http://lwn.net/Articles/413255/

[LWN comment by Jim Shewmaker, a security researcher]