Thanks xorly. Fixed in 4.1.1-4.
Search Criteria
Package Details: nrf-sniffer-ble 4.1.1-4
Package Actions
Git Clone URL: | https://aur.archlinux.org/nrf-sniffer-ble.git (read-only, click to copy) |
---|---|
Package Base: | nrf-sniffer-ble |
Description: | nRF Sniffer for Bluetooth LE - firmware, SnifferAPI and Wireshark plugin |
Upstream URL: | https://www.nordicsemi.com/Products/Development-tools/nRF-Sniffer-for-Bluetooth-LE |
Keywords: | ble bluetooth nrf wireshark |
Licenses: | custom |
Submitter: | labuwx |
Maintainer: | labuwx |
Last Packager: | labuwx |
Votes: | 2 |
Popularity: | 0.000034 |
First Submitted: | 2021-11-19 00:27 (UTC) |
Last Updated: | 2024-11-18 21:29 (UTC) |
Dependencies (6)
- python (python37AUR, python311AUR, python310AUR)
- python-pyserial (python-pyserial-labgrid-gitAUR)
- wireshark-cli (wireshark-gitAUR, wireshark-libsmi-cliAUR)
- nrf-udevAUR (optional)
- nrf5x-command-line-toolsAUR (optional) – for flashing the firmware
- nrfconnect-appimageAUR (optional) – for flashing the firmware
Required by (0)
Sources (4)
Latest Comments
labuwx commented on 2024-11-18 21:35 (UTC)
xorly commented on 2024-11-18 15:18 (UTC)
Hi, can you patch the python 3.12 issue described here https://devzone.nordicsemi.com/f/nordic-q-a/107828/invalid-escape-sequence-s/487308 ?
labuwx commented on 2024-02-04 19:59 (UTC)
Thanks mags. Fixed that.
mags commented on 2024-02-02 02:35 (UTC)
This fails in a clean chroot (extra-x86)64-build) as is.
This line in the PKGBUILD needs to be changed:
patch -p1 -i ../0001-drop-Filelock-use.patch
to:
patch -p1 -i 0001-drop-Filelock-use.patch
labuwx commented on 2023-07-19 22:24 (UTC)
Thanks to mniestroj's patch, now it is possible to use the extcap plugin as a non-root user.
However the extcap plugin and the SnifferAPI are not written with unprivileged users in mind. If the capture device does not appear or packets do not show up, check again as root.
The user running the sniffer must
* have write access to the serial port of the nRF chip
* have write access to /tmp/logs/log.txt
and /tmp/logs/capture.pcap
mniestroj commented on 2023-07-12 12:27 (UTC)
After installing this package, no devices (interfaces) are discovered when using as unpriviledged user. Everything works when running as root. The reason is that the implementation of extcap plugin relies on access to /var/lock/, which is 0755 root:root.
Please consider patching this package with https://github.com/mniestroj/aur-nrf-sniffer-ble/commit/556009ac7aa4cbcf45b9fc6ccb244eb07ea0b9a5, which solves described issue.
Pinned Comments
labuwx commented on 2023-07-19 22:24 (UTC)
Thanks to mniestroj's patch, now it is possible to use the extcap plugin as a non-root user.
However the extcap plugin and the SnifferAPI are not written with unprivileged users in mind. If the capture device does not appear or packets do not show up, check again as root.
The user running the sniffer must * have write access to the serial port of the nRF chip * have write access to
/tmp/logs/log.txt
and/tmp/logs/capture.pcap