THE LINUX FOUNDATION PROJECTS
All Posts By

elisaproject

When “Probably Safe” Is Not Safe Enough - ELISA Project blog - Alessandro Carminati, NVIDIA

When “Probably Safe” Is Not Safe Enough

By Ambassadors, Blog, Working Group

This blog is written by Alessandro Carminati, TSC member and Linux Features WG Chair at the ELISA Project and an engineer at NVIDIA.

If you ever worked with Linux, you probably heard something like:

“User space and kernel space are isolated.”

Which is true. And also… not entirely comforting.

Because, as Murphy politely reminds us:

“Anything that can go wrong, will go wrong.”

At the ELISA LFSCS working group, we try to look at Linux from a functional safety perspective. That means we are not satisfied with “it usually works”… we want to understand what could go wrong.

At the ELISA LFSCS working group, we try to look at Linux from a functional safety perspective. That means we are not satisfied with “it usually works”… we want to understand what could go wrong.

From Munich: A Suspicious Idea

During the Munich 2025 session, we discussed what we called the linear mapping threat.

The idea is simple:

  • Linux keeps a linear mapping of physical memory
  • This mapping includes all RAM
  • Kernel objects and user pages come from the same pool

So in theory:

A kernel object page could sit right next to a user page.

Not a fault… Not a bug… Just… how memory is laid out.

And that alone raises a question.

Because if a kernel bug causes an overflow, adjacency matters much more than isolation:

  • overflow → likely direction → next page
  • underflow → possible, but statistically less common
    So the interesting case becomes:

kernel page → next → user page

At that point, this was still a hypothesis. A reasonable one… But still a hypothesis.

From Hypothesis to Observation

So we asked:

Can we observe this situation?

Not in theory. Not in diagrams. But in actual memory.

To be clear, not the fault happening… just the fact that Kernel objects pages and userspace pages can sit next to each other.

The Tool (a.k.a. “Let’s Peek at PFNs”)

Initially, the plan was simple:

“Let’s write a kernel module and scan the linear mapping.” Because… that’s what kernel people do. (Maslow’s Hammer: If the only tool you have is a hammer, you tend to see every problem as a nail)

Then came the slightly embarrassing realization:

“Wait… I can already see this from userspace.”

Using /proc/kpageflags.

And suddenly:

  • no kernel module needed
  • no patching
  • no special hooks

Just a userspace tool reading kernel-exposed data.

Small Technical Box: /proc/kpageflags

/proc/kpageflags exposes metadata for each physical page frame (PFN).

With it, you can:

  • iterate over physical memory
  • classify pages (anonymous, slab, huge, etc.)
  • build a PFN-level view of the system

In practice, the tool:

  • scans PFNs sequentially
  • assigns a category per page
  • renders a colored raster

Think of it as:

a “topographic map” of memory… where mountains are slab pages and plains are user memory. (Yes, the legend is still under construction.)

First Results: “This Looks… Too Clean”

Using the tool on a real system (x86), results were promising:

  • memory looked mixed
  • user and kernel pages were interleaved
  • adjacency was visible

Good.

But the LFSCS working group set its reference platform as aarch64 many moons ago and when if came to the ARM64 VM we’re targeting:

  • almost no user pages
  • almost no slab pages
  • everything looked… suspiciously clean

At this point, either:

  1. the tool was wrong
  2. the kernel was lying
  3. or the system was too nice

What We Learned (a.k.a. “The Plot Thickens”)

Huge Pages Were Hiding Reality

Disabling THP:

echo never > /sys/kernel/mm/transparent_hugepage/enabled

suddenly changed everything.

Why?

Because:

  • userspace sees memory at page granularity (4KB)
  • linear mapping may represent the same memory as huge pages

So we had:

fine-grained user memory vs coarse-grained linear mapping view

Disabling THP aligned the two worlds and revealed the real distribution.

Slab Pages Don’t Like Attention

The SLAB flag is only set on compound head pages.

Meaning:

most kernel objects are there… just not explicitly labeled

So the absence of slab in the visualization was… misleading.

The System Was Too Clean

The VM had:

  • low workload
  • low fragmentation
  • limited kernel activity

In short:

not enough chaos to trigger interesting behavior

Forcing Reality (a.k.a. “Adding Some Chaos”)

One missing piece was understanding that:

a real system naturally creates fragmentation a virtual machine… usually does not

So to observe the phenomenon in a controlled environment, we needed to give to the kernel an helping foot.

The approach was to introduce controlled memory pressure and fragmentation using a small kernel-side helper.

The idea is simple:

  • allocate many temporary objects
  • insert a few persistent objects in between
  • free the temporary ones

Swiss Cheese Kernel Heap

This leaves behind memory pages that are:

  • partially used
  • not reclaimable
  • and therefore fragmented

This creates a layout where:

kernel allocations are spread across many partially filled pages

Which is exactly the condition needed to increase the chance of:

kernel page → next → user page adjacency

Think of memory like a block of cheese:

  • temporary allocations = drilling holes
  • persistent objects = small solid parts left behind

After removing the temporary allocations:

you don’t get a clean empty block you get a holey structure the kernel cannot easily compact

The Key Result

After:

  • fixing classification
  • aligning granularity
  • adding controlled fragmentation

We can say:

Kernel and user pages can be physically adjacent. Not always. Not everywhere. But definitely possible.

And importantly: this can happen naturally on a real system while in a VM it may require forcing conditions

Looking Closer (a.k.a. “What Exactly Is Sitting at the Edge?”)

At this point, we knew that: kernel pages and user pages can be physically adjacent. Which is already interesting.

But adjacency alone does not tell us how easy it is for trouble to cross the border.

If the last object in the kernel page ends hundreds of bytes before the page boundary, then an overflow would need to be fairly enthusiastic.

If instead the object ends exactly at the page boundary…

then even a tiny mistake can immediately step into the next page.

So the obvious next question was: “What is actually sitting at the very end of the slab page?”

Teaching the Tool Some Slab Archaeology

The original direct_map_view PoC was good at classifying pages.

The updated version became slightly more nosy.

Given a user page, it now:

  • looks at the preceding PFN,
  • checks whether that PFN is slab-backed,
  • scans the page,
  • and identifies the kernel object closest to the end of the page.

Using kmem_dump_obj(), the probe can determine which slab cache owns the object and where the object begins.

In other words: we stopped looking only at pages and started looking at what is actually living inside them.

A Typical Result

[   66.010479] pfn_slab_probe: input_pfn=1078469 checked_pfn=1078468 flags=0xbfffe0000000200
[   66.010862] pfn_slab_probe: checked PFN 1078468 is slab-backed, scanning [ffff0000c74c4000 - ffff0000c74c5000)
[   66.011652] slab kmalloc-512 start ffff0000c74c4e00 pointer offset 504 size 512
[   66.013007] pfn_slab_probe: nearest candidate object at ffff0000c74c4ff8, offset 0xff8 into PFN 1078468

The probe did not find an object starting at 0xff8.

It found itself standing 8 bytes before the edge of the page, inside a kmalloc-512 object, at offset 504 from the beginning of that object.

So the math is:

0xff8 - 504 = 0xe00

The object starts at 0xe00 and, being 512 bytes long, ends at 0x1000.

Exactly at the page boundary. Which is the memory-management equivalent of parking with the bumper touching the wall.

Turning Logs into Pictures

Because hexadecimal offsets are excellent at convincing computers but less effective with humans, a small script was added to convert the logs into SVG diagrams.

The result is a picture showing:

  • the slab page,
  • the last kernel object,
  • the page boundary,
  • and the user page immediately after it.

Sometimes, a drawing is worth several hundred printk()s.

From “Interesting Layout” to “Well… That Escalated Quickly”

At this point, we had demonstrated that:

  • a kernel object can sit at the end of a page,
  • the next physical page can belongs to a user process.

The next question was unavoidable: “What happens if the kernel writes past that boundary?”

Fortunately for science, and slightly less fortunately for the victim process, we now have a PoC for that too.

The Victim (a.k.a. “The Simplest Program We Could Get Away With”)

The userspace target is a tiny assembly program, available for both:

Its behavior is intentionally boring:

  1. print the address of a string,
  2. wait,
  3. print the string,
  4. exit.

That is all. No threads. No libraries. No excuses. If something changes, we know exactly who to blame.

Was it that simple?

The PoC script: poc.sh

Coordinates with the kernel module: umem_poke.c

The script does not do magic address translation in bash.

Which is probably good news for everyone. It only coordinates the experiment: it starts the victim, gets the address printed by the process, and passes that VMA address to the module.

The module is the one doing the kernel-side work. It uses GUP to resolve the userspace address to the underlying page, computes the linear mapping address destination byte, and then performs the write.

After all that machinery, the corruption itself is still disappointingly simple:

*dst_target = act.value;

That is it.

  • No ptrace().
  • No copy_to_user().
  • No access_ok().
  • No “Dear Kernel, may I please touch userspace?”

Just a normal assignment. From the kernel’s point of view, this is simply a write to a valid pointer.

Which leads to a slightly uncomfortable realization: once a userspace page is reached through the linear mapping, it stops being special. It is just memory. And the kernel is very good at writing to memory.

“But Surely Read-Only Memory Is Safe?”

A reasonable objection is: “Fine, but this probably works only on writable pages.” That would be reassuring… Would it really?

Even then, the wall would still have a door. Unfortunately, reality is even less reassuring.

The experiment works even when the target string is moved from .bss to .rodata.

In other words, the process sees the page as read-only. The process itself cannot modify the string.

And yet, after the userspace address has been translated to its corresponding location in the linear mapping, changing the supposedly immutable data still requires nothing more sophisticated than:

*dst_target = act.value;

  • No page permissions are changed.
  • No special write mechanism is invoked.
  • No dedicated “modify userspace memory” API is used.

Just a normal store through a valid kernel pointer.

So the surprising part is not that the kernel, in principle, has enough privilege to modify the page. The surprising part is that once the page is reached through the linear mapping, the actual modification is indistinguishable from writing to any other ordinary kernel address.

Same physical page. Different virtual permissions. Same single dereference.

The Grand Finale

Before the write, the program prints one string.

After the write, it prints a different one.

buildroot login: root
# /usr/umem_poke/poc.sh 
running without corruption
message address: 0x0000000000400168
<TOKEN>

running again with corruption
[   27.675393] umem_poke: loading out-of-tree module taints kernel.
message address: 0x0000000000400168
[   28.751270] umem_poke: req: poke memory for pid=107 mem[400168]=1074707572726f63
[   28.752020] umem_poke: act: poke memory for pid=107 mem[400168]=1074707572726f63
corrupt
# 

The process does not crash. The kernel does not panic. No alarms ring. No dramatic music starts.

The application simply continues running with modified data. Which, from a functional safety perspective, is often the most interesting outcome.

Not: “The system exploded.”

But: “The system kept working… incorrectly.”

From Layout Curiosity to Concrete Effect

At this point, the full chain becomes visible:

+---------------------------+
|   shared physical memory  |
+---------------------------+
              |
             \ /
              V
+---------------------------+
|     possible adjacency    |
+---------------------------+
              |
             \ /
              V
+---------------------------+
| kernel object at page end |
+---------------------------+
              |
             \ /
              V
+---------------------------+
|   kernel write defect     |
+---------------------------+
              |
             \ /
              V
+---------------------------+
|   ordinary pointer store  |
+---------------------------+
              |
             \ /
              V
+---------------------------+
| userspace data corruption |
+---------------------------+
              |
             \ /
              V
+---------------------------+
|  incorrect but apparently |
|       normal behavior     |
+---------------------------+

So the original question: “Can kernel and user pages be physically adjacent?”

Now has a more complete answer: Yes. And if a kernel write goes in the wrong direction, the next page may belong to a perfectly innocent process. That process may continue running as if nothing happened, except for the small detail that its data is no longer what it thinks it is.

Why This Matters

From a safety perspective, the concern is not: user → kernel corruption (blocked by MMU)

The concern is:

kernel → anything else

Because in the linear mapping:

  • everything shares the same physical space
  • adjacency is not controlled
  • allocators optimize for performance, not isolation

So when something goes wrong: the target is simply “the next page”

And what that page is… depends on the moment.

Bigger Picture

This PoC is not proving a vulnerability.

It is proving something more subtle: Linux enforces virtual access separation, but does not guarantee physical separation between kernel and userspace allocations.

And in safety: lack of guarantees is already a problem.

Final Thought

The tool didn’t find a bug and this article does not imply Linux is unsafe. It found something more annoying: an assumption that is not always true.

Meaning that physical separation is not an inherent property of the Linux memory manager and must be established through additional architectural controls if required by a safety case.

ELISA blog – All Aboard The New Railways Special Interest Group

All Aboard the new Railways SIG

By Announcement, Blog, Working Group

This blog is written by Henrik Brändle, Chair of the new Railways SIG.

The ELISA (Enabling Linux in Safety Applications) Project continues to advance the use of Linux in safety-critical and regulated systems. By bridging the gap between the flexibility of Linux and the demands of safety-critical certification, the ELISA community is ensuring that the future of autonomous and connected technology is built on a foundation of trust.

Dedicated groups like Automotive, Aerospace, Safety Architecture and the Space Grade Linux Special Interest Group (SIG) have been the engine of ELISA’s progress.

All Aboard: The Railways SIG

Safety-critical systems span more than just the roads for automotives and airplanes.  In fact, rail is the third-most used means of transport [1, fig. 21]. Today, we are excited to announce the launch of the Railways SIG.

This new initiative marks a significant milestone as we bring ELISA’s methodology to the rail industry. The Railways SIG will focus on aligning Linux development with standards, addressing everything from signaling and control systems to automated train operations. It aims to inform all railway stakeholders about the extensive capabilities that open source already offers in the safety domain. At the same time, it represents their specific needs towards the ELISA community, to ensure that future developments continue to benefit railway systems worldwide. 

History of Open Source and Railways

Historically, the railway industry viewed open source with skepticism, believing that public code and community governance couldn’t meet the demands of safety certification. However, in recent years, multiple initiatives have started to challenge this belief by proving that open source projects can achieve high-level functional safety certification while maintaining transparency and collaboration [2][3].

The continuous rise in expected features will lead to an explosion in resulting software complexity. Since the available development resources are not keeping up with the demands, the railway industry willhave to rely on collaboration across sectors to keep delivering software at the expected quality and pace. 

The Vision

The idea for a dedicated Railway SIG was introduced at FOSDEM 2025, where the Railways and Open Transport track served as a launchpad for the vision. Throughout the following year, a diverse community of stakeholders shared their points of view, aligned their vision and collaborated on a path towards a sustainable SIG. 

Following a reconfirmation of interest at FOSDEM 2026, a formal SIG application was submitted in March. As a new group within the ELISA Project umbrella, the Railways SIG will help shape these efforts by bringing forward the specific requirements, development processes, and standards of our industry. This ensures the rail sector benefits from the significant work taking place globally.

Join us!

The first Railways SIG will take place on Tuesday, May 19. Participants can register for the meeting by visiting the ELISA Project public meeting calendar here. Subscribe to the mailing list or learn more information here. We invite all interested parties to join us in shaping the future of safety-critical Linux for railway infrastructure.

If you are interested in the ELISA Project, we invite you to join one of the ELISA working groups and contribute to advancing safety practices in open source together.

To keep up to date about the project, subscribe to the quarterly newsletter or connect with us on ELISA Project LinkedIn or the  ELISA Discord Channel to talk with community and TSC members.

Sources:

[1] [TUMI Transport Outlook 1.5°C (2021)](https://www.transformative-mobility.org/wp-content/uploads/2023/03/TUMI-Transport-Outlook-SoI1tB.pdf)

[2][Ferrocene: This is Rust for critical systems](https://ferrocene.dev/)

[3][Zephyr Safety Overview] (https://docs.zephyrproject.org/latest/safety/safety_overview.html)

ELISA Lighthouse SIG – Annual Update (February 12, 2026) | Philipp Ahmann, ETAS

Recap of ELISA Lighthouse SIG – Annual Update (February 12, 2026)

By Ambassadors, Blog, Technical Update, Working Group

On February 11–12, the ELISA Project community gathered for the 2026 Working Group (WG) and Special Interest Group (SIG) Annual Updates. Over two focused sessions, group leads shared key milestones from 2025, current technical priorities, and what lies ahead in 2026, along with concrete opportunities for collaboration and contribution.

The annual updates serve as a checkpoint for the project: a moment to reflect on progress, align on priorities, and welcome new contributors into the work of advancing Linux in safety-critical systems.

This week we highlight the session on ELISA Lighthouse Special Interests Group presented by Philipp Ahmann, ETAS.

The Lighthouse SIG focuses on best practices for open source software in safety-critical systems. Philipp explained that many existing quality and safety standards were designed for proprietary software development, while open source communities often work through code-first, CI-driven, and agile processes. The group is exploring how established open source practices can be evaluated, documented, and eventually shaped into guidance or a standard that regulated industries can use.

In 2025, the SIG worked to understand the current landscape. The group reviewed existing safety, quality, and security standards, conducted literature research, and began assessing open source projects. Early work included creating a template to evaluate process robustness and evidence confidence across different criteria. Initial project assessments included Yocto, Xen, and LLVM, with plans to expand to projects such as Linux, curl, and OpenSSL.

The session also highlighted collaboration with other communities, including Eclipse automotive efforts, CHAOSS, OpenSSF Scorecard, LFX Insights, OpenSSF Best Practices, OpenChain, and the Joint Development Foundation. The goal is to avoid duplication, learn from existing work, and align with broader open source and standards communities.

Looking ahead to 2026, the Lighthouse SIG plans to refine its maturity model, review more projects, evaluate existing badges and scorecards, and continue preparing for possible standards work. The group is also exploring how to define and measure quality in open source projects more clearly.

Philipp closed by inviting new contributors to join the Lighthouse SIG. The group meets every other Friday and welcomes participation through its meetings, mailing list, Discord channel, GitHub repository, and meeting minutes.

Watch the full session to learn how the Lighthouse SIG is progressing and how you can get involved.

ELISA Project - BASIL & Tools Working Group Evolution – Annual Update (Feb 12, 2026)

Recap of BASIL and Tools Working Group Evolution – Annual Update (Feb 12, 2026)

By Blog, Technical Update, Working Group

On February 11–12, the ELISA Project community gathered for the 2026 Working Group (WG) and Special Interest Group (SIG) Annual Updates. Over two focused sessions, group leads shared key milestones from 2025, current technical priorities, and what lies ahead in 2026, along with concrete opportunities for collaboration and contribution.

The annual updates serve as a checkpoint for the project: a moment to reflect on progress, align on priorities, and welcome new contributors into the work of advancing Linux in safety-critical systems.

This week we highlight the session on BASIL & Tools Working Group Evolution.

In this session from the ELISA Project Annual Updates, Luigi Pellecchia presents a recap of the BASIL tool’s development in 2025 and outlines planned directions for 2026. BASIL is described as a collaborative, web-based tool for traceability management, supporting multi-user environments, granular permissions, and detailed relationships between code, requirements, and test artifacts. It also integrates with internal and external test infrastructures and provides multiple export formats, including SPDX, HTML, and PDF.

The 2025 update highlights incremental improvements across the year, including enhancements to AI-assisted features, user experience refinements, support for importing external work items, and expanded browser compatibility. Infrastructure improvements include container optimization, security fixes, integration with additional testing frameworks, and the introduction of API code coverage monitoring. A major architectural change was the migration from SQLite to PostgreSQL to better support concurrent usage.

A key development in late 2025 is the introduction of “traceability as code,” an initial proposal to define traceability relationships through configuration files, enabling connections between distributed artifacts such as source code, test cases, and test results across different repositories and systems.

Looking ahead to 2026, planned efforts include extending traceability features (e.g., linking test results), introducing baseline snapshots of traceability states, improving test coverage, and continuing iterative development based on community feedback. The session also highlights available resources such as a public BASIL instance, documentation, and communication channels, and encourages community participation in both BASIL and the broader Tools Working Group.

Overall, the session focuses on the progress, ongoing development, and open collaboration around tooling to support traceability in safety-critical Linux environments.

ELISA Aerospace Working Group – ELISA Project - Annual Update (Feb 12, 2026)

Recap – ELISA Aerospace Working Group – ELISA Project – Annual Update (Feb 12, 2026)

By Blog, Working Group

This session, part of the ELISA Project Working Group & SIG Annual Updates, was presented by Matthew Weber (The Boeing Company) and co-led with Dr. Martin Hall. It provides an overview of the Aerospace Working Group’s progress in 2025 and outlines priorities for 2026.

The Aerospace Working Group focuses on advancing the adoption of Linux in safety-critical aerospace and space systems by addressing technical, process, and certification challenges through collaboration and shared best practices.

Key Highlights from 2025

  • Strong and consistent community engagement, with diverse participation from industry, academia, and government
  • Introduction of a weekly technical call to develop reference demos and use cases, leading to increased contributions (code, documentation, and examples)
  • Completion of the cabin lights demo, a foundational reference system demonstrating safety-relevant behavior and validation concepts
  • Extension of the demo using NASA Core Flight System (cFS), incorporating telemetry, monitoring, and auto-generated safety checks
  • Development of a product classification template to characterize aerospace and space systems by safety level and system attributes
  • Collaboration with other ELISA groups (e.g., Systems WG) on reference architectures and cross-domain concepts such as mixed-criticality systems
  • Progress in industry papers and research contributions, including submission to the Digital Avionics Systems Conference

Focus Areas and Priorities for 2026

  • Expanding system and product classification models (including NASA-class systems)
  • Enhancing and scaling reference demos and baseline system studies
  • Strengthening collaboration with the Space Grade Linux initiative
  • Advancing industry papers and formal publications
  • Continuing improvements in tooling, CI environments, and documentation processes

Opportunities for Collaboration

  • Open monthly and weekly meetings covering general topics, demos, and paper development
  • Active contribution areas including demos, documentation, linting, and research
    Engagement via GitHub, mailing lists, and community channels

This session highlighted how the Aerospace Working Group is building practical artifacts, frameworks, and collaborative momentum to enable Linux in safety-critical aerospace environments, while inviting broader participation from the community. To learn more watch the session here.

ELISA Seminar – From Requirements to Code: Managing End-to-End Traceability with BASIL - recap blog

ELISA Seminar – Recap Notes – From Requirements to Code: Managing End-to-End Traceability with BASIL

By Ambassadors, Blog

This seminar explores BASIL, an open source requirements and traceability management tool under the ELISA Project. BASIL enables teams to connect specifications, requirements, test artifacts, documentation and source code using flexible traceability matrices while integrating with existing test infrastructures. In this session, Luigi Pellecchia, BASIL Maintainer and member of the ELISA Project Technical Steering Committee, presents how BASIL supports end-to-end traceability from requirements to code, improves collaboration and governance through role-based permissions, traceability-as-code, and AI-driven workflow guidance, and helps teams manage software quality evidence in a collaborative environment.

The session includes a live demonstration of BASIL, showcasing its web-based architecture, deployment options, and how users can create, map, and manage work items such as requirements, test specifications, and test cases. It also highlights integration with test management tools, external CI systems, and APIs, along with features for importing data, exporting traceability matrices, and automating workflows. The seminar further introduces advanced capabilities such as repository scanning and building traceability from distributed project assets, illustrating how BASIL can support complex, real-world development environments.

Learn more about BASIL.

Safety Critical Software Track

What to expect from the ELISA Project at Open Source Summit 2026 – North America

By Blog, Critical Software Summit, ELISA Summit, Industry Conference, Safety-Critical Software Summit

Open Source Summit is the premier event for open source developers and contributors. It’s where maintainers, technologists, and community leaders come together to share knowledge, collaborate on solutions, and push open source projects forward. It’s the home for code, community, and the people driving the future of open source.

A Cross-Domain Home for the Entire Open Source Ecosystem

Open Source Summit is not a single-focus, niche event—it’s the big tent that unites the full spectrum of open source technologies and communities. Whether you work in cloud infrastructure, Linux kernel development, AI/ML, embedded systems, DevOps, security, or safety-critical systems, Open Source Summit offers a shared space to exchange ideas, make connections, and learn across domains. It’s where technologists who don’t typically land in the same room get a chance to collaborate.

At the same time, Open Source Summit brings in the leaders and practitioners who support the ecosystem from non-technical angles: open source program office (OSPO) staff, legal experts, policy advocates, standards organizations, equity champions, community managers, and foundation leaders. Together, they help shape the frameworks, culture, and strategy that make open source work.

A Strategic Gathering for Open Source’s Future

This event serves as a strategic checkpoint for the open source movement. It’s where conversations happen about not only what’s being built—but how and why. From sustainability and funding models to licensing, AI alignment, security, and governance, Open Source Summit brings clarity and direction to a fast-changing open source landscape.

Whether you’re deep in code or focused on enabling the communities and structures that support it, this is where your work gains momentum and impact.

Safety Critical Software Track:

The ELISA Project will be part of the safety track that explores the intersection of open source and safety standards, covering best practices for regulatory compliance, security updates, and safety engineering. Sessions will delve into requirements traceability, quality assessments, safety analysis methodologies, and technical development for safety-critical systems.

Session Highlights:BoF: Space Grade Linux: From Incubation to Foundation – Ramón Roche & Kate Stewart, The Linux Foundation

Monday May 18, 2026 5:25pm – 6:05pm CDT

SGL is graduating from ELISA incubation and launching as its own foundation. This BoF is a working discussion on three things: the structure of the new Technical Advisory Council, the near-term roadmap emerging from our mailing list, and where attendees want to plug in. New faces and long-time contributors equally welcome. Bring questions, bring priorities, bring pushback.

Software Supply Chain Management With the Yocto Project – Joshua Watt, Garmin

Wednesday May 20, 2026 11:00am – 11:40am CDT

Managing software supply chains is an important part of safety critical software. In this talk, Joshua will describe the technologies, methods and lessons learned that the embedded software space uses to manage software supply chains using the Yocto project.

The Final Phase of Xen Safety: Solving Coverage and Residual Gaps – Stefano Stabellini, AMD

Wednesday May 20, 2026 11:55am – 12:35pm CDT

AMD, in collaboration with the Xen community, continues to advance efforts to make the Xen hypervisor safety-certifiable to ISO 26262 ASIL D and IEC 61508 SIL 3. The project has progressed from Safety Concept Approval toward the final certification phase.

This presentation will share practical lessons learned, including how we structure requirements and architecture specification documents to make them easier to review for Open Source experts. It will describe the tools and processes we use to maintain end-to-end traceability and explain how we leverage GitLab to automate requirements-based testing and verification pipelines.

We will also address the remaining challenges on the path to completion, including code coverage and FMEA. In particular, we will explain why achieving comprehensive code coverage is uniquely challenging for a widely used Open Source project such as Xen and outline the strategies we are applying to meet 100% code coverage targets.

Finally, we will describe our approach to FMEA (Failure Mode and Effects Analysis) and how it evolved to better align with existing upstream Xen failure-handling practices.

From Pull Request To Patient Safety: How Tidepool Built an Open-Source Quality Management System – Tapani Otala, Tidepool

Wednesday May 20, 2026 2:10pm – 2:50pm CDT

When software can directly affect whether someone lives or dies, “move fast and break things” isn’t an option. But does that mean safety-critical software can’t be open source? Tidepool’s experience building Tidepool Loop – an FDA-cleared, open-source automated insulin delivery (AID) system for people with Type 1 diabetes – proves it can.

This talk explores how Tidepool developed an open-source quality management system (QMS) that achieves full requirements traceability and testability while preserving the collaborative, transparent ethos of open-source development. We’ll walk through the real-world challenges of mapping regulatory requirements to code contributions, maintaining traceability across a distributed contributor base, and building test infrastructure that satisfies both FDA expectations and open-source community standards.

Attendees will leave with a practical framework for applying requirements traceability and verification practices to open-source projects operating in regulated or safety-critical domains from medical devices to automotive systems to critical infrastructure.

Standardizing Deterministic Interoperability and Resource-Intelligent Design in Medical Robotics – Lilinoe Harbottle, San Jose State University

Wednesday May 20, 2026 3:05pm – 3:45pm CDT

In medical robotics, innovation can be bottlenecked by vertically integrated architectures that contribute to medical “deserts” due to high costs and limited interoperability. This session explores architectural frameworks for standardizing deterministic interoperability, shifting the safety burden from non-transparent hardware to auditable software logic. By establishing these standards, this work ensures that clinical technology is not restricted by fixed vendor-lock.

Through a methodology of high-precision kinematic verification and deterministic mapping, open-source code becomes the catalyst for hardware autonomy. This approach ensures sub-millisecond reliability in the operating room while promoting lifecycle sustainability through vendor-neutral middleware.

Attendees will learn about the implementation of safety-operated envelopes and clinical validation models that facilitate reproducible research and lower barriers to local manufacturing. By prioritizing architectural transparency over closed-loop frameworks, this session outlines a path toward a more sustainable and accessible future for global healthcare.

Modernizing Software Verification – Craig Christianson, United States Air Force

Wednesday May 20, 2026 4:20pm – 5:00pm CDT

In this session, Craig will discuss the importance of verifying safety-critical software by giving real-world examples of peoples’ lives who were saved or put at risk by software. He will share the compliance challenges faced by software engineers working on safety-critical software. He will give a brief overview of software assurance requirements for safety-critical systems and show how formal methods and automated reasoning are accelerating and improving the assurance process. He will give a brief introduction to automated reasoning tools and semantics, and will share success stories from a handful of open-source projects who are using these methods to reach assurance goals faster. Craig will finish by walking the audience through the design of a simple demonstration project that utilizes these technologies.

Learn more about the sessions and register for the event. Register for $699 with code SPRING and save over 40%.

What to Expect from the ELISA Project at Embedded World Exhibition & Conference 2026

What to Expect from the ELISA Project at Embedded World 2026

By Ambassadors, Blog, Industry Conference

The ELISA Project will be participating in the upcoming Embedded World Exhibition & Conference, taking place March 10–12, 2026 at Messezentrum Nürnberg, Germany.

Established in 2003, Embedded World has become one of the most important annual gatherings for the global embedded systems community. The event combines a large industry exhibition with a world-class conference program that bridges applied research and real-world industrial applications.

For the ELISA Project community, this event offers an opportunity to connect with engineers, researchers, and organizations working to enable safe use of Linux in safety-critical systems.

ELISA at Embedded World 2026

At this year’s event, the ELISA Project will engage with attendees through:

  • A conference session discussing approaches for assessing the safe usage of Linux

  • On-site discussions with ELISA ambassadors and community members

  • Opportunities to connect with companies building Linux-based safety-critical systems

If you are developing systems where safety, reliability, and open source intersect, this is a great chance to learn more about how the ELISA Project is advancing safety practices around Linux.

Conference Session: Assessing Safe Usage of Linux

A key highlight will be a talk by Kate Stewart from the Linux Foundation.

Approaches on Assessing Safe Usage of Linux

📅 March 10, 2026
⏱ 11:30 (30 minutes)

Linux has become one of the most widely used operating systems across industries—from deeply embedded devices in automotive, aerospace, and medical systems to servers powering global financial infrastructure.

While there are established mechanisms for maintaining and distributing security updates, the question remains:

After applying fixes and updates, how can we demonstrate that a Linux-based system is still safe to use in regulated environments?

In this session, Kate Stewart will explore:

  • Current approaches within the ELISA Project to evaluate Linux in the context of functional safety
  • Methods to support analysis and verification of Linux-based systems
  • Opportunities for automation and collaboration across the ecosystem
  • Emerging best practices for organizations building safety-critical Linux systems

The talk will provide insight into how the community is working to make Linux viable for safety-certified environments.

Learn more about the Embedded World Conference here.

Meet the ELISA Community

In addition to the conference session, several ELISA Project ambassadors and contributors will be attending Embedded World, including: Philipp Ahmann — ETAS GmbH, Nicole Pappler – Alektometis, Simone Weiß — Linutronix along with many other members of the ELISA Project ecosystem.

They will be available throughout the event to discuss:

  • The ELISA Project’s mission and roadmap
  • Collaboration opportunities
  • Safety practices for Linux-based systems
  • How organizations can participate in the project

Let’s Connect

If you are attending Embedded World and already working on Linux-based safety-critical applications, or interested in learning more about the ELISA Project and its goals for 2026 we encourage you to connect with the team during the event.

You can:

  • Reach out directly to ELISA ambassadors onsite
  • Or contact the project team (info@elisa.tech) to schedule a meeting

Embedded World is a fantastic opportunity to exchange ideas, learn from industry leaders, and explore how open source and safety engineering can evolve together. See you there!

What Do You Mean When You Say…? - Introducing the ELISA Glossary for Safety-Critical Open Source Blog by Simone Weiss, Linutronix

What do you mean when you say…?

By Ambassadors, Blog

This blog post “What Do You Mean When You Say…?” Introducing the ELISA Glossary for Safety-Critical Open Source” was written by Simone Weiss, Linutronix.

You’re reading a blog post, and three sentences in, you encounter a term and wonder, “What does the author mean when they say that?” You could research it, but you keep reading, telling yourself, “I’ll figure it out later.” We’ve all been there.

The world of embedded and safety-critical open source uses specific terms that can make it hard to understand what’s meant. That’s why we created the ELISA Glossary—a single place for all those terms.

Take a look at the glossary here:
https://directory.elisa.tech/glossary/index.html

What Is the ELISA Glossary?

The ELISA Glossary is a collection of definitions for terms that frequently come up in the ELISA project. Each entry tries to provide not just the theoretical meaning but also the way of how it’s used within ELISA.

You’ll find definitions covering:

  • Safety and certification concepts
  • Embedded and real-time software terms
  • Open-source processes and tools
  • Standards, specifications, and compliance-related language

The glossary is useful for things like:

  • Reading an ELISA blog post and needing a quick refresher
  • Joining a new working group and encountering unfamiliar terms
  • Ensuring consistent language across documents and discussions

The glossary is work in progress. As tools evolve, standards shift, and best practices change, the glossary will continue to grow. We rely on community feedback – if there’s a term you think should be added or a definition that needs refinement, let us know!

Why the Glossary?

The ELISA Project brings together engineers, safety experts, and organizations working on Linux-based safety-critical systems. This diverse mix of industry, standards, and technical backgrounds is one of ELISA’s strengths—but it also means we use a language that’s not always obvious to newcomers, occasional contributors, or even long-time members diving into new topics.

Since ELISA began, we’ve created:

  • Technical documentation
  • Working group deliverables
  • Presentations

Certain terms pop up again and again, which is where the ELISA Glossary comes in—to help make those terms easier to understand, reference, and use consistently.

Explore the ELISA Glossary

https://directory.elisa.tech/glossary/index.html

Clear language may not solve all the challenges in safety-critical software, but it sure makes collaboration easier.

Enabling Linux in Safety Applications (ELISA) Project Expands Premier Membership with NVIDIA

Enabling Linux in Safety Applications (ELISA) Project Expands Premier Membership with NVIDIA

By Announcement, Blog, News

SAN FRANCISCO, February 26, 2026 – Today, the ELISA (Enabling Linux in Safety Applications) Project announced that NVIDIA has joined as a Premier member and will contribute to advancing the use of Linux in safety-critical and regulated systems. Hosted by the Linux Foundation, ELISA is an open source initiative focused on creating a shared set of elements, processes, and tools to help companies develop and certify Linux-based safety-critical applications and systems.

As software-defined and AI-enabled systems become increasingly central to industries such as automotive, robotics, industrial automation and aerospace, ensuring the safety, reliability, and compliance of Linux-based platforms is more important than ever.

“Linux plays a foundational role in modern, software-defined systems, including those that must meet stringent safety requirements,” said Kate Stewart, Vice President of Dependable Embedded Systems at the Linux Foundation. “NVIDIA’s leadership in accelerated computing, AI, and software platforms brings deep technical expertise to the ELISA community. Their engagement will help drive forward scalable, safety-focused approaches to using Linux in increasingly complex systems.”

NVIDIA joins existing premier members Boeing and Redhat.

ELISA Project General Members include AISIN, arm, Bosch, Canonical, Codethink, Elektrobit, EMQ, Honda, Huawei, Linutronix, Lynx Software Technologies, Nissan Motor Corporation and WindRiver. Associate members Automotive Grade Linux, KernelCI, Institute of Aircraft Systems Engineering and The Regensburg University of Applied Sciences. Learn more about membership here.

 Safety-Critical Software

Open Source Summit North America, scheduled for May 18-20 in Minneapolis, Minnesota, will host a Safety-Critical Software track that features technical sessions, case studies, and cross-industry collaboration initiatives presented by ELISA Project members, ambassadors and contributors. Register here for early-bird pricing by March 24.

About the Linux Foundation

The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure including Linux, Kubernetes, Node.js, ONAP, OpenChain, OpenSSF, PyTorch, RISC-V, SPDX, Zephyr, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org. The Linux Foundation has registered trademarks and uses trademarks.

For a list of trademarks of The Linux Foundation, please see its trademark usage page: www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.

For more information:

Maemalynn Meanor

The Linux Foundation