Very excited to be founding @amutable.com with @pid1.bsky.social and @cbrauner.bsky.social. We are joined by one of the strongest Linux teams I could imagine building important foundational technologies that enable whole new capabilities built on trust and integrity.
27.01.2026 16:17 β π 8 π 2 π¬ 0 π 0
Ringing in 2026, I'm thrilled to join @amutable.com with @cbrauner.bsky.social, @chrskhl.net, and @pid1.bsky.social β alongside a wildly talented founding engineering team β to redefine what we expect for infrastructure integrity, declarative systems, compliance, and trust.
27.01.2026 15:26 β π 5 π 2 π¬ 1 π 0
Amutable
Amutable: A New Secure Foundation
Today I'm super excited to announce Amutable, our new company together with @pid1.bsky.social and @chrskhl.net .
We have an amazing founding team. I'm very happy they are on board for the ride. I can't wait to show everyone what we're building. Made with β€οΈ in Berlin.
amutable.com/blog/introdu...
27.01.2026 15:30 β π 5 π 1 π¬ 0 π 0
Amutable
Amutable: A New Secure Foundation
Today we announce Amutable and our mission to deliver determinism and verifiable integrity to Linux systems.
Amutable is founded in Berlin by @chrskhl.net , @cbrauner.bsky.social and @pid1.bsky.social.
Read the announcement: amutable.com/blog/introdu...
27.01.2026 15:22 β π 12 π 2 π¬ 0 π 6
YouTube video by Seppe
Nihilist Penguin (Werner Herzog)
www.youtube.com/watch?v=mnTU...
25.01.2026 14:09 β π 1 π 0 π¬ 0 π 0
All Systems Go! 2025
Schedule, talks and talk submissions for All Systems Go! 2025
A reminder that the All Systems Go! 2025 CFP closes on June 13th. Submit your talk about foundational user-space Linux technologies before the deadline to be considered.
π cfp.all-systems-go.io/all-systems-...
21.05.2025 16:26 β π 2 π 2 π¬ 0 π 0
I feel like #Android would be a prime candidate to rely on SO_PEERPIDFD in their bluetooth stack. And if they don't, they probably should.
28.04.2025 09:12 β π 0 π 0 π¬ 0 π 0
6/n
And even if the current crashing thread isn't the actual thread-group leader we know that the thread-group leader cannot be reaped until all of its subthreads have exited.
27.04.2025 20:42 β π 0 π 0 π¬ 0 π 0
5/n
We're installing a pidfd for the thread-group leader even if a subthread is calling do_coredump(). We know that task linkage hasn't been removed yet.
27.04.2025 20:42 β π 0 π 0 π¬ 0 π 0
4/n
Since usermode helpers are either children of the system_unbound_wq
workqueue or kthreadd we know that the file descriptor table is empty and can thus always use three as the file descriptor number.
27.04.2025 20:40 β π 0 π 0 π¬ 0 π 0
3/n
When the usermode helper process is forked we install a pidfd file descriptor three into the usermode helper's file descriptor table so it's available to the exec'd program.
27.04.2025 20:39 β π 0 π 0 π¬ 0 π 0
2/n
There are tricky race-windows that cannot be easily closed by userspace. There's various ways like looking at the start time of a process to make sure that the usermode helper process is started
after the crashing process but it's all very very brittle and fraught with peril.
27.04.2025 20:38 β π 0 π 0 π¬ 0 π 0
1/n
Oh yeah, I already mentioned this a while ago but I also added support for pidfds in Linux coredumps.
/proc/sys/kernel/core_pattern has been extended so userspace can instruct the kernel to install a pidfd for the
crashing process into the usermode helper process, e.g., systemd-coredump.
27.04.2025 20:32 β π 2 π 0 π¬ 0 π 0
(1) Are developers aware that Bluetooth sockets even support SO_PEERPIDFD?
(2) Is this useful for Bluetooth user space implementations?/Is this already used?
(3) Is it useful to also enable SO_PEERPIDFD for reaped peers for Bluetooth sockets?
27.04.2025 20:22 β π 0 π 0 π¬ 0 π 1
The fun part is that Alex reminded me that Bluetooth sockets support at least SO_PEERPIDFD. I had forgotten about this and had blocked adding SCM_PIDFD support for them.
They don't yet support reaped SO_PEERPIDFD but they could be made to do so. I wonder mainly three things:
27.04.2025 20:22 β π 0 π 0 π¬ 1 π 0
So all we really needed to do is register the peer in pidfs (the FS pidfds are based on for a while now). By doing this we're guaranteed that when the peer task gets reaped exit information will be available and we can safely allocate pidfds later on.
27.04.2025 20:22 β π 0 π 0 π¬ 1 π 0
The advantage of the peer credential concept is of course that we stash the required reference (struct pid) at the time when the peer is still alive.
So we already have a stable in-kernel handle.
27.04.2025 20:22 β π 0 π 0 π¬ 1 π 0
Ever since v6.15 it's possible to retrieve the exit status and cgroup ID from the pidfd via the PIDFD_INFO_EXIT flag of the PIDFD_GET_INFO ioctl() after the process has been reaped.
So with this it becomes even more useful to hand out pidfds for already reaped peer processes.
27.04.2025 20:22 β π 0 π 0 π¬ 1 π 0
It's used by dbus-broker, polkit and systemd to guard against pid recycling and related issues.
So far it wasn't possible to get a pidfd if the peer process was already reaped. But there wasn't anything technically wrong with enabling this.
27.04.2025 20:22 β π 0 π 0 π¬ 1 π 0
So a while ago we did pidfds for AF_UNIX sockets. Alexandr Mikahlitsyn did all of the heavy lifting. Specifically we added SO_PEERPIDFD and SCM_PIDFD. They are analogues to SCM_PEERCRED and SCM_CREDENTIALS.
27.04.2025 20:22 β π 1 π 0 π¬ 1 π 0
Any process that doesn't have that {g,u}id but is still privileged otherwise will write to disk as the squashed {g,u}id. I just finished a draft and selftests that miraculously work.
11.03.2025 20:31 β π 1 π 0 π¬ 0 π 0
kernel/git/vfs/vfs.git - VFS tree
Picked back up the work for VFS {g,u}id squashing. IOW, mapping all {g,u}ids down to a single {g,u}id.
web.git.kernel.org/pub/scm/linu...
11.03.2025 20:31 β π 1 π 2 π¬ 1 π 0
FOSDEM 2025 - Containers
I'm organizing the #containers and #kernel devrooms at FOSDEM 2025 with the usual suspects.
containers: fosdem.org/2025/schedul...
kernel: fosdem.org/2025/schedul...
See you in Brussels!
28.12.2024 14:25 β π 4 π 1 π¬ 0 π 0
Listing all mounts in all mount namespaces
Introduction
I've written a post that shows how to list all mounts in all mount namespaces (all mounts on the system) using new apis we added to the #vfs last year.
brauner.io/2024/12/16/l...
#kernel #linux #vfs
16.12.2024 22:32 β π 6 π 3 π¬ 0 π 0
Mostly active here: https://mastodon.social/@davidstrauss
Chief Product Officer at @amutable.com; former co-founder at @pantheon.io. Various roles at #systemd, All Systems Go! conference, and Drupal Security. he/him but also π³οΈβπ.
Founding Engineer at @amutable.com. ζ₯ζ¬θͺγεεΌ·γγ¦γγΠ ΠΎΡΠ΅Π½ Ρ ΠΠ°Π½ΡΠ΅Π²ΠΎ. "Designated communications provider" under Β§317C(6) of the Telecommunications Act 1997.
Bringing determinism and verifiable integrity to Linux systems
The App for Connecting Open Social Web
Mastodon, Bluesky, Nostr, Threads in ONE app, in ONE feed β¨
https://openvibe.social
NPR Correspondent covering technology and national security.
CURRENTLY: on maternity leave.
Send me a tip: Text JennaMcLaughlin.54 on Signal from personal (nonwork) devices.
Substack: http://lcamtuf.substack.com/archive
Homepage: http://lcamtuf.coredump.cx
President of @opensrcsec, developer of @grsecurity
Personal account
Foundational security for the Linux kernel. Solving the most difficult memory unsafety problems. Created by @opensrcsec
Cloudflare is the worldβs leading connectivity cloud, and we have our eyes set on an ambitious goal β to help build a better Internet.
oh nice
#linux #foss #containers | #buddhism | #music #electronic #turntable #oontz #dnb | #streetart #art | #climbing #cycling | #raleigh | /dev/urandom
https://hashbangbash.com
(work previously at MSFT, RHT, AKAM, ...)
Signal is a nonprofit end-to-end encrypted communications app. Privacy isnβt an optional mode, itβs the way Signal works. Every message, every call, every time.
βFor a successful technology, reality must take precedence over public relations, for Nature cannot be fooled.β
Something something at Microsoft something something.
Life coach for terrible ideas
Links related to Linux kernel security and exploitation.
Maintained by @andreyknvl.bsky.social and Alexander Popov.
Also on https://t.me/linkersec, https://x.com/linkersec, and https://infosec.exchange/@linkersec.
https://www.edgesecurity.com
https://www.wireguard.com