at bottom :- On 04/02/2018, Sylvestre Ledru <sylves...@debian.org> wrote: > Hello, > > Le 04/02/2018 à 13:56, shirish शिरीष a écrit : >> Package: spectre-meltdown-checker >> Version: 0.32-1 >> Severity: normal >> >> Dear Maintainer, >> >> I was trying to run spectre-meltdown-checker as a normal user first - >> >> /home/shirish> spectre-meltdown-checker >> Spectre and Meltdown mitigation detection tool v0.32 >> >> Note that you should launch this script with root privileges to get >> accurate information. >> We'll proceed but you might see permission denied errors. > > I had the feeling that a bunch of non-root information are still > interesting and relevant. > > This is why I put it in /usr/bin/ > > S > >
You are right, in that situation it still does produces interesting content. Btw are you thinking of bumping it to 0.34 as that has been released or are you waiting for the newer kernel 3.16 to arrive before you release the new one. from https://qa.debian.org/cgi-bin/vcswatch?package=spectre-meltdown-checker I do see you did do an interim release on the git repo. but haven't really released 0.33-1. It does seem the vulnerabilities will be around for sometime. I did read that newer chips will have few changes come in for branch-prediction and stuff but those who got old chips, we will either have to take a huge performance cut or go buy new chips. Of course Intel benefits from taking no action then and now and simply will sell more new chips -- Regards, Shirish Agarwal शिरीष अग्रवाल My quotes in this email licensed under CC 3.0 http://creativecommons.org/licenses/by-nc/3.0/ http://flossexperiences.wordpress.com EB80 462B 08E1 A0DE A73A 2C2F 9F3D C7A4 E1C4 D2D8