Package: spectre-meltdown-checker
Version: 0.32-1
Severity: normal

Dear Maintainer,

I was trying to run spectre-meltdown-checker as a normal user first -

/home/shirish> spectre-meltdown-checker
Spectre and Meltdown mitigation detection tool v0.32

Note that you should launch this script with root privileges to get
accurate information.
We'll proceed but you might see permission denied errors.
To run it as root, you can try the following command: sudo
/usr/bin/spectre-meltdown-checker

if it needs roots privileges, shouldn't it be in
/usr/sbin/spectre-meltdown-checker ?

It kinda feels twisted especially when you see that it's the kernel
which is being looked into,
not the userspace.

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (900, 'testing'), (500, 'unstable-debug'), (500,
'testing-debug'), (1, 'experimental-debug'), (1, 'experimental'), (1,
'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.14.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_IN.UTF-8, LC_CTYPE=en_IN.UTF-8 (charmap=UTF-8)
(ignored: LC_ALL set to en_IN.UTF-8), LANGUAGE=en_IN.UTF-8
(charmap=UTF-8) (ignored: LC_ALL set to en_IN.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-- no debconf information

-- 
          Regards,
          Shirish Agarwal  शिरीष अग्रवाल
  My quotes in this email licensed under CC 3.0
http://creativecommons.org/licenses/by-nc/3.0/
http://flossexperiences.wordpress.com
EB80 462B 08E1 A0DE A73A  2C2F 9F3D C7A4 E1C4 D2D8

Reply via email to