Posts
473
Following
87
Followers
92
n00b Kernel Hacker
- Ex-Intern @ NVIDIA Korea (Security System Software) (2024.06-2024.11)
- Ex-Intern @ Panmneisa (CXL emulation stuff) (~2023.12)
- Undergraduate majoring CSE (estimated graduation: Feb. 2025)
- Working as reviewer at Linux Slab subsystem
- Born in August 6, 2000

Opinions are my own.

My interests are:
Memory Management,
Computer Architecture,
Circuit Design,
Virtualization
@oleksandr @vbabka
If you meant moving to another instance, I don't think so.
1
0
0

Nafnlaus 🇮🇸 🇺🇦

Pretty much every serious photographer here tries to capture photos of the and the together. Sometimes, they succeed quite well ;) Photos from Wioleta Gorecka, taken near Reykjanesvíti.

5
9
1
@oleksandr @vbabka vlasta’s not on mastodon anymore, sadly…
1
0
0

Intel SNC6 Sub-NUMA Clustering Support With Linux 6.13

A few weeks back I wrote about Intel engineers preparing SNC6 support with Linux for six nodes per L3 cache. That was the first time hearing of SNC6 with SNC 1/2/3/4 sub-NUMA clustering modes being more common. That support is now ready for merging with the Linux 6.13 kernel cycle...
https://www.phoronix.com/news/Intel-SNC6-For-Linux-6.13

0
1
1

HAMMER SMASHED FILESYSTEM 🇺🇦

omg sir @vbabka you made the shittiverse go crazy!! 🎖️

0
2
5

Jonathan Corbet

Definitely a day best spent outdoors
0
2
20
Edited 1 month ago
Famous l337 hax0r Vmastilil Bobka @vbabka SPED UP BASED PENGUIN OS BY 4000%!!!!

Check it out and smash the like button + subscribe at

https://www.youtube.com/watch?v=m9dZkRwWEj8
1
3
7
Since the report of 3888.9% performance improvement made it not only to Phoronix (no surprises there) but is now also the subject of at least two youtube videos, where one has 212k views at this point (just wow), I've decided to explain in some detail why the benchmark is in this context completely bogus, and that people missed the very same report also contains a 9% regression in another benchmark (which may be actually less bogus :)
Hope someone finds this useful. http://lore.kernel.org/all/3b09bf98-9bd4-465b-b9c5-5483a6261dc7%40suse.cz
The youtube videos: https://www.youtube.com/watch?v=m9dZkRwWEj8
https://youtu.be/OvLEx6fPVrg
4
20
33
@vbabka Is that caused only after applying the patch? Or has it been like that before?
1
0
1
@lkundrak want to lose rather than gain more
0
0
2
Oh no I'm gaining weight
1
0
3
Unintentionally messed up @vbabka 's tree tree by doing last-minute reviews :(
1
0
2
@vbabka @ljs @ptesarik Yeah I totally get it :) I was just practicing shitposting
1
0
3
@ptesarik @ljs @vbabka
I'm not even qualified to be a shitpost noob? Oh man...
1
0
3
@ptesarik @ljs
I'm here for you :) still learning how to shitpost from them as well
1
0
3

x.x.x.x - - [10/Nov/2024:00:02:37 +0000] "GET / HTTP/1.1" 301 162 "-" "okhttp/4.9.0"

You know what’s interesting about this log line? It repeats 56,686,963 times in www.kernel.org logs for yesterday, across 4 nodes. That’s about 700 times a second, and this has been going on for months.

These requests aren’t intentionally malicious – they issue a simple GET /, receive their 301 redirect, and terminate the connection. From what I can tell, this is some kind of appliance or software installed on mobile clients that uses “can I reach www.kernel.org” as a network test.

This wouldn’t be that big of a deal – a single plaintext “GET /“ that triggers an immediate 301 is very cheap for us to generate, but the number of these requests has been steadily growing.

If you have any idea what this is and how to make it stop, please reach out?

39
512
305
When you CoW a huge page but @vbabka 's written buggy code so you end up with a tiny one
1
2
7
Show older