Hi Jim, Jim Pye <[EMAIL PROTECTED]> wrote: > On Mon, 2006-02-13 at 20:53 +0100, Juergen Stuber wrote: > > 8< Snip >8 > > the official place nowadays is /dev/usb/legousbtower0 etc., > > /dev/lego0 was used by the old driver. > > > > Jürgen > > > 8< Snip >8 > > I have just tried this on a SuSE Linux 10 and the /dev/usb directory > does not exist. > > However plugging the tower into the USB port the /dev/legousbtower0
sigh. > appears automagically. For me /dev/usb/legousbtower0 appears when I plug in the first tower, /dev/usb/legousbtower1 for the second, and so on I hope (I have only two). This is on Debian. > However one thing I noticed was the owner and permissions on this new > file were root.root with rw-rw---- which means that a standard user > cannot access it by default. > > I tried to recreate the file as per the tutorial, which I understand is > allowing the world rw as well, but when I unplugged and plugged the unit > back in the permissions were back to root and rw. So there might be some > system configuration that I need to track down in the SuSE distribution > overiding this manual setup. This is probably udev at work, its configuration is under /etc/udev for Debian. Here is how it looks on my machine: [EMAIL PROTECTED] ll /dev/usb/legousbtower0 crw-rw-rw- 1 root root 180, 160 2006-02-13 20:47 /dev/usb/legousbtower0 [EMAIL PROTECTED] grep -R lego /etc/udev /etc/udev/permissions.d/udev.permissions:usb/legousbtower[0-9]*:root:root:666 /etc/udev/rules.d/udev.rules:BUS=="usb", KERNEL=="legousbtower*", NAME="usb/%k" /etc/udev/rules.d/020_permissions.rules:BUS=="usb", KERNEL=="legousbtower*", MODE="0666" /etc/udev/devfs.rules:BUS=="usb", KERNEL=="legousbtower*", NAME="usb/%k" /etc/udev/udev.rules:BUS=="usb", KERNEL=="legousbtower*", NAME="usb/%k" /etc/udev/permissions.rules:BUS=="usb", KERNEL=="legousbtower*", MODE="0666" The files in /etc/udev/rules.d are the rules actually used, they are symbolic links to files in /etc/udev. Hope this helps Jürgen -- Jürgen Stuber <[EMAIL PROTECTED]> http://www.jstuber.net/ gnupg key fingerprint = 2767 CA3C 5680 58BA 9A91 23D9 BED6 9A7A AF9E 68B4 ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://sel.as-us.falkag.net/sel?cmd=lnk&kid3432&bid#0486&dat1642 _______________________________________________ Lejos-discussion mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/lejos-discussion
