Coded PHY on BLE sniffer not working for nrfutil Ubuntu Server command line

I've then tried both the command "nrfutil ble-sniffer sniff --port /dev/ttyACM0 --coded" as well as "nrfutil ble-sniffer sniff --port /dev/ttyACM0 --coded --scan-follow-aux --scan-follow-aux-chain --scan-follow-aux-rsp" but I cannot see any Coded PHY advertising packets in the resulting Wireshark .pcap file. I only see a bunch of 1M advertisements from the surroundings.

System info.  Ubuntu Server 22.04

Sniffer Firmware is 4.1.1.hex

$ nrfutil --version
nrfutil 7.13.0 (8289424 2024-07-01)
commit-hash: 82894242d19ff24a1541712312b3ea3af0ca8f85
commit-date: 2024-07-01
host: x86_64-unknown-linux-gnu
build-timestamp: 2024-07-01T07:32:31.582129656Z
classification: nrf-external

$ nrfutil ble-sniffer --version
nrfutil-ble-sniffer 0.14.1 (0cf4b58 2024-10-28)
commit-hash: 0cf4b584c0645a208dc6e7f562596318d6414f5f
commit-date: 2024-10-28
host: x86_64-unknown-linux-gnu
build-timestamp: 2024-10-28T14:50:49.379067757Z
classification: nrf-external

$ nrfutil device list

D4DF85770DA5CEA9
product nRF Sniffer for Bluetooth LE
ports /dev/ttyACM0
traits nordicUsb, serialPorts, usb

$ uname -r
5.15.0-125-generic

Parents Reply Children
Related