Posts
469
Following
90
Followers
94
n00b Kernel Hacker
- Intern @ NVIDIA Korea (Security System Software) (2024.06 ~)
- Ex-Intern @ Panmneisa (CXL emulation stuff) (~2023.12)
- Undergraduate majoring CSE (estimated graduation: Feb. 2025)
- Working as reviewer at Linux Slab subsystem
- Born in August 6, 2000

Opinions are my own.

My interests are:
Memory Management,
Computer Architecture,
Circuit Design,
Virtualization

Lorenzo Stoakes

Edited 8 hours ago
Famous l337 hax0r Vmastilil Bobka @vbabka SPED UP BASED PENGUIN OS BY 4000%!!!!

Check it out and smash the like button + subscribe at

https://www.youtube.com/watch?v=m9dZkRwWEj8
1
3
7

Vlastimil Babka

Since the report of 3888.9% performance improvement made it not only to Phoronix (no surprises there) but is now also the subject of at least two youtube videos, where one has 212k views at this point (just wow), I've decided to explain in some detail why the benchmark is in this context completely bogus, and that people missed the very same report also contains a 9% regression in another benchmark (which may be actually less bogus :)
Hope someone finds this useful. http://lore.kernel.org/all/3b09bf98-9bd4-465b-b9c5-5483a6261dc7%40suse.cz
The youtube videos: https://www.youtube.com/watch?v=m9dZkRwWEj8
https://youtu.be/OvLEx6fPVrg
2
16
21
@vbabka Is that caused only after applying the patch? Or has it been like that before?
1
0
1
@lkundrak want to lose rather than gain more
0
0
2
Oh no I'm gaining weight
1
0
3
Unintentionally messed up @vbabka 's tree tree by doing last-minute reviews :(
1
0
2
@vbabka @ljs @ptesarik Yeah I totally get it :) I was just practicing shitposting
1
0
3
@ptesarik @ljs @vbabka
I'm not even qualified to be a shitpost noob? Oh man...
1
0
3
@ptesarik @ljs
I'm here for you :) still learning how to shitpost from them as well
1
0
3

x.x.x.x - - [10/Nov/2024:00:02:37 +0000] "GET / HTTP/1.1" 301 162 "-" "okhttp/4.9.0"

You know what’s interesting about this log line? It repeats 56,686,963 times in www.kernel.org logs for yesterday, across 4 nodes. That’s about 700 times a second, and this has been going on for months.

These requests aren’t intentionally malicious – they issue a simple GET /, receive their 301 redirect, and terminate the connection. From what I can tell, this is some kind of appliance or software installed on mobile clients that uses “can I reach www.kernel.org” as a network test.

This wouldn’t be that big of a deal – a single plaintext “GET /“ that triggers an immediate 301 is very cheap for us to generate, but the number of these requests has been steadily growing.

If you have any idea what this is and how to make it stop, please reach out?

40
534
304

Lorenzo Stoakes

When you CoW a huge page but @vbabka 's written buggy code so you end up with a tiny one
1
2
7
Edited 9 days ago
@vbabka @brauner

haha but most people won't focus on how specific/synthetic it is. The number just kinda attracts attention.

I still think it's really hard to demonstrate how a patch will affect realistic scenarios or how much of a clear win it is in most situations... as we all have limited resources to evaluate them.
0
0
2
@lkundrak

be careful, your brain is being reclaimed by reading it
1
0
3
@lkundrak
oh that sounds a bit sexually provocative
1
0
0
@lkundrak

"Linux MM in a nutshell"

🍷
0
0
2
@lkundrak
It probably won't fit there :(
It'd be very thick.
3
0
3
Show older