2004-10-17 12:51:33

by [email protected]

[permalink] [raw]
Subject: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open


Hi all,

I have Epox BT-dongle, Epox CP-BT-MS02B HID mouse, Nokia S60-phone (v6.1),
Bemused v1.71, bemusedlinuxserver v1.7, Linux kernel 2.6.8, bluez-libs v2.8,
bluez-utils v2.8

hcid is in security mode 3, auth+encryption turned on.

When previously paired HID-mouse is in sleep mode and there is a open but
yet idle BT connection between Bemused and bemusedlinuxserver, the mouse
cannot reconnect to the hidd daemon. When mouse button 1 is pressed, mouse
turns itself on and I assume it tries to connect, but hcid never gets or
understands to authenticate as the usual lines in the /var/log/messages do
not appear.

The usual lines which should appear when reconnection is made:
"
Oct 17 14:52:22 localhost hcid[2237]: link_key_request (sba=00:04:61:80:5D:88, dba=00:04:61:82:00:88)
Oct 17 14:52:23 localhost hidd[1135]: New HID device 00:04:61:82:00:88 (CSR HIDEngine Three Button Mouse)
Oct 17 14:52:24 localhost udev[5715]: creating device node '/udev/input/mouse0'
"

After the Bemused-application is closed in the S60-phone, the HID mouse can
reconnect again as normal.

Is this a known limitation of the current bluez-implementation or in other
resource? And no, I haven't tested yet if the problem is there also when in
security mode 0 without authentication and encryption.

// jouni



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users


2004-10-18 22:23:39

by Marcel Holtmann

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

Hi Jouni,

> > The dump shows that you have more than one hcid running. This is not a
> > good idea. Check you setup and control with hciconfig if auth and
> > encrypt are really switched off.
>
> hciconfig did show auth and encrypt were off.
> In the init scripts there is only one place where hcid is started
> /etc/init.d/bluetooth, it should had been run only once from /etc/rc5.d/
> However, I had also some old stuff for RH9 in /etc/hotplug/usb/ to make
> bluetooth autostop/autostart when dongle was removed/added on the fly and
> thats where the extra hcids were started.
>
> I tried again with only one hcid running, and auth+encrypt off. The same
> thing happened, the hcid didn't get any data from the HID mouse until
> Bemused connection was closed. After the Bemused connection close it
> then did give the following dump, where is couple of those
> "ERROR: Unexpected syntax" errors. Is those errors because the old
> version of USB dongle (and firmware)?

you can ignore them, because this is a bug in the SDP parser of hcidump.

Regards

Marcel




-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-18 22:11:57

by [email protected]

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

On Sun, Oct 17, 2004 at 11:31:02PM +0200, Marcel Holtmann wrote:
> The dump shows that you have more than one hcid running. This is not a
> good idea. Check you setup and control with hciconfig if auth and
> encrypt are really switched off.

hciconfig did show auth and encrypt were off.
In the init scripts there is only one place where hcid is started
/etc/init.d/bluetooth, it should had been run only once from /etc/rc5.d/
However, I had also some old stuff for RH9 in /etc/hotplug/usb/ to make
bluetooth autostop/autostart when dongle was removed/added on the fly and
thats where the extra hcids were started.

I tried again with only one hcid running, and auth+encrypt off. The same
thing happened, the hcid didn't get any data from the HID mouse until
Bemused connection was closed. After the Bemused connection close it
then did give the following dump, where is couple of those
"ERROR: Unexpected syntax" errors. Is those errors because the old
version of USB dongle (and firmware)?

(mouse BT address 00:04:61:82:00:88)

HCIDump - HCI packet analyzer ver 1.9
device: hci0 snap_len: 1028 filter: 0xffffffff
> ACL data: handle 0x0028 flags 0x02 dlen 8
L2CAP(d): cid 0x41 len 4 [psm 0]
53 53 01 1C
< ACL data: handle 0x0028 flags 0x02 dlen 8
L2CAP(d): cid 0x41 len 4 [psm 0]
53 73 01 36
> HCI Event: Number of Completed Packets (0x13) plen 5
01 28 00 01 00
> ACL data: handle 0x0028 flags 0x02 dlen 12
L2CAP(s): Disconn req: dcid 0x0041 scid 0x0041
< ACL data: handle 0x0028 flags 0x02 dlen 12
L2CAP(s): Disconn rsp: dcid 0x0041 scid 0x0041
> HCI Event: Number of Completed Packets (0x13) plen 5
01 28 00 01 00
< HCI Command: Disconnect (0x01|0x0006) plen 3
28 00 13
> HCI Event: Command Status (0x0f) plen 4
00 01 06 04
> HCI Event: Disconn Complete (0x05) plen 4
00 28 00 16
> HCI Event: Connect Request (0x04) plen 10
88 00 82 61 04 00 80 25 00 01
< HCI Command: Accept Connection Request (0x01|0x0009) plen 7
88 00 82 61 04 00 00
> HCI Event: Command Status (0x0f) plen 4
00 01 09 04
> HCI Event: Role Change (0x12) plen 8
00 88 00 82 61 04 00 00
> HCI Event: Link Key Request (0x17) plen 6
88 00 82 61 04 00
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
88 00 82 61 04 00 38 D3 3A 63 75 CA A6 FC 0A 56 AB 1B CB 9F
75 A0
> HCI Event: Command Complete (0x0e) plen 10
01 0B 04 00 88 00 82 61 04 00
> HCI Event: Connect Complete (0x03) plen 11
00 2B 00 88 00 82 61 04 00 01 00
< HCI Command: Write Link Policy Settings (0x02|0x000d) plen 4
2B 00 0F 00
> HCI Event: Page Scan Repetition Mode Change (0x20) plen 7
88 00 82 61 04 00 01
> HCI Event: Command Complete (0x0e) plen 6
01 0D 08 00 2B 00
< HCI Command: Change Connection Packet Type (0x01|0x000f) plen 4
2B 00 18 CC
> HCI Event: Max Slots Change (0x1b) plen 3
2B 00 05
> HCI Event: Command Status (0x0f) plen 4
00 01 0F 04
> ACL data: handle 0x002b flags 0x02 dlen 12
L2CAP(s): Connect req: psm 17 scid 0x004f
> HCI Event: Connection Packet Type Changed (0x1d) plen 5
00 2B 00 18 CC
< ACL data: handle 0x002b flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0040 scid 0x004f result 0 status 0
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 17
> ACL data: handle 0x002b flags 0x01 dlen 17
> ACL data: handle 0x002b flags 0x01 dlen 6
L2CAP(s): Config req: dcid 0x0040 flags 0x0000 clen 28
MTU 48 Unknown (type 03, len 22)
< ACL data: handle 0x002b flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x004f flags 0x0000 result 0 clen 0
< ACL data: handle 0x002b flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x004f flags 0x0000 clen 4
MTU 48
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0040 flags 0x0000 result 0 clen 0
> HCI Event: QoS Setup Complete (0x0d) plen 21
00 2B 00 00 01 00 00 00 00 00 00 00 00 FF FF FF FF FF FF FF
FF
> ACL data: handle 0x002b flags 0x02 dlen 12
L2CAP(s): Connect req: psm 19 scid 0x0050
< ACL data: handle 0x002b flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0041 scid 0x0050 result 0 status 0
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 40
L2CAP(s): Config req: dcid 0x0041 flags 0x0000 clen 28
MTU 48 Unknown (type 03, len 22)
< ACL data: handle 0x002b flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0050 flags 0x0000 result 0 clen 0
< ACL data: handle 0x002b flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x0050 flags 0x0000 clen 4
MTU 48
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0041 flags 0x0000 result 0 clen 0
< ACL data: handle 0x002b flags 0x02 dlen 12
L2CAP(s): Connect req: psm 1 scid 0x0042
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0051 scid 0x0042 result 1 status 2
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 01 00 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 00 00
> ACL data: handle 0x002b flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0051 scid 0x0042 result 0 status 0
< ACL data: handle 0x002b flags 0x02 dlen 12
L2CAP(s): Config req: dcid 0x0051 flags 0x0000 clen 0
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 08 08 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 05 06 00
> ACL data: handle 0x002b flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0042 flags 0x0000 result 0 clen 0
> HCI Event: Mode Change (0x14) plen 6
00 2B 00 02 14 00
> ACL data: handle 0x002b flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x0042 flags 0x0000 clen 4
MTU 48
< ACL data: handle 0x002b flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0051 flags 0x0000 result 0 clen 0
< ACL data: handle 0x002b flags 0x02 dlen 24
L2CAP(d): cid 0x51 len 20 [psm 1]
SDP SSA Req: tid 0x0 len 0xf
pat uuid-16 0x1200 (PNPInfo)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 04 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 04 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 04 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0C FD 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 14
L2CAP(d): cid 0x42 len 10 [psm 1]
SDP SSA Rsp: tid 0x0 len 0x5
cnt 0x2
cont 00
< ACL data: handle 0x002b flags 0x02 dlen 24
L2CAP(d): cid 0x51 len 20 [psm 1]
SDP SSA Req: tid 0x1 len 0xf
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0F FB 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 11 FA 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 10 F8 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0F F8 00
> ACL data: handle 0x002b flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x1 len 0x2b
cnt 0x26
srv rec #0
aid 0x0000 (SrvRecHndl)
uint 0x10000
aid 0x0001 (SrvClassIDList)
< uuid-16 0x1124 (HID) >
aid 0x0004 (ProtocolDescList)
< < uuid-16 0x0100 (L2CAP) uint 0x11 > <
uuid-16 0x0200 > >

ERROR: Unexpected syntax

cont
< ACL data: handle 0x002b flags 0x02 dlen 26
L2CAP(d): cid 0x51 len 22 [psm 1]
SDP SSA Req: tid 0x2 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 FB
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 10 F9 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 11 F8 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 12 F8 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 12 F9 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 10 FA 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0F FB 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0F FB 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 11 FB 00
> ACL data: handle 0x002b flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x2 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
11 09 00 06 35 09 09 65 6E 09 00 6A 09 01 00 09 00 09 35 08
35 06 19 11 24 09 01 00 09 00 0D 35 0F 35 0D 35 06 02 00 D5
cont 11 09 00 06 35 09 09 65 6E 09 00 6A 09 01 00 09 00 09 35 08 35 06 19 11 24 09 01 00 09 00 0D 35 0F 35 0D 35 06 02 00 D5
< ACL data: handle 0x002b flags 0x02 dlen 26
L2CAP(d): cid 0x51 len 22 [psm 1]
SDP SSA Req: tid 0x3 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 D5
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0F FC 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 11 FB 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0F FB 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 10 FB 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0D FB 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0D FC 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 0B FA 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 06 FD 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 FE 00
> ACL data: handle 0x002b flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x3 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
01 00 09 00 13 35 03 19 00 11 09 01 00 25 09 43 53 52 20 4D
6F 75 73 65 09 01 01 25 12 54 68 72 65 65 20 42 75 02 00 AF
cont 01 00 09 00 13 35 03 19 00 11 09 01 00 25 09 43 53 52 20 4D 6F 75 73 65 09 01 01 25 12 54 68 72 65 65 20 42 75 02 00 AF
< ACL data: handle 0x002b flags 0x02 dlen 26
L2CAP(d): cid 0x51 len 22 [psm 1]
SDP SSA Req: tid 0x4 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 AF
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 00 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FA 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F8 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F6 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F3 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F3 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F2 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F3 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x4 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
74 6F 6E 20 4D 6F 75 73 65 09 01 02 25 0D 43 53 52 20 48 49
44 45 6E 67 69 6E 65 09 02 00 09 01 00 09 02 01 09 02 00 89
cont 74 6F 6E 20 4D 6F 75 73 65 09 01 02 25 0D 43 53 52 20 48 49 44 45 6E 67 69 6E 65 09 02 00 09 01 00 09 02 01 09 02 00 89
< ACL data: handle 0x002b flags 0x02 dlen 26
L2CAP(d): cid 0x51 len 22 [psm 1]
SDP SSA Req: tid 0x5 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 89
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F0 FE 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F0 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 EE FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 EE FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F0 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F1 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F2 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x5 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
00 09 02 02 08 80 09 02 03 08 33 09 02 04 28 01 09 02 05 28
01 09 02 06 35 3C 35 3A 08 22 25 36 05 01 09 02 A1 02 00 63
cont 00 09 02 02 08 80 09 02 03 08 33 09 02 04 28 01 09 02 05 28 01 09 02 06 35 3C 35 3A 08 22 25 36 05 01 09 02 A1 02 00 63
< ACL data: handle 0x002b flags 0x02 dlen 26
L2CAP(d): cid 0x51 len 22 [psm 1]
SDP SSA Req: tid 0x6 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 63
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F3 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F4 FE 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F5 FE 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 F8 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FA FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 00 00
> ACL data: handle 0x002b flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x6 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
09 01 A1 00 85 02 05 09 19 01 29 03 15 00 25 01 95 03 75 01
81 02 95 01 75 05 81 03 05 01 09 30 09 31 09 38 15 02 00 3D
cont 09 01 A1 00 85 02 05 09 19 01 29 03 15 00 25 01 95 03 75 01 81 02 95 01 75 05 81 03 05 01 09 30 09 31 09 38 15 02 00 3D
< ACL data: handle 0x002b flags 0x02 dlen 26
L2CAP(d): cid 0x51 len 22 [psm 1]
SDP SSA Req: tid 0x7 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 3D
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 03 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 05 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 05 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 07 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FB 08 00
> ACL data: handle 0x002b flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x7 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
25 7F 75 08 95 03 81 06 C0 C0 09 02 07 35 08 35 06 09 04 09
09 01 00 09 02 08 28 00 09 02 09 28 01 09 02 0A 28 02 00 17
cont 25 7F 75 08 95 03 81 06 C0 C0 09 02 07 35 08 35 06 09 04 09 09 01 00 09 02 08 28 00 09 02 09 28 01 09 02 0A 28 02 00 17
< ACL data: handle 0x002b flags 0x02 dlen 26
L2CAP(d): cid 0x51 len 22 [psm 1]
SDP SSA Req: tid 0x8 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 17
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FA 0C 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FA 0B 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 08 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 04 00
> ACL data: handle 0x002b flags 0x02 dlen 35
L2CAP(d): cid 0x42 len 31 [psm 1]
SDP SSA Rsp: tid 0x8 len 0x1a
cnt 0x17

ERROR: Unexpected syntax
09 02 0B 09 01 00 09 02 0C 09 1F 40 09 02 0D 28 00 09 02 0E
28 01 00
cont 09 02 0B 09 01 00 09 02 0C 09 1F 40 09 02 0D 28 00 09 02 0E 28 01 00
< ACL data: handle 0x002b flags 0x02 dlen 12
L2CAP(s): Disconn req: dcid 0x0051 scid 0x0042
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 03 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
< ACL data: handle 0x002b flags 0x02 dlen 5
L2CAP(d): cid 0x4f len 1 [psm 17]
HIDP: Set protocol: Boot protocol
< ACL data: handle 0x002b flags 0x02 dlen 7
L2CAP(d): cid 0x50 len 3 [psm 19]
HIDP: Data: Output report
01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 05 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 2B 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 06 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 06 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 02 00
> ACL data: handle 0x002b flags 0x02 dlen 12
L2CAP(s): Disconn rsp: dcid 0x0051 scid 0x0042
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 04 00
> ACL data: handle 0x002b flags 0x02 dlen 5
L2CAP(d): cid 0x40 len 1 [psm 17]
HIDP: Handshake: Successful
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FB 05 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FA 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FB 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FB 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 04 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 03 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 02 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 01 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 FF 00
> HCI Event: Mode Change (0x14) plen 6
00 2B 00 00 00 00
> HCI Event: Mode Change (0x14) plen 6
00 2B 00 02 28 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 FD 00
> HCI Event: Mode Change (0x14) plen 6
00 2B 00 00 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 FF 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 06 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 06 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 07 00 00
> HCI Event: Mode Change (0x14) plen 6
00 2B 00 02 14 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 09 00 00
> ACL data: handle 0x002b flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 08 01 00

...



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 21:31:02

by Marcel Holtmann

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

Hi Jouni,

> > it is enough to do "hciconfig hci0 noauth noencrypt" for testing this,
> > but if this not helps then you should buy yourself a Bluetooth dongle
> > with at least HCI 16.4 firmware on it.
>
> Ok. It is not huge problem, as I can always disconnect the bemused
> connection for a moment to reconnect the HID mouse.
>
> But still I don't quite understand why it works otherway around,
> so if HID mouse connection is open and working, I can connect with
> Bemused client to bemusedlinuxserver whether hcid was in security mode 3
> or not, and both works until HID mouse is idle long enough to go in the
> sleep mode.

it looks like a scatternet problem.

> One thing I didn't try. Although HID mouse now made a connection without
> authentication and encryption, maybe it remembered it has to
> authenticate and tried it just like before when hcid was in security
> mode 3. The following hcidump may tell if this was the case for someone
> who is used to read those dumps?

The dump shows that you have more than one hcid running. This is not a
good idea. Check you setup and control with hciconfig if auth and
encrypt are really switched off.

Regards

Marcel




-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 20:15:17

by [email protected]

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

On Sun, Oct 17, 2004 at 09:41:16PM +0200, Marcel Holtmann wrote:
> it is enough to do "hciconfig hci0 noauth noencrypt" for testing this,
> but if this not helps then you should buy yourself a Bluetooth dongle
> with at least HCI 16.4 firmware on it.

Ok. It is not huge problem, as I can always disconnect the bemused
connection for a moment to reconnect the HID mouse.

But still I don't quite understand why it works otherway around,
so if HID mouse connection is open and working, I can connect with
Bemused client to bemusedlinuxserver whether hcid was in security mode 3
or not, and both works until HID mouse is idle long enough to go in the
sleep mode.

One thing I didn't try. Although HID mouse now made a connection without
authentication and encryption, maybe it remembered it has to
authenticate and tried it just like before when hcid was in security
mode 3. The following hcidump may tell if this was the case for someone
who is used to read those dumps?

// jouni

p.s.
hcidump where bemused connection is closed down after I try to
reconnect the HID mouse and waited about 10 secs when hcidump didn't
show anything incoming or outgoing. Either packets were hanging and
buffered somewhere, or the mouse then still tried reconnecting .,..and
also succeeded now after bemused connection was shut down.


HCIDump - HCI packet analyzer ver 1.9
device: hci0 snap_len: 1028 filter: 0xffffffff
> ACL data: handle 0x0028 flags 0x02 dlen 8
L2CAP(d): cid 0x41 len 4 [psm 0]
53 53 01 1C
< ACL data: handle 0x0028 flags 0x02 dlen 8
L2CAP(d): cid 0x52 len 4 [psm 0]
53 73 01 36
> HCI Event: Number of Completed Packets (0x13) plen 5
01 28 00 01 00
> ACL data: handle 0x0028 flags 0x02 dlen 12
L2CAP(s): Disconn req: dcid 0x0041 scid 0x0052
< ACL data: handle 0x0028 flags 0x02 dlen 12
L2CAP(s): Disconn rsp: dcid 0x0041 scid 0x0052
> HCI Event: Number of Completed Packets (0x13) plen 5
01 28 00 01 00
< HCI Command: Disconnect (0x01|0x0006) plen 3
28 00 13
> HCI Event: Command Status (0x0f) plen 4
00 01 06 04
> HCI Event: Disconn Complete (0x05) plen 4
00 28 00 16
> HCI Event: Connect Request (0x04) plen 10
88 00 82 61 04 00 80 25 00 01
< HCI Command: Accept Connection Request (0x01|0x0009) plen 7
88 00 82 61 04 00 00
> HCI Event: Command Status (0x0f) plen 4
00 01 09 04
> HCI Event: Role Change (0x12) plen 8
00 88 00 82 61 04 00 00
> HCI Event: Link Key Request (0x17) plen 6
88 00 82 61 04 00
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
88 00 82 61 04 00 38 D3 3A 63 75 CA A6 FC 0A 56 AB 1B CB 9F
75 A0
> HCI Event: Command Complete (0x0e) plen 10
01 0B 04 00 88 00 82 61 04 00
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
88 00 82 61 04 00 38 D3 3A 63 75 CA A6 FC 0A 56 AB 1B CB 9F
75 A0
> HCI Event: Command Complete (0x0e) plen 10
01 0B 04 00 88 00 82 61 04 00
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
88 00 82 61 04 00 38 D3 3A 63 75 CA A6 FC 0A 56 AB 1B CB 9F
75 A0
> HCI Event: Command Complete (0x0e) plen 10
01 0B 04 00 88 00 82 61 04 00
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
88 00 82 61 04 00 38 D3 3A 63 75 CA A6 FC 0A 56 AB 1B CB 9F
75 A0
> HCI Event: Command Complete (0x0e) plen 10
01 0B 04 00 88 00 82 61 04 00
> HCI Event: Connect Complete (0x03) plen 11
00 29 00 88 00 82 61 04 00 01 00
< HCI Command: Write Link Policy Settings (0x02|0x000d) plen 4
29 00 0F 00
> HCI Event: Page Scan Repetition Mode Change (0x20) plen 7
88 00 82 61 04 00 01
> HCI Event: Command Complete (0x0e) plen 6
01 0D 08 00 29 00
< HCI Command: Change Connection Packet Type (0x01|0x000f) plen 4
29 00 18 CC
> HCI Event: Max Slots Change (0x1b) plen 3
29 00 05
> HCI Event: Command Status (0x0f) plen 4
00 01 0F 04
> HCI Event: Connection Packet Type Changed (0x1d) plen 5
00 29 00 18 CC
> ACL data: handle 0x0029 flags 0x02 dlen 12
L2CAP(s): Connect req: psm 17 scid 0x0059
< ACL data: handle 0x0029 flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0040 scid 0x0059 result 0 status 0
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 17
> ACL data: handle 0x0029 flags 0x01 dlen 17
> ACL data: handle 0x0029 flags 0x01 dlen 6
L2CAP(s): Config req: dcid 0x0040 flags 0x0000 clen 28
MTU 48 Unknown (type 03, len 22)
< ACL data: handle 0x0029 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0059 flags 0x0000 result 0 clen 0
< ACL data: handle 0x0029 flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x0059 flags 0x0000 clen 4
MTU 48
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> HCI Event: QoS Setup Complete (0x0d) plen 21
00 29 00 00 01 00 00 00 00 00 00 00 00 FF FF FF FF FF FF FF
FF
> ACL data: handle 0x0029 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0040 flags 0x0000 result 0 clen 0
> ACL data: handle 0x0029 flags 0x02 dlen 12
L2CAP(s): Connect req: psm 19 scid 0x005a
< ACL data: handle 0x0029 flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0041 scid 0x005a result 0 status 0
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 40
L2CAP(s): Config req: dcid 0x0041 flags 0x0000 clen 28
MTU 48 Unknown (type 03, len 22)
< ACL data: handle 0x0029 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x005a flags 0x0000 result 0 clen 0
< ACL data: handle 0x0029 flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x005a flags 0x0000 clen 4
MTU 48
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0041 flags 0x0000 result 0 clen 0
< ACL data: handle 0x0029 flags 0x02 dlen 12
L2CAP(s): Connect req: psm 1 scid 0x0042
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 01 00 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x005b scid 0x0042 result 1 status 2
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 FF 00
> ACL data: handle 0x0029 flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x005b scid 0x0042 result 0 status 0
< ACL data: handle 0x0029 flags 0x02 dlen 12
L2CAP(s): Config req: dcid 0x005b flags 0x0000 clen 0
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 FB 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 04 F9 00
> HCI Event: Mode Change (0x14) plen 6
00 29 00 02 14 00
> ACL data: handle 0x0029 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0042 flags 0x0000 result 0 clen 0
> ACL data: handle 0x0029 flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x0042 flags 0x0000 clen 4
MTU 48
< ACL data: handle 0x0029 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x005b flags 0x0000 result 0 clen 0
< ACL data: handle 0x0029 flags 0x02 dlen 24
L2CAP(d): cid 0x5b len 20 [psm 1]
SDP SSA Req: tid 0x0 len 0xf
pat uuid-16 0x1200 (PNPInfo)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 04 F8 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 04 F9 00
> ACL data: handle 0x0029 flags 0x02 dlen 14
L2CAP(d): cid 0x42 len 10 [psm 1]
SDP SSA Rsp: tid 0x0 len 0x5
cnt 0x2
cont 00
< ACL data: handle 0x0029 flags 0x02 dlen 24
L2CAP(d): cid 0x5b len 20 [psm 1]
SDP SSA Req: tid 0x1 len 0xf
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 04 F9 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 03 FC 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 02 FD 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 FD 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x1 len 0x2b
cnt 0x26
srv rec #0
aid 0x0000 (SrvRecHndl)
uint 0x10000
aid 0x0001 (SrvClassIDList)
< uuid-16 0x1124 (HID) >
aid 0x0004 (ProtocolDescList)
< < uuid-16 0x0100 (L2CAP) uint 0x11 > <
uuid-16 0x0200 > >

ERROR: Unexpected syntax

cont
< ACL data: handle 0x0029 flags 0x02 dlen 26
L2CAP(d): cid 0x5b len 22 [psm 1]
SDP SSA Req: tid 0x2 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 FB
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FB F7 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF FF 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE FF 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FD FF 00
> ACL data: handle 0x0029 flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x2 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
11 09 00 06 35 09 09 65 6E 09 00 6A 09 01 00 09 00 09 35 08
35 06 19 11 24 09 01 00 09 00 0D 35 0F 35 0D 35 06 02 00 D5
cont 11 09 00 06 35 09 09 65 6E 09 00 6A 09 01 00 09 00 09 35 08 35 06 19 11 24 09 01 00 09 00 0D 35 0F 35 0D 35 06 02 00 D5
< ACL data: handle 0x0029 flags 0x02 dlen 26
L2CAP(d): cid 0x5b len 22 [psm 1]
SDP SSA Req: tid 0x3 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 D5
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC FF 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FC FF 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE FF 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FE 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 FF 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 00 FF 00
> ACL data: handle 0x0029 flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x3 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
01 00 09 00 13 35 03 19 00 11 09 01 00 25 09 43 53 52 20 4D
6F 75 73 65 09 01 01 25 12 54 68 72 65 65 20 42 75 02 00 AF
cont 01 00 09 00 13 35 03 19 00 11 09 01 00 25 09 43 53 52 20 4D 6F 75 73 65 09 01 01 25 12 54 68 72 65 65 20 42 75 02 00 AF
< ACL data: handle 0x0029 flags 0x02 dlen 26
L2CAP(d): cid 0x5b len 22 [psm 1]
SDP SSA Req: tid 0x4 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 AF
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x4 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
74 6F 6E 20 4D 6F 75 73 65 09 01 02 25 0D 43 53 52 20 48 49
44 45 6E 67 69 6E 65 09 02 00 09 01 00 09 02 01 09 02 00 89
cont 74 6F 6E 20 4D 6F 75 73 65 09 01 02 25 0D 43 53 52 20 48 49 44 45 6E 67 69 6E 65 09 02 00 09 01 00 09 02 01 09 02 00 89
< ACL data: handle 0x0029 flags 0x02 dlen 26
L2CAP(d): cid 0x5b len 22 [psm 1]
SDP SSA Req: tid 0x5 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 89
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x5 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
00 09 02 02 08 80 09 02 03 08 33 09 02 04 28 01 09 02 05 28
01 09 02 06 35 3C 35 3A 08 22 25 36 05 01 09 02 A1 02 00 63
cont 00 09 02 02 08 80 09 02 03 08 33 09 02 04 28 01 09 02 05 28 01 09 02 06 35 3C 35 3A 08 22 25 36 05 01 09 02 A1 02 00 63
< ACL data: handle 0x0029 flags 0x02 dlen 26
L2CAP(d): cid 0x5b len 22 [psm 1]
SDP SSA Req: tid 0x6 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 63
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x6 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
09 01 A1 00 85 02 05 09 19 01 29 03 15 00 25 01 95 03 75 01
81 02 95 01 75 05 81 03 05 01 09 30 09 31 09 38 15 02 00 3D
cont 09 01 A1 00 85 02 05 09 19 01 29 03 15 00 25 01 95 03 75 01 81 02 95 01 75 05 81 03 05 01 09 30 09 31 09 38 15 02 00 3D
< ACL data: handle 0x0029 flags 0x02 dlen 26
L2CAP(d): cid 0x5b len 22 [psm 1]
SDP SSA Req: tid 0x7 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 3D
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 52
L2CAP(d): cid 0x42 len 48 [psm 1]
SDP SSA Rsp: tid 0x7 len 0x2b
cnt 0x26

ERROR: Unexpected syntax
25 7F 75 08 95 03 81 06 C0 C0 09 02 07 35 08 35 06 09 04 09
09 01 00 09 02 08 28 00 09 02 09 28 01 09 02 0A 28 02 00 17
cont 25 7F 75 08 95 03 81 06 C0 C0 09 02 07 35 08 35 06 09 04 09 09 01 00 09 02 08 28 00 09 02 09 28 01 09 02 0A 28 02 00 17
< ACL data: handle 0x0029 flags 0x02 dlen 26
L2CAP(d): cid 0x5b len 22 [psm 1]
SDP SSA Req: tid 0x8 len 0x11
pat uuid-16 0x1124 (HID)
max 0xffff
aid(s) 0x0000 - 0xffff
cont 02 00 17
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 35
L2CAP(d): cid 0x42 len 31 [psm 1]
SDP SSA Rsp: tid 0x8 len 0x1a
cnt 0x17

ERROR: Unexpected syntax
09 02 0B 09 01 00 09 02 0C 09 1F 40 09 02 0D 28 00 09 02 0E
28 01 00
cont 09 02 0B 09 01 00 09 02 0C 09 1F 40 09 02 0D 28 00 09 02 0E 28 01 00
< ACL data: handle 0x0029 flags 0x02 dlen 12
L2CAP(s): Disconn req: dcid 0x005b scid 0x0042
< ACL data: handle 0x0029 flags 0x02 dlen 5
L2CAP(d): cid 0x59 len 1 [psm 17]
HIDP: Set protocol: Boot protocol
< ACL data: handle 0x0029 flags 0x02 dlen 7
L2CAP(d): cid 0x5a len 3 [psm 19]
HIDP: Data: Output report
01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 12
L2CAP(s): Disconn rsp: dcid 0x005b scid 0x0042
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> HCI Event: Number of Completed Packets (0x13) plen 5
01 29 00 01 00
> ACL data: handle 0x0029 flags 0x02 dlen 5
L2CAP(d): cid 0x40 len 1 [psm 17]
HIDP: Handshake: Successful
> HCI Event: Mode Change (0x14) plen 6
00 29 00 00 00 00
> HCI Event: Mode Change (0x14) plen 6
00 29 00 02 28 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 01 00 00
> ACL data: handle 0x0029 flags 0x02 dlen 10
L2CAP(d): cid 0x41 len 6 [psm 19]
HIDP: Data: Input report
02 00 05 FE 00
> HCI Event: Mode Change (0x14) plen 6
00 29 00 00 00 00

.... mouse works normally.



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 19:41:16

by Marcel Holtmann

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

Hi Jouni,

> > the simple question is now, do it works fine when you disable auth and
> > encrypt?
>
> No. Works exactly same way. When Bemused connection is open, HID mouse
> cannot reconnect after sleep mode. 'hcitool con' shows AUTH and ENCRYPT
> is not used, otherewise looks the same. Also hcidump -x sees nothing
> when HID mouse is trying to reconnect but Bemused connection is open but
> idle. Commenting out " "auth enable; " and "encrypt enable; " in
> hcid.conf (and killall -HUP hcid) didn't fix the problem.

it is enough to do "hciconfig hci0 noauth noencrypt" for testing this,
but if this not helps then you should buy yourself a Bluetooth dongle
with at least HCI 16.4 firmware on it.

Regards

Marcel




-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 18:40:54

by [email protected]

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

On Sun, Oct 17, 2004 at 06:57:41PM +0200, Marcel Holtmann wrote:
> the simple question is now, do it works fine when you disable auth and
> encrypt?

No. Works exactly same way. When Bemused connection is open, HID mouse
cannot reconnect after sleep mode. 'hcitool con' shows AUTH and ENCRYPT
is not used, otherewise looks the same. Also hcidump -x sees nothing
when HID mouse is trying to reconnect but Bemused connection is open but
idle. Commenting out " "auth enable; " and "encrypt enable; " in
hcid.conf (and killall -HUP hcid) didn't fix the problem.


// jouni



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 16:57:41

by Marcel Holtmann

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

Hi Jouni,

> > Check with "hciconfig hci0 revision" (as root) your firmware version of
>
> HCI 14.3
> Chip version: BlueCore02 (ES2)
> Max key size: 56 bit
> SCO mapping: HCI
>
> > your dongle, but it is not a HCI 16.x one and so it does not support any
> > kind of scatternet stuff and this is maybe the reason why it fails. Use
> > "hcidump -x" to check for the real HCI error codes and look them up in
> > the Bluetooth specification.
> oI did this, but there was nothing to be seen. When Bemused connection
> was active, ofcourse there was ACL data going between devices. When the
> bemused connection was open but idle, hcidump didn't show anything. Then
> I tried to reconnect the HID mouse by pressing mouse button 1. The mouse
> woke up (red led started blinking on the bottom of the mouse). Running
> hcidump didn't show anything, like hcid wasn't receiving or sending
> anything. Doing something on the Bemused client then again showed data
> sent and received.
>
> So either bluetooth dongle or hcid desn't see connection requests when
> one ACL connection which uses SP profile is open (and in sec.mode 3)
>
> For bemused this is run in rc.local
> sdptool add --channel=10 SP
>
> But when HID connection is open and active, bemused connection can be
> opened without problems. What I currently quite not understand, is why
> other connection type is different that it blocks new connections, but
> other one does not. Both uses AUTH+ENCRYPT+MASTER when checked with
> hcitool con.

the simple question is now, do it works fine when you disable auth and
encrypt?

Regards

Marcel




-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 16:53:48

by [email protected]

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

On Sun, Oct 17, 2004 at 05:24:37PM +0200, Marcel Holtmann wrote:
> fine for me as long as you are aware of the side effects of using
> security mode 3.

Well, not all side effects I am aware of.
Couple of weeks ago I read few comments on bluez-users archives, but
maybe didn't quite get what is so bad in security mode 3, except as an
extra layer it brings additional complexity to the implementation and
debugging.

> Check with "hciconfig hci0 revision" (as root) your firmware version of

HCI 14.3
Chip version: BlueCore02 (ES2)
Max key size: 56 bit
SCO mapping: HCI

> your dongle, but it is not a HCI 16.x one and so it does not support any
> kind of scatternet stuff and this is maybe the reason why it fails. Use
> "hcidump -x" to check for the real HCI error codes and look them up in
> the Bluetooth specification.
oI did this, but there was nothing to be seen. When Bemused connection
was active, ofcourse there was ACL data going between devices. When the
bemused connection was open but idle, hcidump didn't show anything. Then
I tried to reconnect the HID mouse by pressing mouse button 1. The mouse
woke up (red led started blinking on the bottom of the mouse). Running
hcidump didn't show anything, like hcid wasn't receiving or sending
anything. Doing something on the Bemused client then again showed data
sent and received.

So either bluetooth dongle or hcid desn't see connection requests when
one ACL connection which uses SP profile is open (and in sec.mode 3)

For bemused this is run in rc.local
sdptool add --channel=10 SP

But when HID connection is open and active, bemused connection can be
opened without problems. What I currently quite not understand, is why
other connection type is different that it blocks new connections, but
other one does not. Both uses AUTH+ENCRYPT+MASTER when checked with
hcitool con.


I did try the hciconfig -a and hcitool info <phone> when the mouse had
gone to sleep mode. There was no differences in the outputs, except the
packet counters were ofcourse increased.
But the mouse could not reconnect.

// jouni



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 15:24:37

by Marcel Holtmann

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

Hi Jouni,

> > > hcid is in security mode 3, auth+encryption turned on.
> >
> > as I always said, do this only if you know what you are doing ;)
>
> I have a hint of what I am doing? :-)
> If I take the authentication off, with current bemused implementation
> anyone could download ogg and mp3-files from my computer. I could not
> claim I did not know this was possible or I didn't know that would be
> illegal :P

fine for me as long as you are aware of the side effects of using
security mode 3.

> > What does "hciconfig -a" and "hcitool info <phone>" say?
>
> Now, in this moment when I have both HID-mouse and Bemused working, it
> looks like this:

Check with "hciconfig hci0 revision" (as root) your firmware version of
your dongle, but it is not a HCI 16.x one and so it does not support any
kind of scatternet stuff and this is maybe the reason why it fails. Use
"hcidump -x" to check for the real HCI error codes and look them up in
the Bluetooth specification.

Regards

Marcel




-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 13:34:33

by CIJOML

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

Switch off security mode 3 and everything will work like a charm. And stop=
=20
that sh*t, if it knows nothing about security :D

M.

Dne ne 17. =F8=EDjna 2004 15:30 [email protected] napsal(a):
> On Sun, Oct 17, 2004 at 03:02:17PM +0200, Marcel Holtmann wrote:
> > > hcid is in security mode 3, auth+encryption turned on.
> >
> > as I always said, do this only if you know what you are doing ;)
>
> I have a hint of what I am doing? :-)
> If I take the authentication off, with current bemused implementation
> anyone could download ogg and mp3-files from my computer. I could not
> claim I did not know this was possible or I didn't know that would be
> illegal :P
>
> > What does "hciconfig -a" and "hcitool info <phone>" say?
>
> Now, in this moment when I have both HID-mouse and Bemused working, it
> looks like this:
>
>
>
> # hciconfig -a
> hci0: Type: USB
> BD Address: 00:04:61:80:5D:88 ACL MTU: 192:8 SCO MTU: 64:8
> UP RUNNING PSCAN ISCAN AUTH ENCRYPT
> RX bytes:1311977 acl:89435 sco:0 events:7161 errors:0
> TX bytes:21978 acl:295 sco:0 commands:89 errors:0
> Features: 0xff 0xff 0x0b 0x00 0x00 0x00 0x00 0x00
> Packet type: DM1 DM3 DM5 DH1 DH3 DH5 HV1 HV2 HV3
> Link policy: RSWITCH HOLD SNIFF PARK
> Link mode: SLAVE ACCEPT
> Name: 'BlueZ (0)'
> Class: 0x000100
> Service Classes: Unspecified
> Device Class: Computer, Uncategorized
> HCI Ver: 1.1 (0x1) HCI Rev: 0x110 LMP Ver: 1.1 (0x1) LMP Subver:
> 0x110 Manufacturer: Cambridge Silicon Radio (10)
>
> # hcitool info 00:60:57:BE:C9:88
> Requesting information ...
> BD Address: 00:60:57:BE:C9:88
> Device Name: SayHelloNG
> LMP Version: 1.1 (0x1) LMP Subversion: 0x248
> Manufacturer: Nokia Mobile Phones (1)
> Features: 0xbf 0x28 0x21 0x00 0x00 0x00 0x00 0x00
> <3-slot packets> <5-slot packets> <encryption> <slot
> offset> <timing accuracy> <role switch> <sniff mode> <SCO link> <HV3
> packets> <CVSD>
>
> When the HID mouse next time goes to sleep (and if I remember), I try to
> run those commands again to see if there is a difference.
> The Nokia phone do show though it has "role switch"-capability.
>
> // jouni
>
>
>
> -------------------------------------------------------
> This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
> Use IT products in your business? Tell us what you think of them. Give us
> Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out mo=
re
> http://productguide.itmanagersjournal.com/guidepromo.tmpl
> _______________________________________________
> Bluez-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/bluez-users


-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 13:30:34

by [email protected]

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

On Sun, Oct 17, 2004 at 03:02:17PM +0200, Marcel Holtmann wrote:
> > hcid is in security mode 3, auth+encryption turned on.
>
> as I always said, do this only if you know what you are doing ;)


I have a hint of what I am doing? :-)
If I take the authentication off, with current bemused implementation
anyone could download ogg and mp3-files from my computer. I could not
claim I did not know this was possible or I didn't know that would be
illegal :P

> What does "hciconfig -a" and "hcitool info <phone>" say?

Now, in this moment when I have both HID-mouse and Bemused working, it
looks like this:



# hciconfig -a
hci0: Type: USB
BD Address: 00:04:61:80:5D:88 ACL MTU: 192:8 SCO MTU: 64:8
UP RUNNING PSCAN ISCAN AUTH ENCRYPT
RX bytes:1311977 acl:89435 sco:0 events:7161 errors:0
TX bytes:21978 acl:295 sco:0 commands:89 errors:0
Features: 0xff 0xff 0x0b 0x00 0x00 0x00 0x00 0x00
Packet type: DM1 DM3 DM5 DH1 DH3 DH5 HV1 HV2 HV3
Link policy: RSWITCH HOLD SNIFF PARK
Link mode: SLAVE ACCEPT
Name: 'BlueZ (0)'
Class: 0x000100
Service Classes: Unspecified
Device Class: Computer, Uncategorized
HCI Ver: 1.1 (0x1) HCI Rev: 0x110 LMP Ver: 1.1 (0x1) LMP Subver: 0x110
Manufacturer: Cambridge Silicon Radio (10)

# hcitool info 00:60:57:BE:C9:88
Requesting information ...
BD Address: 00:60:57:BE:C9:88
Device Name: SayHelloNG
LMP Version: 1.1 (0x1) LMP Subversion: 0x248
Manufacturer: Nokia Mobile Phones (1)
Features: 0xbf 0x28 0x21 0x00 0x00 0x00 0x00 0x00
<3-slot packets> <5-slot packets> <encryption> <slot offset>
<timing accuracy> <role switch> <sniff mode> <SCO link>
<HV3 packets> <CVSD>

When the HID mouse next time goes to sleep (and if I remember), I try to
run those commands again to see if there is a difference.
The Nokia phone do show though it has "role switch"-capability.

// jouni



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 13:03:18

by [email protected]

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open


I forgot to mention, when there already is BT connection between HID
mouse and bluez, I can open bemused-connection normally without problems
and both can work simultaneously.

// jouni



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users

2004-10-17 13:02:17

by Marcel Holtmann

[permalink] [raw]
Subject: Re: [Bluez-users] HID mouse doesnt reconnect after sleep if bemused-bemusedlinuxserver connection is open

Hi Jouni,

> I have Epox BT-dongle, Epox CP-BT-MS02B HID mouse, Nokia S60-phone (v6.1),
> Bemused v1.71, bemusedlinuxserver v1.7, Linux kernel 2.6.8, bluez-libs v2.8,
> bluez-utils v2.8
>
> hcid is in security mode 3, auth+encryption turned on.

as I always said, do this only if you know what you are doing ;)

> When previously paired HID-mouse is in sleep mode and there is a open but
> yet idle BT connection between Bemused and bemusedlinuxserver, the mouse
> cannot reconnect to the hidd daemon. When mouse button 1 is pressed, mouse
> turns itself on and I assume it tries to connect, but hcid never gets or
> understands to authenticate as the usual lines in the /var/log/messages do
> not appear.
>
> The usual lines which should appear when reconnection is made:
> "
> Oct 17 14:52:22 localhost hcid[2237]: link_key_request (sba=00:04:61:80:5D:88, dba=00:04:61:82:00:88)
> Oct 17 14:52:23 localhost hidd[1135]: New HID device 00:04:61:82:00:88 (CSR HIDEngine Three Button Mouse)
> Oct 17 14:52:24 localhost udev[5715]: creating device node '/udev/input/mouse0'
> "
>
> After the Bemused-application is closed in the S60-phone, the HID mouse can
> reconnect again as normal.
>
> Is this a known limitation of the current bluez-implementation or in other
> resource? And no, I haven't tested yet if the problem is there also when in
> security mode 0 without authentication and encryption.

This is maybe a limitation of the Nokia phone, too. The Debian Sid and
SuSE 9.2 packages include a workaround for the hidd and phones with
limited capability for role switching.

What does "hciconfig -a" and "hcitool info <phone>" say?

Regards

Marcel




-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users