Hello,
The permissions of this file should be rwxr-xr-x (755) which means executable by anyone.
andand are therefore readable (and writable) by user root or group input. If your user is in the input group, evtest is “able to read from the device”.will show you all these files.
May also be relevant:
I assume you mean the executable /usr/bin/evtestWhen I look at the properties of the file evtest I see that the owner is 'root' and the group is 'root'.
The permissions of this file should be rwxr-xr-x (755) which means executable by anyone.
According to evtest's manualBut members of the group 'input' also can execute the command without sudo. I discovered this by trial and error. How can I find which groups are able to execute the command (evtest) without sudo????
namely in /dev/input/The output of evtest shows the information presented by the kernel
and
However, files in /dev/input/ belong to root/input with permissions 660, e.g.evtest needs to be able to read from the device; in most cases this means it must be run as root.
Code:
$> ls -l /dev/input/event1crw-rw---- 1 root input 13, 65 Apr 23 12:11 /dev/input/event1
Code:
$> find /dev/ -group "input"
May also be relevant:
If evtest does not show any events even though the device is being used, the device may be grabbed by a process (EVIOCGRAB). This is usually the case when debugging a synaptics device from
within X. VT switching to a TTY or shutting down the X server terminates this grab and synaptics devices can be debugged.
The following command shows the processes with an open file descriptor on the device:
fuser -v /dev/input/eventX
Statistics: Posted by fabien — 2024-04-23 11:45