Dan Williams <dcbw@xxxxxxxxxx> writes: > I posted the tools I used to get QMI debugging from the UML290 to the > ModemManager git repo here: > > http://cgit.freedesktop.org/ModemManager/ModemManager/tree/decode > > it's set up to take Windows UsbSnoop XML files, but you could probably > hack the front end (decode.py) to take the binary dumps instead; you'll > get nice output format including decoding all the TLV and command names. Yeah, you would think that I knew my way around python given that I don't know C :-) Fact is, took me nearly two hours to come up with this: #!/usr/bin/python import sys import os from qmux import show if __name__ == "__main__": path = sys.argv[1] fd = os.open(path, os.O_RDONLY) while True: bytes = os.read(fd, 256) print "read %d bytes\n" % len(bytes) if bytes == "": break show(bytes, "", None) os.close(fd) Nice job generating all that decoding logic. Thanks for the pointer. Bjørn -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html