Open STrRedWolf opened 11 years ago
I'd honestly like to see an implementation that allows for policies on flags beyond the basics. That way on systems like gentoo, a regular user could lspci but not something like "lspci -qq".
@MrSchism sudo allows something like that. (You can allow "lspci" to be executed as root without password but not when it's passed any flags.)
Sudo is a whole separate thing that I've never dug too much... but I've never noticed that sort of feature.
That's actually not a permission issue on Gentoo, but rather a $PATH issue. The log output says
sh: lspci: command not found
but nothing about not having permissions.
The reason for this happening is: only root has /sbin and /usr/sbin in its $PATH, while a regular user doesn't. It is still executable for everyone:
-rwxr-xr-x 1 root root 69648 27. Sep 15:30 /usr/sbin/lspci*
So the simple fix here would be to fall back to /usr/sbin/lspci when simply executing lspci doesn't succeed.
According to https://www.archlinux.org/packages/core/x86_64/pciutils/ Arch Linux might also be affected by this bug and the solution I proposed in the previous comment would solve it there, too.
If you're in another distro that locks things down, some info isn't presented. For instance, in Gentoo, lspci is not allowed for ordinary users. When you get some system info, you need to be root to run lspci, or else you get a "sh: lspci: command not found" where you ran Steam at the command line.
Here's the results.
Processor Information:
Network Information:
Operating System Version:
Video Card:
Sound card:
Memory:
Miscellaneous:
Installed software:
Recent Failure Reports: