Brad Spengler Profile
Brad Spengler

@spendergrsec

Followers
4K
Following
709
Media
438
Statuses
6K

President of @opensrcsec, developer of @grsecurity Personal account

Joined June 2011
Don't wanna be here? Send us removal request.
@spendergrsec
Brad Spengler
17 hours
which is quickly disproven: and now instead of just reverting the commit that didn't belong in the first place, 9 more commits are getting backported:
Tweet media one
0
0
2
@spendergrsec
Brad Spengler
17 hours
And just like every other case I've seen of this, nobody ever bothers trying to get to the root cause of the problem, and the person who created the problem is nowhere to be found. Greg makes up some alternate history ("we're bug compatible"). .
1
0
5
@grok
Grok
12 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
468
664
4K
@spendergrsec
Brad Spengler
17 hours
Also looks like the same stable maintainer is responsible for the ext4 regression in 6.16.1+: took a single patch ( ) out of a series of 11 that built on each other:
1
0
3
@spendergrsec
Brad Spengler
19 hours
Should have been a two line fix, but they decided to go back to explicit cleanup instead.
0
0
0
@spendergrsec
Brad Spengler
19 hours
Looks like just a bad assumption, the kfree cleanup can handle NULL because kfree itself can handle NULL, their cleanup function didn't.
2
0
3
@spendergrsec
Brad Spengler
21 hours
@andersonc0d3 related to yesterday's discussion :).
2
0
1
@spendergrsec
Brad Spengler
22 hours
Funny how rules seem to only be applied in a certain direction, never against people who are "too big to lose".
0
1
5
@spendergrsec
Brad Spengler
22 hours
When a CoC complaint was brought by me against Greg KH's libel against the researcher, causing his name to show up on news sites saying he tried to "backdoor" the kernel, the board (which Greg KH is a member of), surprisingly found no violations, no apology necessary.
1
2
6
@spendergrsec
Brad Spengler
22 hours
mentioning that while there's clearly a person involved, they're ignoring feedback about what's being shoveled out. A CoC complaint was raised against them: the person has been forced to apologize and was told they need to politely raise this with the person privately.
1
0
4
@spendergrsec
Brad Spengler
22 hours
actions" before even speaking to the person, ignoring their response that they were being slandered. In 2025, a kernel developer (not me) complained about a stable maintainer sending untagged, unverified AI slop to mailing lists, including bogus URLs, nonsensical explanations. .
1
0
5
@spendergrsec
Brad Spengler
22 hours
It would be remiss of me to not point out the hypocrisy of the Linux CoC: in 2021, before there were any published rules on labeling human-written patches arising from experimental static analysis tools, Greg KH publicly accused an academic researcher of "intentionally malicious.
1
1
7
@spendergrsec
Brad Spengler
2 days
Fixes tag I think should be 8ca1b5a49885f0c0c486544da46a9e0ac790831d : Also explains their confusion, as the cited commit was from 2 years before cpusets_insane_config_key was introduced.
0
0
1
@spendergrsec
Brad Spengler
2 days
Just paid the last of the 7.5 year maintenance fees for the third RAP patent, time flies.
0
1
8
@spendergrsec
Brad Spengler
2 days
Same message, so presumably same company:
1
0
4
@spendergrsec
Brad Spengler
2 days
net: usb: asix_devices: add phy_mask for ax88772 mdio bus.
0
0
0
@spendergrsec
Brad Spengler
2 days
4 bad backports to 6.16 yesterday of known-broken commits with already-existing fixes:.btrfs: zoned: reserve data_reloc block group on mount.iommu/vt-d: Optimize iotlb_sync_map for non-caching/non-RWBF modes.mfd: axp20x: Set explicit ID for AXP313 regulator.
2
1
9
@spendergrsec
Brad Spengler
2 days
paper inc I guess:
0
0
0
@spendergrsec
Brad Spengler
2 days
Code was refactored/removed in 6.17, which is probably why only 6.16 has the problem currently.
0
0
1
@spendergrsec
Brad Spengler
2 days
Also triggers with ext4/036 from fstests:
1
0
1
@spendergrsec
Brad Spengler
3 days
There's no point in reporting this stuff because the vulnerability is simple:. stable maintainers using AI who have no idea what they're doing and are using it as a substitute for the work everyone else assumes they've performed. It'll keep happening until that bug's fixed.
0
8
264