aboutsummaryrefslogtreecommitdiff
path: root/accessibility/ydotool/README
diff options
context:
space:
mode:
Diffstat (limited to 'accessibility/ydotool/README')
-rw-r--r--accessibility/ydotool/README17
1 files changed, 17 insertions, 0 deletions
diff --git a/accessibility/ydotool/README b/accessibility/ydotool/README
new file mode 100644
index 000000000000..82fea36211cb
--- /dev/null
+++ b/accessibility/ydotool/README
@@ -0,0 +1,17 @@
+ydotool (send fake keyboard/mouse events to the kernel)
+
+ydotool is an automation tool, similar to xdotool, but it doesn't
+require X. It can be used to send input to console or wayland
+applications, as well as X.
+
+ydotool works differently from xdotool. xdotool sends X events
+directly to X server, while ydotool uses the uinput framework of Linux
+kernel to emulate an input device.
+
+To use ydotool, the user must have read/write access to /dev/uinput.
+On Slackware, this means ydotool would need root access. This
+SlackBuild installs ydotool setuid root, but only users in the
+'console' group can run it. Since 'console' users can already use the
+real keyboard and mouse, it doesn't seem like a huge security risk to
+let them send fake events. If this bothers you, run the script with
+SETUID=no in the environment to disable it.