--- /dev/null
+0[$] Strengthening user-space Spectre v2 protection null/LWN/0000764209 70\r
+i [Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet)\r
+i\r
+i The Spectre variant 2 vulnerability allows the speculative\r
+i execution of incorrect (in an attacker-controllable way)\r
+i indirect branch predictions, resulting in the ability to\r
+i exfiltrate information via side channels. The kernel has been\r
+i reasonably well protected against this variant since shortly\r
+i after its disclosure in January. It is, however, possible for\r
+i user-space processes to use Spectre v2 to attack each other;\r
+i thus far, the mainline kernel has offered relatively little\r
+i protection against such attacks. A recent proposal from Jiri\r
+i Kosina may change that situation, but there are still some\r
+i disagreements around the details.\r
+i\r