public inbox for linux-bluetooth@vger.kernel.org
 help / color / mirror / Atom feed
* [Bluez-devel] Browsing Anycom GP-600 GPS Receiver fails
@ 2006-09-18 21:28 M Josenhans
  2006-09-21 16:07 ` Marcel Holtmann
  0 siblings, 1 reply; 2+ messages in thread
From: M Josenhans @ 2006-09-18 21:28 UTC (permalink / raw)
  To: bluez-devel

Hello bluez,

I own an Anycom GP-600 GPS Receiver. This receiver might have a broken 
SDP stack. I use SuSE Linux 9.3.

When browsing the device using the sdptool browse command, it fails. 
However when using Konqueror to browse the SDP-record on the same 
distribution it works fine.

The difference between kde and sdptool browse seems to be, that kde uses 
a 32 bit UUID, while the sdptool uses a 16 bit UUID.

Is there any chance that bluez could handle such trouble more gracefully 
and issue a waring? I remember prior Bluez versions had been working 
slightly better.

Below you find the dumps for browsing with KDE and sdptool.

Br,
Michael


Browsing with KDE seems to use 32Bit UUID:
------------------------------------------
HCI sniffer - Bluetooth packet analyzer ver 1.18
device: hci0 snap_len: 1028 filter: 0xffffffff
< HCI Command: Inquiry (0x01|0x0001) plen 5
     lap 0x9e8b33 len 6 num 0
 > HCI Event: Command Status (0x0f) plen 4
     Inquiry (0x01|0x0001) status 0x00 ncmd 1
 > HCI Event: Inquiry Result (0x02) plen 15
     bdaddr 00:12:EE:9C:D4:CD clkoffset 0x4af5 class 0x520204
 > HCI Event: Inquiry Result (0x02) plen 15
     bdaddr 00:0E:07:8D:EC:65 clkoffset 0x024d class 0x520204
< HCI Command: Create Connection (0x01|0x0005) plen 13
     bdaddr 00:02:78:02:BF:8C ptype 0xcc18 rswitch 0x01 clkoffset 0x0000
     Packet type: DM1 DM3 DM5 DH1 DH3 DH5
 > HCI Event: Inquiry Complete (0x01) plen 1
     status 0x00
 > HCI Event: Command Status (0x0f) plen 4
     Create Connection (0x01|0x0005) status 0x00 ncmd 1
 > HCI Event: Link Key Request (0x17) plen 6
     bdaddr 00:02:78:02:BF:8C
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
     bdaddr 00:02:78:02:BF:8C
     Link key: 8495e337c0ed515f4925967cead95d83
 > HCI Event: Command Complete (0x0e) plen 10
     Link Key Request Reply (0x01|0x000b) ncmd 1
     status 0x00 bdaddr 00:02:78:02:BF:8C
 > HCI Event: Connect Complete (0x03) plen 11
     status 0x00 handle 43 bdaddr 00:02:78:02:BF:8C type ACL encrypt 0x01
< ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Connect req: psm 1 scid 0x0040
< HCI Command: Write Link Policy Settings (0x02|0x000d) plen 4
     handle 43 policy 0x0f
     Link policy: RSWITCH HOLD SNIFF PARK
 > HCI Event: Command Complete (0x0e) plen 6
     Write Link Policy Settings (0x02|0x000d) ncmd 1
     status 0x00 handle 43
 > HCI Event: Page Scan Repetition Mode Change (0x20) plen 7
 > HCI Event: Max Slots Change (0x1b) plen 3
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 16
     L2CAP(s): Connect rsp: dcid 0x0051 scid 0x0040 result 1 status 2
       Connection pending - Authorization pending
 > ACL data: handle 43 flags 0x02 dlen 16
     L2CAP(s): Connect rsp: dcid 0x0051 scid 0x0040 result 0 status 0
       Connection successful
< ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Config req: dcid 0x0051 flags 0x00 clen 0
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 14
     L2CAP(s): Config rsp: scid 0x0040 flags 0x00 result 0 clen 0
       Success
 > ACL data: handle 43 flags 0x02 dlen 16
     L2CAP(s): Config req: dcid 0x0040 flags 0x00 clen 4
       MTU 48
< ACL data: handle 43 flags 0x02 dlen 14
     L2CAP(s): Config rsp: scid 0x0051 flags 0x00 result 0 clen 0
       Success
< ACL data: handle 43 flags 0x02 dlen 26
     L2CAP(d): cid 0x0051 len 22 [psm 1]
         SDP SSA Req: tid 0x0 len 0x11
           pat uuid-32 0x1002 (PubBrwsGrp)
           max 65535
           aid(s) 0x0000 - 0xffff
           cont 00
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 14
     L2CAP(d): cid 0x0040 len 10 [psm 1]
         SDP SSA Rsp: tid 0x0 len 0x5
           count 2
           cont 00
< ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Disconn req: dcid 0x0051 scid 0x0040
< ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Connect req: psm 1 scid 0x0041
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Disconn rsp: dcid 0x0051 scid 0x0040
 > ACL data: handle 43 flags 0x02 dlen 16
     L2CAP(s): Connect rsp: dcid 0x0052 scid 0x0041 result 1 status 2
       Connection pending - Authorization pending
 > ACL data: handle 43 flags 0x02 dlen 16
     L2CAP(s): Connect rsp: dcid 0x0052 scid 0x0041 result 0 status 0
       Connection successful
< ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Config req: dcid 0x0052 flags 0x00 clen 0
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 14
     L2CAP(s): Config rsp: scid 0x0041 flags 0x00 result 0 clen 0
       Success
 > ACL data: handle 43 flags 0x02 dlen 16
     L2CAP(s): Config req: dcid 0x0041 flags 0x00 clen 4
       MTU 48
< ACL data: handle 43 flags 0x02 dlen 14
     L2CAP(s): Config rsp: scid 0x0052 flags 0x00 result 0 clen 0
       Success
< ACL data: handle 43 flags 0x02 dlen 26
     L2CAP(d): cid 0x0052 len 22 [psm 1]
         SDP SSA Req: tid 0x0 len 0x11
           pat uuid-32 0x0100 (L2CAP)
           max 65535
           aid(s) 0x0000 - 0xffff
           cont 00
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 17
 > ACL data: handle 43 flags 0x01 dlen 17
 > ACL data: handle 43 flags 0x01 dlen 17
 > ACL data: handle 43 flags 0x01 dlen 1
     L2CAP(d): cid 0x0041 len 48 [psm 1]
         SDP SSA Rsp: tid 0x0 len 0x2b
           count 38
           cont 02 00 0F
< ACL data: handle 43 flags 0x02 dlen 28
     L2CAP(d): cid 0x0052 len 24 [psm 1]
         SDP SSA Req: tid 0x1 len 0x13
           pat uuid-32 0x0100 (L2CAP)
           max 65535
           aid(s) 0x0000 - 0xffff
           cont 02 00 0F
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 17
 > ACL data: handle 43 flags 0x01 dlen 10
     L2CAP(d): cid 0x0041 len 23 [psm 1]
         SDP SSA Rsp: tid 0x1 len 0x12
           count 15
           record #0
               aid 0x0000 (SrvRecHndl)
                  uint 0x10000
               aid 0x0001 (SrvClassIDList)
                  < uuid-16 0x1101 (SP) >
               aid 0x0004 (ProtocolDescList)
                  < < uuid-16 0x0100 (L2CAP) > <
                  uuid-16 0x0003 (RFCOMM) uint 0x1 > >
               aid 0x0100 (SrvName)
                  str "SPP slave"
           cont 00
< ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Disconn req: dcid 0x0052 scid 0x0041
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 43
 > ACL data: handle 43 flags 0x02 dlen 12
     L2CAP(s): Disconn rsp: dcid 0x0052 scid 0x0041
< HCI Command: Disconnect (0x01|0x0006) plen 3
     handle 43 reason 0x13
     Reason: Remote User Teminated Connection
 > HCI Event: Command Status (0x0f) plen 4
     Disconnect (0x01|0x0006) status 0x00 ncmd 1
 > HCI Event: Disconn Complete (0x05) plen 4
     status 0x00 handle 43 reason 0x16
     Reason: Connection Terminated by Local Host



Browsing with sdptool command seems to use 16 Bit UUIDs:
--------------------------------------------------------

sdptool browse <bdaddr>;

HCI sniffer - Bluetooth packet analyzer ver 1.18
device: hci0 snap_len: 1028 filter: 0xffffffff
< HCI Command: Create Connection (0x01|0x0005) plen 13
     bdaddr 00:02:78:02:BF:8C ptype 0xcc18 rswitch 0x01 clkoffset 0x0000
     Packet type: DM1 DM3 DM5 DH1 DH3 DH5
 > HCI Event: Command Status (0x0f) plen 4
     Create Connection (0x01|0x0005) status 0x00 ncmd 1
 > HCI Event: Link Key Request (0x17) plen 6
     bdaddr 00:02:78:02:BF:8C
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
     bdaddr 00:02:78:02:BF:8C
     Link key: 8495e337c0ed515f4925967cead95d83
 > HCI Event: Command Complete (0x0e) plen 10
     Link Key Request Reply (0x01|0x000b) ncmd 1
     status 0x00 bdaddr 00:02:78:02:BF:8C
 > HCI Event: Connect Complete (0x03) plen 11
     status 0x00 handle 42 bdaddr 00:02:78:02:BF:8C type ACL encrypt 0x01
< ACL data: handle 42 flags 0x02 dlen 12
     L2CAP(s): Connect req: psm 1 scid 0x0040
< HCI Command: Write Link Policy Settings (0x02|0x000d) plen 4
     handle 42 policy 0x0f
     Link policy: RSWITCH HOLD SNIFF PARK
 > HCI Event: Command Complete (0x0e) plen 6
     Write Link Policy Settings (0x02|0x000d) ncmd 1
     status 0x00 handle 42
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 42
 > HCI Event: Page Scan Repetition Mode Change (0x20) plen 7
 > HCI Event: Max Slots Change (0x1b) plen 3
 > ACL data: handle 42 flags 0x02 dlen 16
     L2CAP(s): Connect rsp: dcid 0x0050 scid 0x0040 result 1 status 2
       Connection pending - Authorization pending
 > ACL data: handle 42 flags 0x02 dlen 16
     L2CAP(s): Connect rsp: dcid 0x0050 scid 0x0040 result 0 status 0
       Connection successful
< ACL data: handle 42 flags 0x02 dlen 12
     L2CAP(s): Config req: dcid 0x0050 flags 0x00 clen 0
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 42
 > ACL data: handle 42 flags 0x02 dlen 14
     L2CAP(s): Config rsp: scid 0x0040 flags 0x00 result 0 clen 0
       Success
 > ACL data: handle 42 flags 0x02 dlen 16
     L2CAP(s): Config req: dcid 0x0040 flags 0x00 clen 4
       MTU 48
< ACL data: handle 42 flags 0x02 dlen 14
     L2CAP(s): Config rsp: scid 0x0050 flags 0x00 result 0 clen 0
       Success
< ACL data: handle 42 flags 0x02 dlen 24
     L2CAP(d): cid 0x0050 len 20 [psm 1]
         SDP SSA Req: tid 0x0 len 0xf
           pat uuid-16 0x1002 (PubBrwsGrp)
           max 65535
           aid(s) 0x0000 - 0xffff
           cont 00
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 42
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 42
 > ACL data: handle 42 flags 0x02 dlen 14
     L2CAP(d): cid 0x0040 len 10 [psm 1]
         SDP SSA Rsp: tid 0x0 len 0x5
           count 2
           cont 00
< ACL data: handle 42 flags 0x02 dlen 12
     L2CAP(s): Disconn req: dcid 0x0050 scid 0x0040
 > HCI Event: Number of Completed Packets (0x13) plen 5
     handle 42
 > ACL data: handle 42 flags 0x02 dlen 12
     L2CAP(s): Disconn rsp: dcid 0x0050 scid 0x0040
< HCI Command: Disconnect (0x01|0x0006) plen 3
     handle 42 reason 0x13
     Reason: Remote User Teminated Connection
 > HCI Event: Command Status (0x0f) plen 4
     Disconnect (0x01|0x0006) status 0x00 ncmd 1
 > HCI Event: Disconn Complete (0x05) plen 4
     status 0x00 handle 42 reason 0x16
     Reason: Connection Terminated by Local Host


-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys -- and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Bluez-devel mailing list
Bluez-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bluez-devel

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [Bluez-devel] Browsing Anycom GP-600 GPS Receiver fails
  2006-09-18 21:28 [Bluez-devel] Browsing Anycom GP-600 GPS Receiver fails M Josenhans
@ 2006-09-21 16:07 ` Marcel Holtmann
  0 siblings, 0 replies; 2+ messages in thread
From: Marcel Holtmann @ 2006-09-21 16:07 UTC (permalink / raw)
  To: BlueZ development

Hi Michael,

> I own an Anycom GP-600 GPS Receiver. This receiver might have a broken 
> SDP stack. I use SuSE Linux 9.3.
> 
> When browsing the device using the sdptool browse command, it fails. 
> However when using Konqueror to browse the SDP-record on the same 
> distribution it works fine.
> 
> The difference between kde and sdptool browse seems to be, that kde uses 
> a 32 bit UUID, while the sdptool uses a 16 bit UUID.
> 
> Is there any chance that bluez could handle such trouble more gracefully 
> and issue a waring? I remember prior Bluez versions had been working 
> slightly better.

it simply means that this device has no public browse group. That is not
a bug. Try "sdptool browse --l2cap <bdaddr>" and see if this works.

Regards

Marcel



-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys -- and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Bluez-devel mailing list
Bluez-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bluez-devel

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2006-09-21 16:07 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-09-18 21:28 [Bluez-devel] Browsing Anycom GP-600 GPS Receiver fails M Josenhans
2006-09-21 16:07 ` Marcel Holtmann

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox