's a comprehensive 1,300 page exploration of how memory functions in Linux that goes into great depth on the subject, and is the first book of its kind for 20 years :)

13
37
4
Edited 4 days ago
This book serves as a guiding light in navigating the increasingly complex memory management subsystem. A must-have book if you're interested in memory management!

I'mq glad to see the author's long effort finally paying off. Finally available for preorder đź‘Ź.

Already ordered one!

https://fosstodon.org/@ljs/114004492112728241
1
1
3

Jonathan Corbet

Forbes is warning us that Android phones are under severe risk due to a kernel vulnerability:

https://www.forbes.com/sites/zakdoffman/2025/02/03/google-warns-all-android-users-your-phone-is-now-at-risk/

This comes from Google's Android security bulletin for February:

https://source.android.com/docs/security/bulletin/2025-02-01

...which informs us that "There are indications that CVE-2024-53104 may be under limited, targeted exploitation". The vulnerability in question, though, is CVE-2024-53104:

https://lwn.net/ml/all/2024120232-CVE-2024-53104-d781@gregkh

...which is in the uvcvideo camera driver. Either I'm missing something badly, or the only way to exploit this would be to plug a malicious camera device into the phone. I can see why they would want to fix this, but I'm not sure it's a red-alert situation for most of us?
3
14
19

Nafnlaus 🇮🇸 🇺🇦

Pretty much every serious photographer here tries to capture photos of the and the together. Sometimes, they succeed quite well ;) Photos from Wioleta Gorecka, taken near ReykjanesvĂ­ti.

5
9
1

Intel SNC6 Sub-NUMA Clustering Support With Linux 6.13

A few weeks back I wrote about Intel engineers preparing SNC6 support with Linux for six nodes per L3 cache. That was the first time hearing of SNC6 with SNC 1/2/3/4 sub-NUMA clustering modes being more common. That support is now ready for merging with the Linux 6.13 kernel cycle...
https://www.phoronix.com/news/Intel-SNC6-For-Linux-6.13

0
1
1

[lubko @ FOSDEM no more] 🇺🇦

omg sir @vbabka you made the shittiverse go crazy!! 🎖️

0
2
5

Jonathan Corbet

Definitely a day best spent outdoors
0
3
23
Edited 3 months ago
Famous l337 hax0r Vmastilil Bobka @vbabka SPED UP BASED PENGUIN OS BY 4000%!!!!

Check it out and smash the like button + subscribe at

https://www.youtube.com/watch?v=m9dZkRwWEj8
1
3
7
Since the report of 3888.9% performance improvement made it not only to Phoronix (no surprises there) but is now also the subject of at least two youtube videos, where one has 212k views at this point (just wow), I've decided to explain in some detail why the benchmark is in this context completely bogus, and that people missed the very same report also contains a 9% regression in another benchmark (which may be actually less bogus :)
Hope someone finds this useful. http://lore.kernel.org/all/3b09bf98-9bd4-465b-b9c5-5483a6261dc7%40suse.cz
The youtube videos: https://www.youtube.com/watch?v=m9dZkRwWEj8
https://youtu.be/OvLEx6fPVrg
4
19
32
Oh no I'm gaining weight
1
0
3
Unintentionally messed up @vbabka 's tree tree by doing last-minute reviews :(
1
0
2

x.x.x.x - - [10/Nov/2024:00:02:37 +0000] "GET / HTTP/1.1" 301 162 "-" "okhttp/4.9.0"

You know what’s interesting about this log line? It repeats 56,686,963 times in www.kernel.org logs for yesterday, across 4 nodes. That’s about 700 times a second, and this has been going on for months.

These requests aren’t intentionally malicious – they issue a simple GET /, receive their 301 redirect, and terminate the connection. From what I can tell, this is some kind of appliance or software installed on mobile clients that uses “can I reach www.kernel.org” as a network test.

This wouldn’t be that big of a deal – a single plaintext “GET /“ that triggers an immediate 301 is very cheap for us to generate, but the number of these requests has been steadily growing.

If you have any idea what this is and how to make it stop, please reach out?

39
487
302
When you CoW a huge page but @vbabka 's written buggy code so you end up with a tiny one
1
2
7
Achieve 3888.9% performance improvement thanks to this one weird trick https://lore.kernel.org/all/202411072132.a8d2cf0f-oliver.sang@intel.com/
3
5
10
Hello, Gym!
2
1
4

[lubko @ FOSDEM no more] 🇺🇦

*reading a toot*
"I got laid..."
*oh good for you*
"...off"

2
3
6

This, except they picked diarrhea

0
4
2

Lazy Preemption "PREEMPT_LAZY" Slated To Land In Linux 6.13

Yet another exciting feature expected to be merged for the upcoming Linux 6.13 cycle is the introduction of the Lazy Preemption model...
https://www.phoronix.com/news/Linux-6.13-Lazy-Preemption

0
1
2
Show older