Guest User

BT_TRACE_LEVEL_VERBOSE gattc cannot get characteristic

a guest
Oct 31st, 2017
3,143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 92.14 KB | None | 0 0
  1. I (298) GATTC: Start
  2. 0x4000d890: ?? ??:0
  3. D (308) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
  4. D (308) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
  5. D (318) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
  6. D (328) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
  7. D (328) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
  8. D (338) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
  9. D (338) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
  10. D (348) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
  11. I (358) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE
  12. D (518) phy_init: loading PHY init data from partition at offset 0xf000
  13. D (518) phy_init: PHY data partition validated
  14. I (538) phy: phy_version: 362.0, 61e8d92, Sep 8 2017, 18:48:11, 0, 0
  15. E (538) BT: btm_acl_init
  16. E (538) BT: L2CA_RegisterFixedChannel() CID: 0x0004, 0x3ffd5b40
  17. E (538) BT: btm_sec_set_security_level : sec: 0x0
  18. E (548) BT: BTM_SEC_REG[0]: id 50, is_orig 1, psm 0x001f, proto_id 0, chan_id 0
  19. E (558) BT: : sec: 0x80, service name [] (up to 21 chars saved)
  20. E (558) BT: btm_sec_set_security_level : sec: 0x0
  21. E (568) BT: BTM_SEC_REG[0]: id 50, is_orig 0, psm 0x001f, proto_id 0, chan_id 0
  22. E (578) BT: : sec: 0x80, service name [] (up to 21 chars saved)
  23. E (588) BT: SMP_Init
  24. E (588) BT: SMDBG l2c smp_l2cap_if_init
  25. E (588) BT: L2CA_RegisterFixedChannel() CID: 0x0006, 0x3ffd5b20
  26. E (598) BT: btm_ble_init
  27. E (608) BT: BTA got event 0x100
  28. E (608) BT: bta_dm_sm_execute event:0x0
  29. E (608) BT: BTA got event 0x0
  30. E (608) BT: bta_sys_sm_execute state:0, event:0x0
  31. E (618) BT: bta_sys_hw_api_enable for 0, active modules 0x0001
  32. E (628) BT: BTA got event 0x1
  33. E (628) BT: bta_sys_sm_execute state:1, event:0x1
  34. E (638) BT: bta_sys_hw_evt_enabled for 0
  35. E (638) BT: btm_acl_device_down
  36. E (648) BT: BTM Register For VSEvents is successfully
  37. E (648) BT: btm_ble_resolving_list_init max_irk_list_sz = 3
  38. E (658) BT: btm_ble_white_list_init white_list_size = 12
  39. E (658) BT: #####################################num_lm_ble_bufs = 10
  40. E (668) BT: BTM_SetPinType: pin type 0 [variable-0, fixed-1], code , length 0
  41. E (678) BT: btm_decode_ext_features_page page: 0
  42. E (678) BT: Local supported ACL packet types: 0xcc18
  43. E (688) BT: Local supported SCO packet types: 0x003d
  44. E (688) BT: btm_sec_set_security_level : sec: 0x0
  45. E (698) BT: BTM_SEC_REG[1]: id 42, is_orig 0, psm 0x0003, proto_id 3, chan_id 0
  46. E (708) BT: : sec: 0x80, service name [RFC_MUX
  47. ] (up to 21 chars saved)
  48. E (718) BT: btm_sec_dev_reset sec mode: 4
  49. E (718) BT: BTM_SetInquiryMode
  50. E (728) BT: BTM_SetPageScanType
  51. E (728) BT: BTM_SetInquiryScanType
  52. E (728) BT: btm_decode_ext_features_page page: 1
  53. E (738) BT: btm_decode_ext_features_page page: 2
  54. E (738) BT: bta_sys_hw_btm_cback was called with parameter: 0
  55. E (748) BT: BTA got event 0x2
  56. E (758) BT: bta_sys_sm_execute state:1, event:0x2
  57. E (758) BT: bta_sys_hw_evt_stack_enabled!notify the callers
  58. E (768) BT: bta_dm_sys_hw_cback with event: 1
  59. E (768) BT: BTM_BleLoadLocalKeys
  60. E (778) BT: BTM_BleLoadLocalKeys
  61. E (778) BT: BTM_SecRegister application registered
  62. E (788) BT: BTM_SecRegister SMP_Register( btm_proc_smp_cback )
  63. E (788) BT: SMP_Register state=0
  64. E (798) BT: BTM_SecRegister application registered
  65. E (798) BT: BTM_SetDefaultLinkSuperTout
  66. E (808) BT: BTM: BTM_WritePageTimeout: Timeout: 8192.
  67. E (808) BT: BTM_SetDefaultLinkPolicy setting:0x000f
  68. E (818) BT: BTM_SetDefaultLinkPolicy hold not supported (settings: 0x000d)
  69. E (828) BT: BTM_SetDefaultLinkPolicy park not supported (settings: 0x0005)
  70. E (828) BT: Set DefaultLinkPolicy:0x0005
  71. E (838) BT: BTM_RegBusyLevelNotif
  72. E (848) BT: btm_ble_clear_resolving_list_complete status=0
  73. E (848) BT: btm_ble_clear_resolving_list_complete resolving_list_avail_size=3
  74. E (858) BT: BTA got event 0x110
  75. E (858) BT: bta_dm_sm_execute event:0x10
  76. E (868) BT: BTM_SecAddBleDevice dev_type=0x2
  77. E (868) BT: Add a new device
  78. E (868) BT: allocate a new dev rec idx=0x0
  79. E (878) BT: BTM_GetHCIConnHandle
  80. E (878) BT: BTM_GetHCIConnHandle
  81. E (888) BT: hci_handl=0xffff
  82. E (888) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  83. E (898) BT: BTA got event 0x10f
  84. E (898) BT: bta_dm_sm_execute event:0xf
  85. E (898) BT: BTM_SecAddBleKey
  86. E (908) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x01
  87. E (908) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=0
  88. E (918) BT: bd_addr:67-89-c2-b0-71-c6
  89. E (928) BT: BTM_LE_KEY_PENC key_type=0x1 sec_flags=0x1080 sec_leve=0x1
  90. E (928) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  91. E (938) BT: BTA got event 0x10f
  92. E (938) BT: bta_dm_sm_execute event:0xf
  93. E (948) BT: BTM_SecAddBleKey
  94. E (948) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x02
  95. E (958) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=0
  96. E (968) BT: bd_addr:67-89-c2-b0-71-c6
  97. E (968) BT: BTM_LE_KEY_PID key_type=0x3 save peer IRK
  98. E (978) BT: btm_consolidate_dev
  99. E (978) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  100. E (988) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  101. E (998) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  102. E (998) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
  103. E (1008) BT: btm_ble_suspend_bg_conn
  104. E (1018) BT: btm_ble_add_resolving_list_entry_complete status = 0
  105. E (1018) BT: BTA got event 0x10f
  106. E (1028) BT: bta_dm_sm_execute event:0xf
  107. E (1028) BT: BTM_SecAddBleKey
  108. E (1038) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x04
  109. E (1038) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=0
  110. E (1048) BT: bd_addr:67-89-c2-b0-71-c6
  111. E (1048) BT: BTM_LE_KEY_PCSRK key_type=0x7 sec_flags=0x1080 sec_level=0x1 peer_counter=0
  112. E (1058) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  113. E (1068) BT: BTA got event 0x10f
  114. E (1078) BT: bta_dm_sm_execute event:0xf
  115. E (1078) BT: BTM_SecAddBleKey
  116. E (1078) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x10
  117. E (1088) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=0
  118. E (1098) BT: bd_addr:67-89-c2-b0-71-c6
  119. E (1098) BT: BTM_LE_KEY_LENC key_type=0x17 DIV=0x0 key_size=0x10 sec_level=0x1
  120. E (1108) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  121. I (1118) GATTC: REGISTER GAP CALLBACK
  122. I (1118) GATTC: REGISTER GATTC CALLBACK
  123. I (1128) GATTC: REGISTER THIS APPLICATION
  124. E (1128) BT: btc_gattc_call_handler()
  125. E (1138) BT: BTA got event 0x1f13
  126. E (1138) BT: bta_gattc_register state 0
  127. E (1138) BT: bta_gattc_enable
  128. E (1148) BT: GATT_Register
  129. E (1148) BT: UUID=[0x0000]
  130. E (1158) BT: allocated gatt_if=1
  131. E (1158) BT: GATTC getbuf sucess.
  132. E (1158) BT: BTA got event 0x1f12
  133. E (1168) BT: GATT_StartIf gatt_if=1
  134. E (1168) BT: gatt_find_the_connected_bda start_idx=0
  135. E (1178) BT: gatt_find_the_connected_bda found=0 found_idx=4
  136. W (1178) GATTCallback: GATT CALLBACK: 0
  137. I (1188) GATTCallback: REG_EVT
  138. E (1188) BT: BTA got event 0x11e
  139. E (1198) BT: bta_dm_sm_execute event:0x1e
  140. E (1198) BT: BTM_BleConfigPrivacy
  141. E (1198) BT: btm_gen_resolvable_private_addr
  142. E (1208) BT: btm_ble_rand_enc_complete
  143. E (1208) BT: btm_gen_resolve_paddr_low
  144. E (1218) BT: smp_encrypt_data
  145. E (1218) BT: btm_gen_resolve_paddr_cmpl
  146. E (1228) BT: BTA got event 0x118
  147. E (1228) BT: bta_dm_sm_execute event:0x18
  148. E (1238) BT: BTM_BleSetScanFilterParams
  149. I (1238) GAPCallback: SCAN PARAMETERS SET; INITIATE A SCAN REQUEST
  150. E (1248) BT: BTA_DmBleScan:start = 1
  151. E (1248) BT: BTA got event 0x11a
  152. E (1258) BT: bta_dm_sm_execute event:0x1a
  153. I (1258) GAPCallback: scan start success
  154. E (1468) BT: BLE HCI(id=62) event = 0x02)
  155. E (1468) BT: btu_ble_process_adv_pkt
  156. E (1468) BT: btm_identity_addr_to_random_pseudo
  157. E (1478) BT: BTM_CheckAdvData type=0x01
  158. E (1478) BT: BTM_CheckAdvData type=0x19
  159. E (1488) BT: BTM_CheckAdvData type=0x03
  160. E (1488) BT: Random address, treating device as LE only
  161. E (1498) BT: BTM_CheckAdvData type=0x01
  162. E (1498) BT: bta_dm_observe_results_cb
  163. E (1508) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  164. E (1508) BT: BLE HCI(id=62) event = 0x02)
  165. E (1518) BT: btu_ble_process_adv_pkt
  166. E (1518) BT: btm_identity_addr_to_random_pseudo
  167. E (1528) BT: BTM_CheckAdvData type=0x01
  168. E (1528) BT: BTM_CheckAdvData type=0x19
  169. E (1528) BT: BTM_CheckAdvData type=0x03
  170. E (1538) BT: Random address, treating device as LE only
  171. E (1538) BT: BTM_CheckAdvData type=0x01
  172. E (1548) BT: bta_dm_observe_results_cb
  173. E (1548) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  174. E (1558) BT: BLE HCI(id=62) event = 0x02)
  175. E (1558) BT: btu_ble_process_adv_pkt
  176. E (1568) BT: btm_identity_addr_to_random_pseudo
  177. E (1568) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false, scan_type_active=1
  178. E (1588) BT: BTM_CheckAdvData type=0x01
  179. E (1588) BT: BTM_CheckAdvData type=0x19
  180. E (1588) BT: BTM_CheckAdvData type=0x03
  181. E (1598) BT: BR/EDR NOT support bit not set, treat as DUMO
  182. E (1598) BT: BLE HCI(id=62) event = 0x02)
  183. E (1608) BT: btu_ble_process_adv_pkt
  184. E (1608) BT: btm_identity_addr_to_random_pseudo
  185. E (1618) BT: BTM_CheckAdvData type=0x01
  186. E (1618) BT: BTM_CheckAdvData type=0x19
  187. E (1628) BT: BTM_CheckAdvData type=0x03
  188. E (1628) BT: BR/EDR NOT support bit not set, treat as DUMO
  189. E (1638) BT: BTM_CheckAdvData type=0x01
  190. E (1638) BT: bta_dm_observe_results_cb
  191. E (1648) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  192. E (1648) BT: BLE HCI(id=62) event = 0x02)
  193. E (1658) BT: btu_ble_process_adv_pkt
  194. E (1658) BT: btm_identity_addr_to_random_pseudo
  195. E (1668) BT: BTM_CheckAdvData type=0x01
  196. E (1668) BT: BTM_CheckAdvData type=0x19
  197. E (1678) BT: BTM_CheckAdvData type=0x03
  198. E (1678) BT: Random address, treating device as LE only
  199. E (1688) BT: BTM_CheckAdvData type=0x01
  200. E (1688) BT: bta_dm_observe_results_cb
  201. E (1698) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  202. E (1698) BT: BLE HCI(id=62) event = 0x02)
  203. E (1708) BT: btu_ble_process_adv_pkt
  204. E (1708) BT: btm_identity_addr_to_random_pseudo
  205. E (1718) BT: BTM_CheckAdvData type=0x01
  206. E (1718) BT: BTM_CheckAdvData type=0x19
  207. E (1728) BT: BTM_CheckAdvData type=0x03
  208. E (1728) BT: Random address, treating device as LE only
  209. E (1738) BT: BTM_CheckAdvData type=0x01
  210. E (1738) BT: bta_dm_observe_results_cb
  211. E (1738) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  212. E (1748) BT: BLE HCI(id=62) event = 0x02)
  213. E (1748) BT: btu_ble_process_adv_pkt
  214. E (1758) BT: btm_identity_addr_to_random_pseudo
  215. E (1758) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false, scan_type_active=1
  216. E (1778) BT: BTM_CheckAdvData type=0x01
  217. E (1778) BT: BTM_CheckAdvData type=0x19
  218. E (1778) BT: BTM_CheckAdvData type=0x03
  219. E (1788) BT: BR/EDR NOT support bit not set, treat as DUMO
  220. E (1798) BT: BLE HCI(id=62) event = 0x02)
  221. E (1798) BT: btu_ble_process_adv_pkt
  222. E (1798) BT: btm_identity_addr_to_random_pseudo
  223. E (1808) BT: BTM_CheckAdvData type=0x01
  224. E (1808) BT: BTM_CheckAdvData type=0x19
  225. E (1818) BT: BTM_CheckAdvData type=0x03
  226. E (1818) BT: BR/EDR NOT support bit not set, treat as DUMO
  227. E (1828) BT: BTM_CheckAdvData type=0x01
  228. E (1828) BT: bta_dm_observe_results_cb
  229. E (1838) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  230. E (1838) BT: BLE HCI(id=62) event = 0x02)
  231. E (1848) BT: btu_ble_process_adv_pkt
  232. E (1848) BT: btm_identity_addr_to_random_pseudo
  233. E (1858) BT: BTM_CheckAdvData type=0x01
  234. E (1858) BT: BTM_CheckAdvData type=0x19
  235. E (1868) BT: BTM_CheckAdvData type=0x03
  236. E (1868) BT: Random address, treating device as LE only
  237. E (1878) BT: BTM_CheckAdvData type=0x01
  238. E (1878) BT: bta_dm_observe_results_cb
  239. E (1888) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  240. E (1888) BT: BLE HCI(id=62) event = 0x02)
  241. E (1898) BT: btu_ble_process_adv_pkt
  242. E (1898) BT: btm_identity_addr_to_random_pseudo
  243. E (1908) BT: BTM_CheckAdvData type=0x01
  244. E (1908) BT: BTM_CheckAdvData type=0x19
  245. E (1918) BT: BTM_CheckAdvData type=0x03
  246. E (1918) BT: Random address, treating device as LE only
  247. E (1928) BT: BTM_CheckAdvData type=0x01
  248. E (1928) BT: bta_dm_observe_results_cb
  249. E (1938) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  250. E (1938) BT: BLE HCI(id=62) event = 0x02)
  251. E (1948) BT: btu_ble_process_adv_pkt
  252. E (1948) BT: btm_identity_addr_to_random_pseudo
  253. E (1958) BT: BTM_CheckAdvData type=0x01
  254. E (1958) BT: BTM_CheckAdvData type=0x19
  255. E (1958) BT: BTM_CheckAdvData type=0x03
  256. E (1968) BT: Random address, treating device as LE only
  257. E (1968) BT: BTM_CheckAdvData type=0x01
  258. E (1978) BT: bta_dm_observe_results_cb
  259. E (1978) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  260. E (1988) BT: BLE HCI(id=62) event = 0x02)
  261. E (1988) BT: btu_ble_process_adv_pkt
  262. E (1998) BT: btm_identity_addr_to_random_pseudo
  263. E (1998) BT: BTM_CheckAdvData type=0x01
  264. E (2008) BT: BTM_CheckAdvData type=0x19
  265. E (2008) BT: BTM_CheckAdvData type=0x03
  266. E (2018) BT: Random address, treating device as LE only
  267. E (2018) BT: BTM_CheckAdvData type=0x01
  268. E (2028) BT: bta_dm_observe_results_cb
  269. E (2028) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  270. E (2038) BT: BTM_CheckAdvData type=0x07
  271. E (2038) BT: BTM_CheckAdvData type=0x07
  272. E (2048) BT: BTM_CheckAdvData type=0x07
  273. I (2048) GAPCallback: OPEN A DIRECT CONNECTION TO DEVICE. application identity: 1 rssi: -69, bda: 3ffd6988
  274. E (2058) BT: BTM_CheckAdvData type=0x07
  275. E (2068) BT: BTM_CheckAdvData type=0x07
  276. E (2068) BT: BTM_CheckAdvData type=0x07
  277. E (2078) BT: BTM_CheckAdvData type=0x07
  278. E (2078) BT: BTM_CheckAdvData type=0x07
  279. E (2078) BT: BTM_CheckAdvData type=0x07
  280. E (2088) BT: BTM_CheckAdvData type=0x07
  281. E (2088) BT: BTA_DmBleScan:start = 0
  282. E (2098) BT: BTA got event 0x11a
  283. E (2098) BT: bta_dm_sm_execute event:0x1a
  284. E (2108) BT: bta_dm_observe_cmpl_cb
  285. E (2108) BT: BTA got event 0x1f00
  286. E (2108) BT: GATT_Connect gatt_if=1
  287. E (2118) BT: gatt_get_ch_state: ch_state=0
  288. E (2118) BT: gatt_set_ch_state: old=0 new=2
  289. E (2128) BT: L2CA_ConnectFixedChnl() CID: 0x0004 BDA: 6789c2b071c6
  290. E (2138) BT: l2c_ble_link_adjust_allocation num_hipri: 0 num_lowpri: 1 low_quota: 10 round_robin_quota: 0 qq: 10
  291. E (2148) BT: l2c_ble_link_adjust_allocation LCB 0 Priority: 0 XmitQuota: 10
  292. E (2148) BT: SentNotAcked: 0 RRUnacked: 0
  293. E (2158) BT: l2cu_allocate_ccb: cid 0x0000
  294. E (2168) BT: l2c_link_adjust_chnl_allocation
  295. E (2168) BT: CID:0x0040 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  296. E (2178) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  297. E (2178) BT: btm_find_dev_type - device_type = 2 addr_type = 0
  298. E (2188) BT: btm_find_or_alloc_dev
  299. E (2198) BT: gatt_update_app_use_link_flag is_add=1 chk_link=0
  300. E (2198) BT: gatt_update_app_hold_link_status found=1[1-found] idx=0 gatt_if=1 is_add=1
  301. E (2208) BT: gatt_get_ch_state: ch_state=2
  302. E (2208) BT: GATT_GetConnIdIfConnected status=0
  303. I (2218) GAPCallback: stop scan successfully
  304. E (2268) BT: BLE HCI(id=62) event = 0x0a)
  305. E (2268) BT: status = 0, handle = 0, role = 0, bda_type = 2
  306. E (2268) BT: btm_identity_addr_to_random_pseudo
  307. E (2278) BT: btm_ble_connected
  308. E (2278) BT: Security Manager: btm_ble_connected : handle:0 enc_mode:0 bda:c2b071c6 RName:
  309. E (2288) BT: btm_ble_connected sec_flags=0x1080
  310. E (2298) BT: btm_find_or_alloc_dev
  311. E (2298) BT: l2cble_scanner_conn_comp: HANDLE=0 addr_type=0 conn_interval=12 slave_latency=0 supervision_tout=600
  312. E (2308) BT: btm_acl_created hci_handle=0 link_role=0 transport=2
  313. E (2318) BT: btm_bda_to_acl found
  314. E (2318) BT: device_type=0x3
  315. E (2328) BT: btm_bda_to_acl found
  316. E (2328) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  317. E (2338) BT: btm_bda_to_acl found
  318. E (2338) BT: p_acl->active_remote_addr_type: 1
  319. E (2348) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  320. E (2358) BT: btm_ble_read_resolving_list_entry_complete status = 0
  321. E (2358) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  322. E (2368) BT: btm_bda_to_acl found
  323. E (2368) BT: p_acl->active_remote_addr_type: 1
  324. E (2378) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  325. E (2388) BT: l2cu_release_ccb: cid 0x0004 in_use: 1
  326. E (2388) BT: GATT ATT protocol channel with BDA: 6789c2b071c6 is disconnected
  327. E (2398) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
  328. E (2408) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  329. E (2408) BT: gatt_add_srv_chg_clt
  330. E (2418) BT: enqueue a srv chg client
  331. E (2418) BT: gatt_cleanup_upon_disc
  332. E (2428) BT: found p_tcb
  333. E (2428) BT: gatt_set_ch_state: old=2 new=0
  334. E (2438) BT: gatt_free_pending_ind
  335. E (2438) BT: gatt_free_pending_enc_queue
  336. E (2438) BT: gatt_free_pending_prepare_write_queue
  337. E (2448) BT: found p_reg tcb_idx=0 gatt_if=1 conn_id=0x1
  338. E (2458) BT: bta_gattc_conn_cback() - cif=1 connected=0 conn_id=1 reason=0x003e
  339. E (2458) BT: p_conn is NULL in bta_gattc_conn_cback
  340. E (2468) BT: ATT disconnected
  341. E (2468) BT: SMDBG l2c smp_connect_callback
  342. E (2478) BT: btm_acl_removed
  343. E (2478) BT: btm_bda_to_acl found
  344. E (2488) BT: btm_acl_report_role_change
  345. E (2488) BT: acl hci_handle=0 transport=2 connectable_mode=0x0 link_role=0
  346. E (2498) BT: before update p_dev_rec->sec_flags=0x1080
  347. E (2498) BT: LE link down
  348. E (2508) BT: Bonded
  349. E (2508) BT: after update p_dev_rec->sec_flags=0x1080
  350. E (2518) BT: btm_acl_resubmit_page
  351. E (2518) BT: btm_sec_disconnected sec_req:x0 state:IDLE reason:62 bd_addr:00:ec:0a:47:ba:e3 remote_name:
  352. E (2528) BT: btm_sec_disconnected before update sec_flags=0x1080
  353. E (2538) BT: btm_sec_disconnected after update sec_flags=0x1080
  354. E (2548) BT: BTA got event 0x1f11
  355. W (2548) GATTCallback: GATT CALLBACK: 41
  356. I (2548) GATTCallback: ESP_GATTC_DISCONNECT_EVT, status = 0
  357. W (2558) GATTC: Unregister -> esp_ble_gattc_app_unregister: 0
  358. W (2568) GATTCallback: GATT CALLBACK: 2
  359. E (2568) GATTCallback: open failed, error status = 85
  360. E (2578) BT: BTA got event 0x1f14
  361. E (2578) BT: bta_gattc_deregister Deregister Failedm unknown client cif
  362. ets Jun 8 2016 00:22:57
  363. rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  364. ets Jun 8 2016 00:22:57
  365. rst:0x10 (RTCWDT_RTC_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  366. configsip: 0, SPIWP:0xee
  367. clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
  368. mode:DIO, clock div:1
  369. load:0x3fff0018,len:4
  370. load:0x3fff001c,len:5568
  371. ho 0 tail 12 room 4
  372. 0x40078000: ?? ??:0
  373. load:0x40078000,len:0
  374. 0x40078000: ?? ??:0
  375. load:0x40078000,len:12532
  376. 0x40078f84: ?? ??:0
  377. entry 0x40078f84
  378. I (30) boot: ESP-IDF v3.0-dev-1065-g5d332ba0 2nd stage bootloader
  379. I (30) boot: compile time 14:47:06
  380. I (30) boot: Enabling RNG early entropy source...
  381. I (36) boot: SPI Speed : 80MHz
  382. I (40) boot: SPI Mode : DIO
  383. I (44) boot: SPI Flash Size : 4MB
  384. I (48) boot: Partition Table:
  385. I (52) boot: ## Label Usage Type ST Offset Length
  386. I (59) boot: 0 nvs WiFi data 01 02 00009000 00004000
  387. I (67) boot: 1 otadata OTA data 01 00 0000d000 00002000
  388. I (74) boot: 2 phy_init RF data 01 01 0000f000 00001000
  389. I (82) boot: 3 factory OTA app 00 10 00010000 00150000
  390. I (89) boot: 4 ota_0 OTA app 00 11 00160000 00150000
  391. I (96) boot: 5 storage Unknown data 01 81 002b0000 00150000
  392. I (104) boot: End of partition table
  393. I (108) boot: No factory image, trying OTA 0
  394. I (113) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x2c36c (181100) map
  395. I (147) esp_image: segment 1: paddr=0x0003c394 vaddr=0x3ffc0000 size=0x01f4c ( 8012) load
  396. 0x40080000: _WindowOverflow4 at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:1685
  397. I (148) esp_image: segment 2: paddr=0x0003e2e8 vaddr=0x40080000 size=0x00400 ( 1024) load
  398. 0x40080400: ?? ??:0
  399. I (154) esp_image: segment 3: paddr=0x0003e6f0 vaddr=0x40080400 size=0x01920 ( 6432) load
  400. 0x400d0018: _flash_cache_start at ??:?
  401. I (163) esp_image: segment 4: paddr=0x00040018 vaddr=0x400d0018 size=0x6771c (423708) map
  402. 0x40081d20: _xt_coproc_exc at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:981
  403. I (229) esp_image: segment 5: paddr=0x000a773c vaddr=0x40081d20 size=0x104c0 ( 66752) load
  404. 0x400c0000: ?? ??:0
  405. I (240) esp_image: segment 6: paddr=0x000b7c04 vaddr=0x400c0000 size=0x00000 ( 0) load
  406. I (243) boot: Loaded app from partition at offset 0x10000
  407. I (244) boot: Disabling RNG early entropy source...
  408. I (250) cpu_start: Pro cpu up.
  409. I (253) cpu_start: Single core mode
  410. I (258) heap_init: Initializing. RAM available for dynamic allocation:
  411. D (265) heap_init: New heap initialised at 0x3ffaff10
  412. I (270) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM
  413. D (276) heap_init: New heap initialised at 0x3ffc9068
  414. I (281) heap_init: At 3FFC9068 len 00016F98 (91 KiB): DRAM
  415. I (287) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM
  416. I (294) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
  417. 0x400921e0: ?? ??:0
  418. D (300) heap_init: New heap initialised at 0x400921e0
  419. I (305) heap_init: At 400921E0 len 0000DE20 (55 KiB): IRAM
  420. I (311) cpu_start: Pro cpu start user code
  421. D (323) clk: RTC_SLOW_CLK calibration value: 3348352
  422. ets Jun 8 2016 00:22:57
  423. rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  424. ets Jun 8 2016 00:22:57
  425. rst:0x10 (RTCWDT_RTC_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  426. configsip: 0, SPIWP:0xee
  427. clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
  428. mode:DIO, clock div:1
  429. load:0x3fff0018,len:4
  430. load:0x3fff001c,len:5568
  431. ho 0 tail 12 room 4
  432. 0x40078000: ?? ??:0
  433. load:0x40078000,len:0
  434. 0x40078000: ?? ??:0
  435. load:0x40078000,len:12532
  436. 0x40078f84: ?? ??:0
  437. entry 0x40078f84
  438. I (30) boot: ESP-IDF v3.0-dev-1065-g5d332ba0 2nd stage bootloader
  439. I (30) boot: compile time 14:47:06
  440. I (30) boot: Enabling RNG early entropy source...
  441. I (36) boot: SPI Speed : 80MHz
  442. I (40) boot: SPI Mode : DIO
  443. I (44) boot: SPI Flash Size : 4MB
  444. I (48) boot: Partition Table:
  445. I (52) boot: ## Label Usage Type ST Offset Length
  446. I (59) boot: 0 nvs WiFi data 01 02 00009000 00004000
  447. I (67) boot: 1 otadata OTA data 01 00 0000d000 00002000
  448. I (74) boot: 2 phy_init RF data 01 01 0000f000 00001000
  449. I (82) boot: 3 factory OTA app 00 10 00010000 00150000
  450. I (89) boot: 4 ota_0 OTA app 00 11 00160000 00150000
  451. I (96) boot: 5 storage Unknown data 01 81 002b0000 00150000
  452. I (104) boot: End of partition table
  453. I (108) boot: No factory image, trying OTA 0
  454. I (113) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x2c36c (181100) map
  455. I (147) esp_image: segment 1: paddr=0x0003c394 vaddr=0x3ffc0000 size=0x01f4c ( 8012) load
  456. 0x40080000: _WindowOverflow4 at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:1685
  457. I (148) esp_image: segment 2: paddr=0x0003e2e8 vaddr=0x40080000 size=0x00400 ( 1024) load
  458. 0x40080400: ?? ??:0
  459. I (154) esp_image: segment 3: paddr=0x0003e6f0 vaddr=0x40080400 size=0x01920 ( 6432) load
  460. 0x400d0018: _flash_cache_start at ??:?
  461. I (163) esp_image: segment 4: paddr=0x00040018 vaddr=0x400d0018 size=0x6771c (423708) map
  462. 0x40081d20: _xt_coproc_exc at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:981
  463. I (229) esp_image: segment 5: paddr=0x000a773c vaddr=0x40081d20 size=0x104c0 ( 66752) load
  464. 0x400c0000: ?? ??:0
  465. I (240) esp_image: segment 6: paddr=0x000b7c04 vaddr=0x400c0000 size=0x00000 ( 0) load
  466. I (243) boot: Loaded app from partition at offset 0x10000
  467. I (244) boot: Disabling RNG early entropy source...
  468. I (250) cpu_start: Pro cpu up.
  469. I (253) cpu_start: Single core mode
  470. I (258) heap_init: Initializing. RAM available for dynamic allocation:
  471. D (265) heap_init: New heap initialised at 0x3ffaff10
  472. I (270) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM
  473. D (276) heap_init: New heap initialised at 0x3ffc9068
  474. I (281) heap_init: At 3FFC9068 len 00016F98 (91 KiB): DRAM
  475. I (287) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM
  476. I (294) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
  477. 0x400921e0: ?? ??:0
  478. D (300) heap_init: New heap initialised at 0x400921e0
  479. I (305) heap_init: At 400921E0 len 0000DE20 (55 KiB): IRAM
  480. I (311) cpu_start: Pro cpu start user code
  481. D (323) clk: RTC_SLOW_CLK calibration value: 3339469
  482. V (34) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  483. V (35) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xC0E
  484. D (40) intr_alloc: Connected src 57 to int 2 (cpu 0)
  485. V (45) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  486. V (51) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
  487. D (59) intr_alloc: Connected src 16 to int 3 (cpu 0)
  488. V (64) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  489. V (70) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0x40E
  490. D (78) intr_alloc: Connected src 24 to int 9 (cpu 0)
  491. I (83) cpu_start: Starting scheduler on PRO CPU.
  492. D (88) heap_init: New heap initialised at 0x3ffe0440
  493. D (88) heap_init: New heap initialised at 0x3ffe4350
  494. I (98) gpio: GPIO[13]| InputEn: 1| OutputEn: 0| OpenDrain: 0| Pullup: 1| Pulldown: 0| Intr:3
  495. V (98) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  496. V (98) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
  497. D (98) intr_alloc: Connected src 22 to int 12 (cpu 0)
  498. D (118) rmt: Rmt Tx Channel 1|Gpio 0|Sclk_Hz 80000000|Div 8|Carrier_Hz 100|Duty 50
  499. V (128) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  500. V (138) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
  501. D (148) intr_alloc: Connected src 47 to int 13 (cpu 0)
  502. D (148) rmt: RMT INTR : TX END
  503. E (158) NVSFlashStorage: ret == 1073525696 && length == 0
  504. E (158) NVSFlashStorage: 0 deviceID err:4354
  505. E (158) NVSFlashStorage: ret == 1073525696 && length == 0
  506. E (168) NVSFlashStorage: 1 advertisement err:4354
  507. E (178) NVSFlashStorage: ret == 1073525696 && length == 0
  508. E (178) NVSFlashStorage: 2 filter err:4354
  509. E (188) NVSFlashStorage: ret == 1073525696 && length == 0
  510. E (188) NVSFlashStorage: 3 primaryKey err:4354
  511. E (198) NVSFlashStorage: ret == 1073525696 && length == 0
  512. E (198) NVSFlashStorage: 4 connectionString err:4354
  513. E (208) NVSFlashStorage: ret == 1073525696 && length == 0
  514. E (218) NVSFlashStorage: 5 wifissid err:4354
  515. E (218) NVSFlashStorage: ret == 1073525696 && length == 0
  516. E (228) NVSFlashStorage: 6 wifipassword err:4354
  517. E (228) NVSFlashStorage: ret == 1073525696 && length == 0
  518. E (238) NVSFlashStorage: 7 ota_url err:4354
  519. E (238) NVSFlashStorage: ret == 1073525696 && length == 0
  520. E (248) NVSFlashStorage: 8 ipinfo err:4354
  521. E (248) BEA*ST: Read DeviceContext Failed
  522. I (258) BEA*ST: Provision: 1
  523. D (258) rmt: RMT INTR : TX END
  524. D (268) wl_flash: init - config ID=1, stored ID=1, access_count=0, block_size=4096, max_count=16, pos=0, move_count=0
  525. D (278) wl_flash: init starts: crc1=456748127, crc2 = 456748127, this->state.crc=456748127, state_copy->crc=456748127
  526. D (288) wl_flash: init: crc1=456748127, crc2 = 456748127, result=0
  527. D (288) wl_flash: recoverPos - this->state.pos=0x0000000e, result=00000000
  528. D (298) vfs_fat_spiflash: using pdrv=0
  529. I (298) GATTC: Start
  530. 0x4000d890: ?? ??:0
  531. D (308) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
  532. D (308) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
  533. D (318) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
  534. D (328) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
  535. D (328) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
  536. D (338) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
  537. D (338) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
  538. D (348) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
  539. I (358) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE
  540. D (528) phy_init: loading PHY init data from partition at offset 0xf000
  541. D (528) phy_init: PHY data partition validated
  542. I (538) phy: phy_version: 362.0, 61e8d92, Sep 8 2017, 18:48:11, 0, 0
  543. E (538) BT: btm_acl_init
  544. E (538) BT: L2CA_RegisterFixedChannel() CID: 0x0004, 0x3ffd5b40
  545. E (548) BT: btm_sec_set_security_level : sec: 0x0
  546. E (548) BT: BTM_SEC_REG[0]: id 50, is_orig 1, psm 0x001f, proto_id 0, chan_id 0
  547. E (558) BT: : sec: 0x80, service name [] (up to 21 chars saved)
  548. E (568) BT: btm_sec_set_security_level : sec: 0x0
  549. E (568) BT: BTM_SEC_REG[0]: id 50, is_orig 0, psm 0x001f, proto_id 0, chan_id 0
  550. E (578) BT: : sec: 0x80, service name [] (up to 21 chars saved)
  551. E (588) BT: SMP_Init
  552. E (588) BT: SMDBG l2c smp_l2cap_if_init
  553. E (598) BT: L2CA_RegisterFixedChannel() CID: 0x0006, 0x3ffd5b20
  554. E (598) BT: btm_ble_init
  555. E (608) BT: BTA got event 0x100
  556. E (608) BT: bta_dm_sm_execute event:0x0
  557. E (618) BT: BTA got event 0x0
  558. E (618) BT: bta_sys_sm_execute state:0, event:0x0
  559. E (628) BT: bta_sys_hw_api_enable for 0, active modules 0x0001
  560. E (628) BT: BTA got event 0x1
  561. E (638) BT: bta_sys_sm_execute state:1, event:0x1
  562. E (638) BT: bta_sys_hw_evt_enabled for 0
  563. E (648) BT: btm_acl_device_down
  564. E (658) BT: BTM Register For VSEvents is successfully
  565. E (658) BT: btm_ble_resolving_list_init max_irk_list_sz = 3
  566. E (658) BT: btm_ble_white_list_init white_list_size = 12
  567. E (668) BT: #####################################num_lm_ble_bufs = 10
  568. E (678) BT: BTM_SetPinType: pin type 0 [variable-0, fixed-1], code , length 0
  569. E (678) BT: btm_decode_ext_features_page page: 0
  570. E (688) BT: Local supported ACL packet types: 0xcc18
  571. E (688) BT: Local supported SCO packet types: 0x003d
  572. E (698) BT: btm_sec_set_security_level : sec: 0x0
  573. E (708) BT: BTM_SEC_REG[1]: id 42, is_orig 0, psm 0x0003, proto_id 3, chan_id 0
  574. E (708) BT: : sec: 0x80, service name [RFC_MUX
  575. ] (up to 21 chars saved)
  576. E (718) BT: btm_sec_dev_reset sec mode: 4
  577. E (728) BT: BTM_SetInquiryMode
  578. E (728) BT: BTM_SetPageScanType
  579. E (738) BT: BTM_SetInquiryScanType
  580. E (738) BT: btm_decode_ext_features_page page: 1
  581. E (748) BT: btm_decode_ext_features_page page: 2
  582. E (748) BT: bta_sys_hw_btm_cback was called with parameter: 0
  583. E (758) BT: BTA got event 0x2
  584. E (758) BT: bta_sys_sm_execute state:1, event:0x2
  585. E (768) BT: bta_sys_hw_evt_stack_enabled!notify the callers
  586. E (768) BT: bta_dm_sys_hw_cback with event: 1
  587. E (778) BT: BTM_BleLoadLocalKeys
  588. E (778) BT: BTM_BleLoadLocalKeys
  589. E (788) BT: BTM_SecRegister application registered
  590. E (788) BT: BTM_SecRegister SMP_Register( btm_proc_smp_cback )
  591. E (798) BT: SMP_Register state=0
  592. E (798) BT: BTM_SecRegister application registered
  593. E (808) BT: BTM_SetDefaultLinkSuperTout
  594. E (808) BT: BTM: BTM_WritePageTimeout: Timeout: 8192.
  595. E (818) BT: BTM_SetDefaultLinkPolicy setting:0x000f
  596. E (818) BT: BTM_SetDefaultLinkPolicy hold not supported (settings: 0x000d)
  597. E (828) BT: BTM_SetDefaultLinkPolicy park not supported (settings: 0x0005)
  598. E (838) BT: Set DefaultLinkPolicy:0x0005
  599. E (838) BT: BTM_RegBusyLevelNotif
  600. E (848) BT: btm_ble_clear_resolving_list_complete status=0
  601. E (848) BT: btm_ble_clear_resolving_list_complete resolving_list_avail_size=3
  602. E (858) BT: BTA got event 0x110
  603. E (868) BT: bta_dm_sm_execute event:0x10
  604. E (868) BT: BTM_SecAddBleDevice dev_type=0x2
  605. E (878) BT: Add a new device
  606. E (878) BT: allocate a new dev rec idx=0x0
  607. E (878) BT: BTM_GetHCIConnHandle
  608. E (888) BT: BTM_GetHCIConnHandle
  609. E (888) BT: hci_handl=0xffff
  610. E (898) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  611. E (898) BT: BTA got event 0x10f
  612. E (908) BT: bta_dm_sm_execute event:0xf
  613. E (908) BT: BTM_SecAddBleKey
  614. E (908) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x01
  615. E (918) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=0
  616. E (928) BT: bd_addr:67-89-c2-b0-71-c6
  617. E (928) BT: BTM_LE_KEY_PENC key_type=0x1 sec_flags=0x1080 sec_leve=0x1
  618. E (938) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  619. E (948) BT: BTA got event 0x10f
  620. E (948) BT: bta_dm_sm_execute event:0xf
  621. E (958) BT: BTM_SecAddBleKey
  622. E (958) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x02
  623. E (958) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=0
  624. E (968) BT: bd_addr:67-89-c2-b0-71-c6
  625. E (978) BT: BTM_LE_KEY_PID key_type=0x3 save peer IRK
  626. E (978) BT: btm_consolidate_dev
  627. E (988) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  628. E (988) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  629. E (998) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  630. E (1008) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
  631. E (1018) BT: btm_ble_suspend_bg_conn
  632. E (1018) BT: btm_ble_add_resolving_list_entry_complete status = 0
  633. E (1028) BT: BTA got event 0x10f
  634. E (1028) BT: bta_dm_sm_execute event:0xf
  635. E (1038) BT: BTM_SecAddBleKey
  636. E (1038) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x04
  637. E (1048) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=0
  638. E (1058) BT: bd_addr:67-89-c2-b0-71-c6
  639. E (1058) BT: BTM_LE_KEY_PCSRK key_type=0x7 sec_flags=0x1080 sec_level=0x1 peer_counter=0
  640. E (1068) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  641. E (1078) BT: BTA got event 0x10f
  642. E (1078) BT: bta_dm_sm_execute event:0xf
  643. E (1088) BT: BTM_SecAddBleKey
  644. E (1088) BT: BTM_SecAddLeKey() BDA: 6789c2b071c6, Type: 0x10
  645. E (1098) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=0
  646. E (1098) BT: bd_addr:67-89-c2-b0-71-c6
  647. E (1108) BT: BTM_LE_KEY_LENC key_type=0x17 DIV=0x0 key_size=0x10 sec_level=0x1
  648. E (1118) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  649. I (1118) GATTC: REGISTER GAP CALLBACK
  650. I (1128) GATTC: REGISTER GATTC CALLBACK
  651. I (1128) GATTC: REGISTER THIS APPLICATION
  652. E (1138) BT: btc_gattc_call_handler()
  653. E (1138) BT: BTA got event 0x1f13
  654. E (1148) BT: bta_gattc_register state 0
  655. E (1148) BT: bta_gattc_enable
  656. E (1148) BT: GATT_Register
  657. E (1158) BT: UUID=[0x0000]
  658. E (1158) BT: allocated gatt_if=1
  659. E (1158) BT: GATTC getbuf sucess.
  660. E (1168) BT: BTA got event 0x1f12
  661. E (1168) BT: GATT_StartIf gatt_if=1
  662. E (1178) BT: gatt_find_the_connected_bda start_idx=0
  663. E (1178) BT: gatt_find_the_connected_bda found=0 found_idx=4
  664. W (1188) GATTCallback: GATT CALLBACK: 0
  665. I (1188) GATTCallback: REG_EVT
  666. E (1198) BT: BTA got event 0x11e
  667. E (1198) BT: bta_dm_sm_execute event:0x1e
  668. E (1208) BT: BTM_BleConfigPrivacy
  669. E (1208) BT: btm_gen_resolvable_private_addr
  670. E (1218) BT: btm_ble_rand_enc_complete
  671. E (1218) BT: btm_gen_resolve_paddr_low
  672. E (1218) BT: smp_encrypt_data
  673. E (1228) BT: btm_gen_resolve_paddr_cmpl
  674. E (1228) BT: BTA got event 0x118
  675. E (1238) BT: bta_dm_sm_execute event:0x18
  676. E (1238) BT: BTM_BleSetScanFilterParams
  677. I (1248) GAPCallback: SCAN PARAMETERS SET; INITIATE A SCAN REQUEST
  678. E (1248) BT: BTA_DmBleScan:start = 1
  679. E (1258) BT: BTA got event 0x11a
  680. E (1258) BT: bta_dm_sm_execute event:0x1a
  681. I (1268) GAPCallback: scan start success
  682. E (1348) BT: BLE HCI(id=62) event = 0x02)
  683. E (1348) BT: btu_ble_process_adv_pkt
  684. E (1348) BT: btm_identity_addr_to_random_pseudo
  685. E (1348) BT: BTM_CheckAdvData type=0x01
  686. E (1358) BT: BTM_CheckAdvData type=0x19
  687. E (1358) BT: BTM_CheckAdvData type=0x03
  688. E (1368) BT: Random address, treating device as LE only
  689. E (1368) BT: BTM_CheckAdvData type=0x01
  690. E (1378) BT: bta_dm_observe_results_cb
  691. E (1378) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  692. E (1388) BT: BLE HCI(id=62) event = 0x02)
  693. E (1388) BT: btu_ble_process_adv_pkt
  694. E (1398) BT: btm_identity_addr_to_random_pseudo
  695. E (1398) BT: BTM_CheckAdvData type=0x01
  696. E (1408) BT: BTM_CheckAdvData type=0x19
  697. E (1408) BT: BTM_CheckAdvData type=0x03
  698. E (1408) BT: Random address, treating device as LE only
  699. E (1418) BT: BTM_CheckAdvData type=0x01
  700. E (1428) BT: bta_dm_observe_results_cb
  701. E (1428) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  702. E (1438) BT: BTM_CheckAdvData type=0x07
  703. E (1438) BT: BTM_CheckAdvData type=0x07
  704. E (1448) BT: BLE HCI(id=62) event = 0x02)
  705. E (1448) BT: btu_ble_process_adv_pkt
  706. E (1448) BT: btm_identity_addr_to_random_pseudo
  707. E (1458) BT: BTM_CheckAdvData type=0x01
  708. E (1458) BT: BTM_CheckAdvData type=0x19
  709. E (1468) BT: BTM_CheckAdvData type=0x03
  710. E (1468) BT: Random address, treating device as LE only
  711. E (1478) BT: BTM_CheckAdvData type=0x01
  712. E (1478) BT: bta_dm_observe_results_cb
  713. E (1488) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  714. E (1488) BT: BLE HCI(id=62) event = 0x02)
  715. E (1498) BT: btu_ble_process_adv_pkt
  716. E (1498) BT: btm_identity_addr_to_random_pseudo
  717. E (1508) BT: BTM_CheckAdvData type=0x01
  718. E (1508) BT: BTM_CheckAdvData type=0x19
  719. E (1518) BT: BTM_CheckAdvData type=0x03
  720. E (1518) BT: Random address, treating device as LE only
  721. E (1528) BT: BTM_CheckAdvData type=0x01
  722. E (1528) BT: bta_dm_observe_results_cb
  723. E (1538) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  724. E (1538) BT: BTM_CheckAdvData type=0x07
  725. E (1548) BT: BTM_CheckAdvData type=0x07
  726. E (1548) BT: BLE HCI(id=62) event = 0x02)
  727. E (1548) BT: btu_ble_process_adv_pkt
  728. E (1558) BT: btm_identity_addr_to_random_pseudo
  729. E (1558) BT: BTM_CheckAdvData type=0x01
  730. E (1568) BT: BTM_CheckAdvData type=0x19
  731. E (1568) BT: BTM_CheckAdvData type=0x03
  732. E (1578) BT: Random address, treating device as LE only
  733. E (1578) BT: BTM_CheckAdvData type=0x01
  734. E (1588) BT: bta_dm_observe_results_cb
  735. E (1588) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  736. E (1598) BT: BTM_CheckAdvData type=0x07
  737. E (1678) BT: BLE HCI(id=62) event = 0x02)
  738. E (1678) BT: btu_ble_process_adv_pkt
  739. E (1678) BT: btm_identity_addr_to_random_pseudo
  740. E (1688) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false, scan_type_active=1
  741. E (1698) BT: BTM_CheckAdvData type=0x01
  742. E (1698) BT: BTM_CheckAdvData type=0x19
  743. E (1708) BT: BTM_CheckAdvData type=0x03
  744. E (1708) BT: BR/EDR NOT support bit not set, treat as DUMO
  745. E (1718) BT: BLE HCI(id=62) event = 0x02)
  746. E (1718) BT: btu_ble_process_adv_pkt
  747. E (1728) BT: btm_identity_addr_to_random_pseudo
  748. E (1728) BT: BTM_CheckAdvData type=0x01
  749. E (1738) BT: BTM_CheckAdvData type=0x19
  750. E (1738) BT: BTM_CheckAdvData type=0x03
  751. E (1738) BT: BR/EDR NOT support bit not set, treat as DUMO
  752. E (1748) BT: BTM_CheckAdvData type=0x01
  753. E (1758) BT: bta_dm_observe_results_cb
  754. E (1758) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  755. E (1768) BT: BTM_CheckAdvData type=0x07
  756. I (1768) GAPCallback: OPEN A DIRECT CONNECTION TO DEVICE. application identity: 1 rssi: -68, bda: 3ffd67dc
  757. E (1778) BT: BTA_DmBleScan:start = 0
  758. E (1778) BT: BTA got event 0x11a
  759. E (1788) BT: bta_dm_sm_execute event:0x1a
  760. E (1788) BT: bta_dm_observe_cmpl_cb
  761. E (1798) BT: BLE HCI(id=62) event = 0x02)
  762. E (1798) BT: btu_ble_process_adv_pkt
  763. E (1808) BT: BLE HCI(id=62) event = 0x02)
  764. E (1808) BT: btu_ble_process_adv_pkt
  765. E (1818) BT: BTA got event 0x1f00
  766. E (1818) BT: GATT_Connect gatt_if=1
  767. E (1818) BT: gatt_get_ch_state: ch_state=0
  768. E (1828) BT: gatt_set_ch_state: old=0 new=2
  769. E (1828) BT: L2CA_ConnectFixedChnl() CID: 0x0004 BDA: 6789c2b071c6
  770. E (1838) BT: l2c_ble_link_adjust_allocation num_hipri: 0 num_lowpri: 1 low_quota: 10 round_robin_quota: 0 qq: 10
  771. E (1848) BT: l2c_ble_link_adjust_allocation LCB 0 Priority: 0 XmitQuota: 10
  772. E (1858) BT: SentNotAcked: 0 RRUnacked: 0
  773. E (1868) BT: l2cu_allocate_ccb: cid 0x0000
  774. E (1868) BT: l2c_link_adjust_chnl_allocation
  775. E (1878) BT: CID:0x0040 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  776. E (1878) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  777. E (1888) BT: btm_find_dev_type - device_type = 2 addr_type = 0
  778. E (1898) BT: btm_find_or_alloc_dev
  779. E (1898) BT: gatt_update_app_use_link_flag is_add=1 chk_link=0
  780. E (1908) BT: gatt_update_app_hold_link_status found=1[1-found] idx=0 gatt_if=1 is_add=1
  781. E (1918) BT: gatt_get_ch_state: ch_state=2
  782. E (1918) BT: GATT_GetConnIdIfConnected status=0
  783. I (1928) GAPCallback: stop scan successfully
  784. E (2108) BT: BLE HCI(id=62) event = 0x0a)
  785. E (2108) BT: status = 0, handle = 0, role = 0, bda_type = 2
  786. E (2108) BT: btm_identity_addr_to_random_pseudo
  787. E (2108) BT: btm_ble_connected
  788. E (2118) BT: Security Manager: btm_ble_connected : handle:0 enc_mode:0 bda:c2b071c6 RName:
  789. E (2128) BT: btm_ble_connected sec_flags=0x1080
  790. E (2128) BT: btm_find_or_alloc_dev
  791. E (2138) BT: l2cble_scanner_conn_comp: HANDLE=0 addr_type=0 conn_interval=12 slave_latency=0 supervision_tout=600
  792. E (2148) BT: btm_acl_created hci_handle=0 link_role=0 transport=2
  793. E (2148) BT: btm_bda_to_acl found
  794. E (2158) BT: device_type=0x3
  795. E (2158) BT: btm_bda_to_acl found
  796. E (2168) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  797. E (2168) BT: btm_bda_to_acl found
  798. E (2178) BT: p_acl->active_remote_addr_type: 1
  799. E (2178) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  800. E (2188) BT: btm_ble_read_resolving_list_entry_complete status = 0
  801. E (2198) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  802. E (2208) BT: btm_bda_to_acl found
  803. E (2208) BT: p_acl->active_remote_addr_type: 1
  804. E (2218) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  805. E (2218) BT: btm_bda_to_acl found
  806. E (2228) BT: btm_establish_continue
  807. E (2228) BT: btm_acl_update_busy_level
  808. E (2238) BT: BTM_BLI_ACL_UP_EVT
  809. E (2238) BT: l2cu_process_fixed_chnl_resp
  810. E (2248) BT: GATT ATT protocol channel with BDA: 6789c2b071c6 is connected
  811. E (2248) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
  812. E (2258) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  813. E (2268) BT: gatt_add_srv_chg_clt
  814. E (2268) BT: enqueue a srv chg client
  815. E (2268) BT: gatt_get_ch_state: ch_state=2
  816. E (2278) BT: gatt_set_ch_state: old=2 new=4
  817. E (2278) BT: gatt_num_apps_hold_link num=1
  818. E (2288) BT: GATT_SetIdleTimeout idle_tout=65535 status=1(1-OK 0-not performed)
  819. E (2298) BT: SMDBG l2c smp_connect_callback
  820. E (2298) BT: L2CAP - rcv_cid CID: 0x0004
  821. E (2308) BT: gatt_get_ch_state: ch_state=4
  822. E (2308) BT: gatt_process_notification
  823. E (2318) BT: gatt_get_link_encrypt_status status=0x8e
  824. E (2318) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 7 status = 142
  825. E (2328) BT: GATT_GetConnectionInfor conn_id=1
  826. E (2328) BT: bta_gattc_process_indicate no one interested, ack now
  827. E (2338) BT: GATTC_SendHandleValueConfirm conn_id=1 handle=0x3
  828. E (2348) BT: notif_count=1
  829. E (2348) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  830. E (2358) BT: l2c_link_check_send_pkts
  831. E (2358) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  832. E (2368) BT: l2c_link_send_to_lower
  833. E (2368) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  834. E (2378) BT: BLE HCI(id=62) event = 0x07)
  835. E (2388) BT: l2cble_process_data_length_change_event TX data len = 251
  836. E (2388) BT: btm_handle_to_acl_index
  837. E (2398) BT: btm_bda_to_acl found
  838. E (2398) BT: L2CAP - rcv_cid CID: 0x0006
  839. E (2408) BT: l2cu_allocate_ccb: cid 0x0000
  840. E (2408) BT: l2c_link_adjust_chnl_allocation
  841. E (2418) BT: CID:0x0004 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  842. E (2418) BT: CID:0x0041 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  843. E (2428) BT:
  844. SMDBG l2c smp_data_received
  845. E (2438) BT: main smp_sm_event
  846. E (2438) BT: SMP Role: Master
  847. State: [SMP_STATE_IDLE (0)], Event: [SECURITY_REQ_EVT (11)]
  848. E (2448) BT: State change: SMP_STATE_IDLE(0) ==> SMP_STATE_WAIT_APP_RSP(1)
  849. E (2458) BT: smp_proc_sec_req auth_req=0xd
  850. E (2458) BT: btm_ble_link_sec_check auth_req =0xd
  851. E (2468) BT: dev_rec sec_flags=0x1080
  852. E (2468) BT: cur_sec_level=1 req_sec_level=4 sec_req_act=2
  853. E (2478) BT: smp_proc_sec_req sec_req_act=0x2
  854. E (2478) BT: smp_send_app_cback p_cb->cb_evt=2
  855. E (2488) BT: btm_proc_smp_cback event = 2
  856. 0x40101090: bta_dm_ble_smp_cback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/bta/dm/bta_dm_act.c:4189
  857. E (2488) BT: btm_cb.api.p_le_callback=0x40101090
  858. E (2498) BT: callback_rc=0 p_cb->cb_evt=2
  859. E (2498) BT: smp_send_app_cback return
  860. E (2508) BT: result state = SMP_STATE_WAIT_APP_RSP
  861. E (2508) BT: btm_bda_to_acl found
  862. E (2518) BT: L2CAP - rcv_cid CID: 0x0005
  863. E (2518) BT: l2c_link_check_send_pkts
  864. E (2528) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  865. E (2528) BT: l2c_link_send_to_lower
  866. E (2538) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  867. I (2548) GAPCallback: ESP_GAP_BLE_SEC_REQ_EVT
  868. E (2548) BT: BLE HCI(id=62) event = 0x04)
  869. E (2548) BT: btm_ble_read_remote_features_complete
  870. E (2558) BT: BTA got event 0x104
  871. E (2558) BT: bta_dm_sm_execute event:0x4
  872. E (2568) BT: BTM_ReadRemoteFeatures
  873. E (2568) BT: bta_dm_acl_change info: 0x0
  874. E (2578) BT: L2CA_SetDesireRole() new:x1, disallow_switch:0
  875. E (2578) BT: BTA got event 0x104
  876. E (2588) BT: bta_dm_sm_execute event:0x4
  877. E (2588) BT: BTA got event 0x1f0d
  878. E (2598) BT: bta_gattc_conn server cache state=0
  879. E (2598) BT: bta_gattc_conn conn_id=1
  880. E (2608) BT: GATT_GetConnectionInfor conn_id=1
  881. E (2608) BT: bta_gattc_start_discover conn_id=1 p_clcb->p_srcb->state = 3
  882. E (2618) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 0 current upd state 0x0c
  883. E (2628) BT: GATTC_Discover conn_id=1 disc_type=1
  884. E (2628) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  885. E (2638) BT: l2c_link_check_send_pkts
  886. E (2648) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  887. E (2648) BT: l2c_link_send_to_lower
  888. E (2658) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
  889. W (2658) GATTCallback: GATT CALLBACK: 40
  890. I (2668) GATTCallback: ESP_GATTC_CONNECT_EVT conn_id 0, if 1, status 0
  891. E (2678) BT: BTA_DmSetEncryption
  892. E (2678) BT: l2c_link_check_send_pkts
  893. E (2678) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  894. E (2688) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
  895. E (2698) BT: l2c_link_check_send_pkts
  896. E (2698) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  897. E (2708) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  898. E (2718) BT: BTA got event 0x113
  899. E (2718) BT: bta_dm_sm_execute event:0x13
  900. E (2718) BT: BTM_SecurityGrant
  901. E (2728) BT: SMP_SecurityGrant
  902. E (2728) BT: main smp_sm_event
  903. E (2738) BT: SMP Role: Master
  904. State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_SEC_GRANT_EVT (21)]
  905. E (2748) BT: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_WAIT_APP_RSP(1)
  906. E (2748) BT: smp_proc_sec_grant
  907. E (2758) BT: smp_send_app_cback p_cb->cb_evt=1
  908. E (2758) BT: io_cap = 4
  909. E (2768) BT: btm_proc_smp_cback event = 1
  910. E (2768) BT: btm_ble_io_capabilities_req
  911. E (2778) BT: io mitm: 13 oob_data:0
  912. E (2778) BT: btm_ble_io_capabilities_req 1: p_dev_rec->security_required = 0 auth_req:13
  913. E (2788) BT: btm_ble_io_capabilities_req 2: i_keys=0x3 r_keys=0xf (bit 0-LTK 1-IRK 2-CSRK)
  914. E (2798) BT: btm_ble_io_capabilities_req 3: auth_req:13
  915. E (2798) BT: btm_ble_io_capabilities_req 4: i_keys=0x3 r_keys=0xf
  916. E (2808) BT: btm_ble_io_capabilities_req 5: p_data->io_cap = 3 auth_req:13
  917. E (2818) BT: btm_ble_io_capabilities_req 6: IO_CAP:3 oob_data:0 auth_req:0x09
  918. E (2828) BT: callback_rc=0 p_cb->cb_evt=1
  919. E (2828) BT: rcvd auth_req: 0x09, io_cap: 3 loc_oob_flag: 0 loc_enc_size: 16,local_i_key: 0x03, local_r_key: 0x0f
  920. E (2838) BT: btm_bda_to_acl found
  921. E (2848) BT: lmp_version_below LMP version 6 < 8
  922. E (2848) BT: set auth_req: 0x09, local_i_key: 0x03, local_r_key: 0x07
  923. E (2858) BT: main smp_sm_event
  924. E (2858) BT: SMP Role: Master
  925. State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_IO_RSP_EVT (20)]
  926. E (2868) BT: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_PAIR_REQ_RSP(3)
  927. E (2878) BT: smp_send_pair_req
  928. E (2888) BT: btm_sec_clear_ble_keys() Clearing BLE Keys
  929. E (2888) BT: btm_ble_resolving_list_remove_dev
  930. E (2898) BT: btm_ble_suspend_bg_conn
  931. E (2898) BT: btm_ble_suspend_bg_conn
  932. E (2908) BT: smp_send_cmd on l2cap cmd_code=0x1
  933. E (2908) BT: smp_build_pairing_cmd
  934. E (2918) BT: smp_send_msg_to_L2CAP
  935. E (2918) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
  936. E (2928) BT: l2c_link_check_send_pkts
  937. E (2928) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  938. E (2938) BT: l2c_link_send_to_lower
  939. E (2938) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  940. W (2948) GATTCallback: GATT CALLBACK: 2
  941. I (2948) GATTCallback: ESP_GATTC_OPEN_EVT conn_id: 0 (0) gattc_if: 1 (1)
  942. E (2958) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 0 current upd state 0x0c
  943. E (2968) BT: result state = SMP_STATE_PAIR_REQ_RSP
  944. E (2978) BT: smp_send_app_cback return
  945. E (2978) BT: result state = SMP_STATE_PAIR_REQ_RSP
  946. E (2988) BT: BLE HCI(id=62) event = 0x03)
  947. E (2988) BT: l2cble_process_conn_update_evt: conn_update_mask=8
  948. E (2998) BT: BTA got event 0x10b
  949. E (2998) BT: bta_dm_sm_execute event:0xb
  950. E (3008) BT: bta_dm_set_encryption
  951. E (3008) BT: Security Manager: BTM_SetEncryption busy, enqueue request
  952. E (3018) BT: btm_read_remote_version_complete
  953. E (3018) BT: btm_bda_to_acl found
  954. E (3028) BT: l2c_link_check_send_pkts
  955. E (3028) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  956. E (3038) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  957. E (3048) BT: btm_bda_to_acl found
  958. E (3048) BT: L2CAP - rcv_cid CID: 0x0004
  959. E (3058) BT: gatt_get_ch_state: ch_state=4
  960. I (3058) GAPCallback: update connection params status = 0, min_int = 6, max_int = 6,conn_int = 6,latency = 0, timeout = 2000
  961. E (3068) BT: bta_gattc_add_srvc_to_list handle=1, service type=0x1801
  962. E (3078) BT: bta_gattc_add_srvc_to_list handle=20, service type=0x1800
  963. E (3088) BT: bta_gattc_add_srvc_to_list handle=40, service type=0x00ff
  964. E (3088) BT: gatt_end_operation status=0 op=1 subtype=1
  965. E (3098) BT: Start service discovery: srvc_idx = 0
  966. E (3098) BT: GATTC_Discover conn_id=1 disc_type=3
  967. E (3108) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  968. E (3118) BT: l2c_link_check_send_pkts
  969. E (3118) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  970. E (3128) BT: l2c_link_send_to_lower
  971. E (3128) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  972. E (3138) BT: BTA got event 0x1f07
  973. E (3138) BT: btm_ble_remove_resolving_list_entry_complete status = 0
  974. E (3148) BT: l2c_link_check_send_pkts
  975. E (3158) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  976. E (3158) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  977. E (3168) BT: btm_bda_to_acl found
  978. E (3168) BT: L2CAP - rcv_cid CID: 0x0006
  979. E (3178) BT:
  980. SMDBG l2c smp_data_received
  981. E (3178) BT: main smp_sm_event
  982. E (3188) BT: SMP Role: Master
  983. State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PAIRING_RSP_EVT (2)]
  984. E (3198) BT: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PAIR_REQ_RSP(3)
  985. E (3198) BT: smp_proc_pair_cmd
  986. E (3208) BT: smp_command_has_invalid_parameters for cmd code 0x02
  987. E (3218) BT: smp_command_has_valid_fixed_length for cmd code 0x02
  988. E (3218) BT: smp_pairing_request_response_parameters_are_valid for cmd code 0x02
  989. E (3228) BT: smp_select_association_model
  990. E (3238) BT: smp_select_association_model p_cb->peer_io_caps = 4 p_cb->local_io_capability = 3
  991. E (3238) BT: smp_select_association_model p_cb->peer_oob_flag = 0 p_cb->loc_oob_flag = 0
  992. E (3248) BT: smp_select_association_model p_cb->peer_auth_req = 0x0d p_cb->loc_auth_req = 0x09
  993. E (3258) BT: smp_select_association_model p_cb->secure_connections_only_mode_required = FALSE
  994. E (3268) BT: use_sc_process = 1
  995. E (3278) BT: smp_select_association_model_secure_connections
  996. E (3278) BT: smp_decide_association_model Association Model = 4
  997. E (3288) BT: sec_level=0
  998. E (3288) BT: main smp_sm_event
  999. E (3298) BT: SMP Role: Master
  1000. State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PUBLIC_KEY_EXCHANGE_REQ_EVT (27)]
  1001. E (3308) BT: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
  1002. E (3318) BT: smp_create_private_key
  1003. E (3318) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
  1004. E (3328) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
  1005. E (3328) BT: l2c_link_check_send_pkts
  1006. E (3338) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1007. E (3338) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1008. E (3348) BT: btm_bda_to_acl found
  1009. E (3348) BT: L2CAP - rcv_cid CID: 0x0004
  1010. E (3358) BT: gatt_get_ch_state: ch_state=4
  1011. E (3358) BT: gatt_process_error_rsp
  1012. E (3368) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1013. E (3368) BT: Discovery completed
  1014. E (3378) BT: gatt_end_operation status=0 op=1 subtype=3
  1015. E (3378) BT: GATTC_Discover conn_id=1 disc_type=4
  1016. E (3388) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1017. E (3398) BT: l2c_link_check_send_pkts
  1018. E (3398) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1019. E (3408) BT: l2c_link_send_to_lower
  1020. E (3408) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1021. E (3418) BT: btm_ble_rand_enc_complete
  1022. E (3418) BT: smp_rand_back state=0x9
  1023. E (3428) BT: smp_continue_private_key_creation state=0x9
  1024. E (3428) BT: l2c_link_check_send_pkts
  1025. E (3438) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1026. E (3448) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1027. E (3448) BT: btm_bda_to_acl found
  1028. E (3458) BT: L2CAP - rcv_cid CID: 0x0004
  1029. E (3458) BT: gatt_get_ch_state: ch_state=4
  1030. E (3468) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1031. E (3468) BT: l2c_link_check_send_pkts
  1032. E (3478) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1033. E (3478) BT: l2c_link_send_to_lower
  1034. E (3488) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1035. E (3498) BT: btm_ble_rand_enc_complete
  1036. E (3498) BT: smp_rand_back state=0xa
  1037. E (3498) BT: smp_continue_private_key_creation state=0xa
  1038. E (3508) BT: l2c_link_check_send_pkts
  1039. E (3508) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1040. E (3518) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1041. E (3528) BT: btm_bda_to_acl found
  1042. E (3528) BT: L2CAP - rcv_cid CID: 0x0004
  1043. E (3538) BT: gatt_get_ch_state: ch_state=4
  1044. E (3538) BT: gatt_process_error_rsp
  1045. E (3548) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1046. E (3548) BT: Discovery completed
  1047. E (3558) BT: gatt_end_operation status=0 op=1 subtype=4
  1048. E (3558) BT: starting discover characteristics descriptor
  1049. E (3568) BT: GATTC_Discover conn_id=1 disc_type=5
  1050. E (3568) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1051. E (3578) BT: l2c_link_check_send_pkts
  1052. E (3588) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1053. E (3588) BT: l2c_link_send_to_lower
  1054. E (3598) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1055. E (3598) BT: btm_ble_rand_enc_complete
  1056. E (3608) BT: smp_rand_back state=0xb
  1057. E (3608) BT: smp_continue_private_key_creation state=0xb
  1058. E (3618) BT: l2c_link_check_send_pkts
  1059. E (3618) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1060. E (3628) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1061. E (3638) BT: btm_bda_to_acl found
  1062. E (3638) BT: L2CAP - rcv_cid CID: 0x0004
  1063. E (3648) BT: gatt_get_ch_state: ch_state=4
  1064. E (3648) BT: gatt_process_error_rsp
  1065. E (3648) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
  1066. E (3658) BT: Discovery completed
  1067. E (3658) BT: gatt_end_operation status=0 op=1 subtype=5
  1068. E (3668) BT: Start service discovery: srvc_idx = 1
  1069. E (3678) BT: GATTC_Discover conn_id=1 disc_type=3
  1070. E (3678) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1071. E (3688) BT: l2c_link_check_send_pkts
  1072. E (3688) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1073. E (3698) BT: l2c_link_send_to_lower
  1074. E (3698) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1075. E (3708) BT: btm_ble_rand_enc_complete
  1076. E (3718) BT: smp_rand_back state=0xc
  1077. E (3718) BT: smp_continue_private_key_creation state=0xc
  1078. E (3728) BT: smp_process_private_key
  1079. E (3778) BT: main smp_sm_event
  1080. E (3778) BT: SMP Role: Master
  1081. State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [LOCAL_PUBLIC_KEY_CRTD_EVT (28)]
  1082. E (3788) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
  1083. E (3798) BT: smp_send_pair_public_key
  1084. E (3798) BT: smp_send_cmd on l2cap cmd_code=0xc
  1085. E (3808) BT: smp_build_pair_public_key_cmd
  1086. E (3808) BT: smp_send_msg_to_L2CAP
  1087. E (3818) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
  1088. E (3818) BT: l2c_link_check_send_pkts
  1089. E (3828) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1090. E (3828) BT: l2c_link_send_to_lower
  1091. E (3838) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1092. E (3848) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
  1093. E (3848) BT: l2c_link_check_send_pkts
  1094. E (3858) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1095. E (3858) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1096. E (3868) BT: btm_bda_to_acl found
  1097. E (3868) BT: L2CAP - rcv_cid CID: 0x0004
  1098. E (3878) BT: gatt_get_ch_state: ch_state=4
  1099. E (3878) BT: gatt_process_error_rsp
  1100. E (3888) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1101. E (3888) BT: Discovery completed
  1102. E (3898) BT: gatt_end_operation status=0 op=1 subtype=3
  1103. E (3898) BT: GATTC_Discover conn_id=1 disc_type=4
  1104. E (3908) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1105. E (3918) BT: l2c_link_check_send_pkts
  1106. E (3918) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1107. E (3928) BT: l2c_link_send_to_lower
  1108. E (3928) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1109. E (3938) BT: l2c_link_check_send_pkts
  1110. E (3938) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1111. E (3948) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1112. E (3958) BT: btm_bda_to_acl found
  1113. E (3958) BT: L2CAP - rcv_cid CID: 0x0006
  1114. E (3968) BT:
  1115. SMDBG l2c smp_data_received
  1116. E (3968) BT: main smp_sm_event
  1117. E (3968) BT: SMP Role: Master
  1118. State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [PAIR_PUBLIC_KEY_EVT (12)]
  1119. E (3978) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
  1120. E (3988) BT: smp_process_pairing_public_key
  1121. E (3998) BT: smp_command_has_invalid_parameters for cmd code 0x0c
  1122. E (3998) BT: smp_command_has_valid_fixed_length for cmd code 0x0c
  1123. E (4008) BT: smp_wait_for_both_public_keys
  1124. E (4018) BT: main smp_sm_event
  1125. E (4018) BT: SMP Role: Master
  1126. State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [BOTH_PUBLIC_KEYS_RCVD_EVT (29)]
  1127. E (4028) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
  1128. E (4038) BT: smp_both_have_public_keys
  1129. E (4038) BT: smp_compute_dhkey
  1130. E (4098) BT: main smp_sm_event
  1131. E (4098) BT: SMP Role: Master
  1132. State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [SEC_CONN_DHKEY_COMPLETE_EVT (30)]
  1133. E (4108) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
  1134. E (4118) BT: smp_start_secure_connection_phase1
  1135. E (4118) BT: p_cb->sec_level =1 (SMP_SEC_UNAUTHENTICATE)
  1136.  
  1137. E (4128) BT: smp_start_nonce_generation
  1138. E (4128) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1139. E (4138) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1140. E (4138) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1141. E (4148) BT: btm_bda_to_acl found
  1142. E (4158) BT: L2CAP - rcv_cid CID: 0x0006
  1143. E (4158) BT:
  1144. SMDBG l2c smp_data_received
  1145. E (4168) BT: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x09
  1146. E (4168) BT: main smp_sm_event
  1147. E (4178) BT: SMP Role: Master
  1148. State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
  1149. E (4188) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
  1150. E (4198) BT: smp_process_pairing_commitment
  1151. E (4198) BT: smp_command_has_invalid_parameters for cmd code 0x0f
  1152. E (4208) BT: smp_command_has_valid_fixed_length for cmd code 0x0f
  1153. E (4218) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1154. E (4218) BT: l2c_link_check_send_pkts
  1155. E (4228) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1156. E (4228) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1157. E (4238) BT: btm_bda_to_acl found
  1158. E (4238) BT: L2CAP - rcv_cid CID: 0x0004
  1159. E (4248) BT: gatt_get_ch_state: ch_state=4
  1160. E (4248) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1161. E (4258) BT: l2c_link_check_send_pkts
  1162. E (4268) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1163. E (4268) BT: l2c_link_send_to_lower
  1164. E (4278) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1165. E (4278) BT: btm_ble_rand_enc_complete
  1166. E (4288) BT: smp_rand_back state=0xd
  1167. E (4288) BT: smp_finish_nonce_generation
  1168. E (4298) BT: l2c_link_check_send_pkts
  1169. E (4298) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1170. E (4308) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1171. E (4318) BT: btm_bda_to_acl found
  1172. E (4318) BT: L2CAP - rcv_cid CID: 0x0004
  1173. E (4318) BT: gatt_get_ch_state: ch_state=4
  1174. E (4328) BT: gatt_process_error_rsp
  1175. E (4328) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1176. E (4338) BT: Discovery completed
  1177. E (4338) BT: gatt_end_operation status=0 op=1 subtype=4
  1178. E (4348) BT: starting discover characteristics descriptor
  1179. E (4358) BT: starting discover characteristics descriptor
  1180. E (4358) BT: starting discover characteristics descriptor
  1181. E (4368) BT: GATTC_Discover conn_id=1 disc_type=5
  1182. E (4368) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1183. E (4378) BT: l2c_link_check_send_pkts
  1184. E (4378) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1185. E (4388) BT: l2c_link_send_to_lower
  1186. E (4398) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1187. E (4398) BT: btm_ble_rand_enc_complete
  1188. E (4408) BT: smp_rand_back state=0xe
  1189. E (4408) BT: smp_process_new_nonce round 0
  1190. E (4418) BT: main smp_sm_event
  1191. E (4418) BT: SMP Role: Master
  1192. State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
  1193. E (4428) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
  1194. E (4438) BT: smp_process_local_nonce
  1195. E (4438) BT: master in assoc mode = 4 already rcvd slave commitment - race condition
  1196. E (4448) BT: smp_send_rand
  1197. E (4458) BT: smp_send_cmd on l2cap cmd_code=0x4
  1198. E (4458) BT: smp_build_rand_cmd
  1199. E (4468) BT: smp_send_msg_to_L2CAP
  1200. E (4468) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
  1201. E (4478) BT: l2c_link_check_send_pkts
  1202. E (4478) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1203. E (4488) BT: l2c_link_send_to_lower
  1204. E (4488) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1205. E (4498) BT: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
  1206. E (4508) BT: result state = SMP_STATE_WAIT_NONCE
  1207. E (4518) BT: l2c_link_check_send_pkts
  1208. E (4518) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1209. E (4528) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1210. E (4528) BT: btm_bda_to_acl found
  1211. E (4538) BT: L2CAP - rcv_cid CID: 0x0004
  1212. E (4538) BT: gatt_get_ch_state: ch_state=4
  1213. E (4548) BT: gatt_process_error_rsp
  1214. E (4548) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
  1215. E (4558) BT: Discovery completed
  1216. E (4558) BT: gatt_end_operation status=0 op=1 subtype=5
  1217. E (4568) BT: Start service discovery: srvc_idx = 2
  1218. E (4568) BT: GATTC_Discover conn_id=1 disc_type=3
  1219. E (4578) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1220. E (4588) BT: l2c_link_check_send_pkts
  1221. E (4588) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1222. E (4598) BT: l2c_link_send_to_lower
  1223. E (4598) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1224. E (4608) BT: l2c_link_check_send_pkts
  1225. E (4608) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1226. E (4618) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1227. E (4628) BT: btm_bda_to_acl found
  1228. E (4628) BT: L2CAP - rcv_cid CID: 0x0006
  1229. E (4628) BT:
  1230. SMDBG l2c smp_data_received
  1231. E (4638) BT: main smp_sm_event
  1232. E (4638) BT: SMP Role: Master
  1233. State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
  1234. E (4648) BT: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
  1235. E (4658) BT: smp_proc_rand
  1236. E (4658) BT: smp_command_has_invalid_parameters for cmd code 0x04
  1237. E (4668) BT: smp_command_has_valid_fixed_length for cmd code 0x04
  1238. E (4678) BT: smp_process_peer_nonce start
  1239. E (4678) BT: smp_check_commitment
  1240. E (4688) BT: smp_calculate_peer_commitment
  1241. E (4688) BT: smp_calculate_f4
  1242. E (4698) BT: aes_cipher_msg_auth_code
  1243. E (4698) BT: AES128_CMAC started, allocate buffer size = 80
  1244. E (4708) BT: cmac_generate_subkey
  1245. E (4708) BT: smp_encrypt_data
  1246. E (4708) BT: cmac_subkey_cont
  1247. E (4718) BT: leftshift_onebit
  1248. E (4718) BT: leftshift_onebit
  1249. E (4728) BT: smp_xor_128
  1250. E (4728) BT: cmac_prepare_last_block
  1251. E (4728) BT: flag = 0 round = 5
  1252. E (4738) BT: smp_xor_128
  1253. E (4738) BT: cmac_aes_k_calculate
  1254. E (4738) BT: smp_xor_128
  1255. E (4748) BT: smp_encrypt_data
  1256. E (4748) BT: smp_xor_128
  1257. E (4758) BT: smp_encrypt_data
  1258. E (4758) BT: smp_xor_128
  1259. E (4758) BT: smp_encrypt_data
  1260. E (4768) BT: smp_xor_128
  1261. E (4768) BT: smp_encrypt_data
  1262. E (4768) BT: smp_xor_128
  1263. E (4778) BT: smp_encrypt_data
  1264. E (4778) BT: tlen = 16 p_mac = 0x3ffd5964
  1265. E (4788) BT: p_mac[0] = 0x52 p_mac[1] = 0xef p_mac[2] = 0x5e p_mac[3] = 0x49
  1266. E (4788) BT: p_mac[4] = 0x03 p_mac[5] = 0x25 p_mac[6] = 0xc6 p_mac[7] = 0x1b
  1267. E (4798) BT: peer commitment calculation is completed
  1268. E (4808) BT: Commitment check succeeds
  1269. E (4808) BT: main smp_sm_event
  1270. E (4818) BT: SMP Role: Master
  1271. State: [SMP_STATE_SEC_CONN_PHS2_START (11)], Event: [SEC_CONN_PHASE1_CMPLT_EVT (32)]
  1272. E (4828) BT: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_WAIT_DHK_CHECK(12)
  1273. E (4838) BT: smp_calculate_local_dhkey_check
  1274. E (4838) BT: smp_calculate_f5_mackey_and_long_term_key
  1275. E (4848) BT: smp_collect_local_ble_address
  1276. E (4848) BT: btm_bda_to_acl found
  1277. E (4858) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
  1278. E (4858) BT: smp_collect_peer_ble_address
  1279. E (4868) BT: btm_bda_to_acl found
  1280. E (4868) BT: smp_calculate_f5
  1281. E (4878) BT: smp_calculate_f5_key
  1282. E (4878) BT: aes_cipher_msg_auth_code
  1283. E (4878) BT: AES128_CMAC started, allocate buffer size = 32
  1284. E (4888) BT: cmac_generate_subkey
  1285. E (4888) BT: smp_encrypt_data
  1286. E (4898) BT: cmac_subkey_cont
  1287. E (4898) BT: leftshift_onebit
  1288. E (4908) BT: smp_xor_128
  1289. E (4908) BT: leftshift_onebit
  1290. E (4908) BT: cmac_prepare_last_block
  1291. E (4918) BT: flag = 1 round = 2
  1292. E (4918) BT: smp_xor_128
  1293. E (4918) BT: cmac_aes_k_calculate
  1294. E (4928) BT: smp_xor_128
  1295. E (4928) BT: smp_encrypt_data
  1296. E (4938) BT: smp_xor_128
  1297. E (4938) BT: smp_encrypt_data
  1298. E (4938) BT: tlen = 16 p_mac = 0x3ffd58b4
  1299. E (4948) BT: p_mac[0] = 0x53 p_mac[1] = 0xd1 p_mac[2] = 0x42 p_mac[3] = 0xda
  1300. E (4948) BT: p_mac[4] = 0x90 p_mac[5] = 0x8f p_mac[6] = 0x6b p_mac[7] = 0x43
  1301. E (4958) BT: smp_calculate_f5_mackey_or_long_term_key
  1302. E (4968) BT: aes_cipher_msg_auth_code
  1303. E (4968) BT: AES128_CMAC started, allocate buffer size = 64
  1304. E (4978) BT: cmac_generate_subkey
  1305. E (4978) BT: smp_encrypt_data
  1306. E (4988) BT: cmac_subkey_cont
  1307. E (4988) BT: leftshift_onebit
  1308. E (4988) BT: leftshift_onebit
  1309. E (4998) BT: cmac_prepare_last_block
  1310. E (4998) BT: flag = 0 round = 4
  1311. E (5008) BT: smp_xor_128
  1312. E (5008) BT: cmac_aes_k_calculate
  1313. E (5008) BT: smp_xor_128
  1314. E (5018) BT: smp_encrypt_data
  1315. E (5018) BT: smp_xor_128
  1316. E (5018) BT: smp_encrypt_data
  1317. E (5028) BT: smp_xor_128
  1318. E (5028) BT: smp_encrypt_data
  1319. E (5038) BT: smp_xor_128
  1320. E (5038) BT: smp_encrypt_data
  1321. E (5038) BT: tlen = 16 p_mac = 0x3ffd5894
  1322. E (5048) BT: p_mac[0] = 0x24 p_mac[1] = 0xef p_mac[2] = 0x08 p_mac[3] = 0x48
  1323. E (5048) BT: p_mac[4] = 0xd3 p_mac[5] = 0x0f p_mac[6] = 0x25 p_mac[7] = 0x16
  1324. E (5058) BT: smp_calculate_f5_mackey_or_long_term_key
  1325. E (5068) BT: aes_cipher_msg_auth_code
  1326. E (5068) BT: AES128_CMAC started, allocate buffer size = 64
  1327. E (5078) BT: cmac_generate_subkey
  1328. E (5078) BT: smp_encrypt_data
  1329. E (5088) BT: cmac_subkey_cont
  1330. E (5088) BT: leftshift_onebit
  1331. E (5088) BT: leftshift_onebit
  1332. E (5098) BT: cmac_prepare_last_block
  1333. E (5098) BT: flag = 0 round = 4
  1334. E (5108) BT: smp_xor_128
  1335. E (5108) BT: cmac_aes_k_calculate
  1336. E (5108) BT: smp_xor_128
  1337. E (5118) BT: smp_encrypt_data
  1338. E (5118) BT: smp_xor_128
  1339. E (5118) BT: smp_encrypt_data
  1340. E (5128) BT: smp_xor_128
  1341. E (5128) BT: smp_encrypt_data
  1342. E (5138) BT: smp_xor_128
  1343. E (5138) BT: smp_encrypt_data
  1344. E (5138) BT: tlen = 16 p_mac = 0x3ffd5894
  1345. E (5148) BT: p_mac[0] = 0x11 p_mac[1] = 0x61 p_mac[2] = 0x6d p_mac[3] = 0x56
  1346. E (5148) BT: p_mac[4] = 0xb0 p_mac[5] = 0x65 p_mac[6] = 0x10 p_mac[7] = 0xc2
  1347. E (5158) BT: smp_calculate_f5_mackey_and_long_term_key is completed
  1348. E (5168) BT: smp_collect_local_io_capabilities
  1349. E (5168) BT: smp_collect_local_ble_address
  1350. E (5178) BT: btm_bda_to_acl found
  1351. E (5178) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
  1352. E (5188) BT: smp_collect_peer_ble_address
  1353. E (5198) BT: btm_bda_to_acl found
  1354. E (5198) BT: smp_calculate_f6
  1355. E (5198) BT: aes_cipher_msg_auth_code
  1356. E (5208) BT: AES128_CMAC started, allocate buffer size = 80
  1357. E (5208) BT: cmac_generate_subkey
  1358. E (5218) BT: smp_encrypt_data
  1359. E (5218) BT: cmac_subkey_cont
  1360. E (5228) BT: leftshift_onebit
  1361. E (5228) BT: leftshift_onebit
  1362. E (5228) BT: cmac_prepare_last_block
  1363. E (5238) BT: flag = 0 round = 5
  1364. E (5238) BT: smp_xor_128
  1365. E (5238) BT: cmac_aes_k_calculate
  1366. E (5248) BT: smp_xor_128
  1367. E (5248) BT: smp_encrypt_data
  1368. E (5258) BT: smp_xor_128
  1369. E (5258) BT: smp_encrypt_data
  1370. E (5258) BT: smp_xor_128
  1371. E (5268) BT: smp_encrypt_data
  1372. E (5268) BT: smp_xor_128
  1373. E (5268) BT: smp_encrypt_data
  1374. E (5278) BT: smp_xor_128
  1375. E (5278) BT: smp_encrypt_data
  1376. E (5278) BT: tlen = 16 p_mac = 0x3ffd5914
  1377. E (5288) BT: p_mac[0] = 0xe9 p_mac[1] = 0x76 p_mac[2] = 0xfe p_mac[3] = 0x83
  1378. E (5298) BT: p_mac[4] = 0xfe p_mac[5] = 0xde p_mac[6] = 0xad p_mac[7] = 0x7b
  1379. E (5298) BT: local DHKey check calculation is completed
  1380. E (5308) BT: smp_send_dhkey_check
  1381. E (5308) BT: smp_send_cmd on l2cap cmd_code=0xd
  1382. E (5318) BT: smp_build_pair_dhkey_check_cmd
  1383. E (5318) BT: smp_send_msg_to_L2CAP
  1384. E (5328) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
  1385. E (5338) BT: l2c_link_check_send_pkts
  1386. E (5338) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1387. E (5348) BT: l2c_link_send_to_lower
  1388. E (5348) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1389. E (5358) BT: result state = SMP_STATE_WAIT_DHK_CHECK
  1390. E (5358) BT: smp_process_peer_nonce end
  1391.  
  1392. E (5368) BT: result state = SMP_STATE_WAIT_DHK_CHECK
  1393. E (5378) BT: l2c_link_check_send_pkts
  1394. E (5378) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1395. E (5388) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1396. E (5388) BT: btm_bda_to_acl found
  1397. E (5398) BT: L2CAP - rcv_cid CID: 0x0004
  1398. E (5398) BT: gatt_get_ch_state: ch_state=4
  1399. E (5408) BT: gatt_process_error_rsp
  1400. E (5408) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1401. E (5418) BT: Discovery completed
  1402. E (5418) BT: gatt_end_operation status=0 op=1 subtype=3
  1403. E (5428) BT: GATTC_Discover conn_id=1 disc_type=4
  1404. E (5428) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1405. E (5438) BT: l2c_link_check_send_pkts
  1406. E (5438) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1407. E (5448) BT: l2c_link_send_to_lower
  1408. E (5458) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1409. E (5458) BT: l2c_link_check_send_pkts
  1410. E (5468) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1411. E (5468) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1412. E (5478) BT: btm_bda_to_acl found
  1413. E (5478) BT: L2CAP - rcv_cid CID: 0x0006
  1414. E (5488) BT:
  1415. SMDBG l2c smp_data_received
  1416. E (5488) BT: main smp_sm_event
  1417. E (5498) BT: SMP Role: Master
  1418. State: [SMP_STATE_WAIT_DHK_CHECK (12)], Event: [PAIR_DHKEY_CHECK_EVT (13)]
  1419. E (5508) BT: State change: SMP_STATE_WAIT_DHK_CHECK(12) ==> SMP_STATE_DHK_CHECK(13)
  1420. E (5518) BT: smp_process_dhkey_check
  1421. E (5518) BT: smp_command_has_invalid_parameters for cmd code 0x0d
  1422. E (5528) BT: smp_command_has_valid_fixed_length for cmd code 0x0d
  1423. E (5528) BT: smp_calculate_peer_dhkey_check
  1424. E (5538) BT: smp_collect_peer_io_capabilities
  1425. E (5538) BT: smp_collect_local_ble_address
  1426. E (5548) BT: btm_bda_to_acl found
  1427. E (5548) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
  1428. E (5558) BT: smp_collect_peer_ble_address
  1429. E (5568) BT: btm_bda_to_acl found
  1430. E (5568) BT: smp_calculate_f6
  1431. E (5568) BT: aes_cipher_msg_auth_code
  1432. E (5578) BT: AES128_CMAC started, allocate buffer size = 80
  1433. E (5578) BT: cmac_generate_subkey
  1434. E (5588) BT: smp_encrypt_data
  1435. E (5588) BT: cmac_subkey_cont
  1436. E (5598) BT: leftshift_onebit
  1437. E (5598) BT: leftshift_onebit
  1438. E (5598) BT: cmac_prepare_last_block
  1439. E (5608) BT: flag = 0 round = 5
  1440. E (5608) BT: smp_xor_128
  1441. E (5608) BT: cmac_aes_k_calculate
  1442. E (5618) BT: smp_xor_128
  1443. E (5618) BT: smp_encrypt_data
  1444. E (5628) BT: smp_xor_128
  1445. E (5628) BT: smp_encrypt_data
  1446. E (5628) BT: smp_xor_128
  1447. E (5638) BT: smp_encrypt_data
  1448. E (5638) BT: smp_xor_128
  1449. E (5638) BT: smp_encrypt_data
  1450. E (5648) BT: smp_xor_128
  1451. E (5648) BT: smp_encrypt_data
  1452. E (5648) BT: tlen = 16 p_mac = 0x3ffd5974
  1453. E (5658) BT: p_mac[0] = 0xdf p_mac[1] = 0x25 p_mac[2] = 0xdb p_mac[3] = 0xca
  1454. E (5668) BT: p_mac[4] = 0x43 p_mac[5] = 0x8f p_mac[6] = 0xe4 p_mac[7] = 0x5b
  1455. E (5668) BT: peer DHKey check calculation is completed
  1456. E (5678) BT: main smp_sm_event
  1457. E (5678) BT: SMP Role: Master
  1458. State: [SMP_STATE_DHK_CHECK (13)], Event: [SEC_CONN_KEY_READY_EVT (37)]
  1459. E (5688) BT: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_DHK_CHECK(13)
  1460. E (5698) BT: smp_match_dhkey_checks
  1461. E (5708) BT: dhkey chcks match
  1462. E (5708) BT: main smp_sm_event
  1463. E (5708) BT: SMP Role: Master
  1464. State: [SMP_STATE_DHK_CHECK (13)], Event: [ENC_REQ_EVT (24)]
  1465. E (5718) BT: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_ENCRYPTION_PENDING(14)
  1466. E (5728) BT: smp_generate_stk
  1467. E (5738) BT: FOR LE SC LTK IS USED INSTEAD OF STK
  1468. E (5738) BT: smp_process_stk
  1469. E (5738) BT: smp_mask_enc_key
  1470. E (5748) BT: main smp_sm_event
  1471. E (5748) BT: SMP Role: Master
  1472. State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [KEY_READY_EVT (16)]
  1473. E (5758) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
  1474. E (5768) BT: smp_start_enc
  1475. E (5778) BT: btm_ble_start_encrypt
  1476. E (5778) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1477. E (5788) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1478. E (5788) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1479. E (5798) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1480. E (5798) BT: l2c_link_check_send_pkts
  1481. E (5808) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1482. E (5818) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1483. E (5818) BT: btm_bda_to_acl found
  1484. E (5828) BT: L2CAP - rcv_cid CID: 0x0004
  1485. E (5828) BT: gatt_get_ch_state: ch_state=4
  1486. E (5838) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1487. E (5838) BT: l2c_link_check_send_pkts
  1488. E (5848) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1489. E (5848) BT: l2c_link_send_to_lower
  1490. E (5858) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1491. E (5868) BT: btm_acl_encrypt_change handle=0 status=0 encr_enabl=1
  1492. E (5868) BT: btm_handle_to_acl_index
  1493. E (5878) BT: btm_handle_to_acl_index
  1494. E (5878) BT: Security Manager: encrypt_change status:0 State:1, encr_enable = 1
  1495. E (5888) BT: before update p_dev_rec->sec_flags=0x1080
  1496. E (5898) BT: after update p_dev_rec->sec_flags=0x1680
  1497. E (5898) BT: btm_ble_link_encrypted encr_enable=1
  1498. E (5908) BT: smp_link_encrypted encr_enable=1
  1499. E (5908) BT: btm_ble_update_sec_key_size enc_key_size = 16
  1500. E (5918) BT: main smp_sm_event
  1501. E (5918) BT: SMP Role: Master
  1502. State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [ENCRYPTED_EVT (17)]
  1503. E (5928) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
  1504. E (5938) BT: smp_check_auth_req rcvs enc_enable=1 i_keys=0x3 r_keys=0x7 (i-initiator r-responder)
  1505. E (5948) BT: smp_check_auth_req rcvs upgrades: i_keys=0x3 r_keys=0x6 (i-initiator r-responder)
  1506. E (5958) BT: main smp_sm_event
  1507. E (5958) BT: SMP Role: Master
  1508. State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [BOND_REQ_EVT (25)]
  1509. E (5968) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_BOND_PENDING(15)
  1510. E (5978) BT:
  1511. smp_key_distribution role=0 (0-master) r_keys=0x6 i_keys=0x3
  1512. E (5988) BT: result state = SMP_STATE_BOND_PENDING
  1513. E (5998) BT: result state = SMP_STATE_BOND_PENDING
  1514. E (5998) BT: p_dev_rec->sec_flags=0x1680
  1515. E (6008) BT: bta_gattc_enc_cmpl_cback: cif = 1
  1516. E (6008) BT: btm_bda_to_acl found
  1517. E (6018) BT: L2CAP - rcv_cid CID: 0x0006
  1518. E (6018) BT:
  1519. SMDBG l2c smp_data_received
  1520. E (6028) BT: main smp_sm_event
  1521. E (6028) BT: SMP Role: Master
  1522. State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_INFO_EVT (8)]
  1523. E (6038) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
  1524. E (6048) BT: smp_proc_id_info
  1525. E (6048) BT: smp_key_distribution_by_transport
  1526. E (6058) BT:
  1527. smp_key_distribution role=0 (0-master) r_keys=0x6 i_keys=0x3
  1528. E (6068) BT: result state = SMP_STATE_BOND_PENDING
  1529. E (6068) BT: btm_bda_to_acl found
  1530. E (6068) BT: L2CAP - rcv_cid CID: 0x0006
  1531. E (6078) BT:
  1532. SMDBG l2c smp_data_received
  1533. E (6078) BT: main smp_sm_event
  1534. E (6088) BT: SMP Role: Master
  1535. State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_ADDR_EVT (9)]
  1536. E (6098) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
  1537. E (6108) BT: smp_proc_id_addr
  1538. E (6108) BT: smp_update_key_mask before update role=0 recv=1 local_i_key = 03, local_r_key = 06
  1539. E (6118) BT: updated local_i_key = 03, local_r_key = 04
  1540. E (6128) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=1
  1541. E (6128) BT: bd_addr:67-89-c2-b0-71-c6
  1542. E (6138) BT: BTM_LE_KEY_PID key_type=0x2 save peer IRK
  1543. E (6138) BT: btm_consolidate_dev
  1544. E (6148) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1545. E (6158) BT: smp_key_distribution_by_transport
  1546. E (6158) BT:
  1547. smp_key_distribution role=0 (0-master) r_keys=0x4 i_keys=0x3
  1548. E (6168) BT: result state = SMP_STATE_BOND_PENDING
  1549. E (6168) BT: btm_bda_to_acl found
  1550. E (6178) BT: L2CAP - rcv_cid CID: 0x0006
  1551. E (6178) BT:
  1552. SMDBG l2c smp_data_received
  1553. I (6188) GAPCallback: key type = ESP_LE_KEY_PID
  1554. E (6188) BT: main smp_sm_event
  1555. E (6198) BT: SMP Role: Master
  1556. State: [SMP_STATE_BOND_PENDING (15)], Event: [SIGN_INFO_EVT (10)]
  1557. E (6208) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
  1558. E (6208) BT: smp_proc_srk_info
  1559. E (6218) BT: smp_update_key_mask before update role=0 recv=1 local_i_key = 03, local_r_key = 04
  1560. E (6228) BT: updated local_i_key = 03, local_r_key = 00
  1561. E (6228) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=1
  1562. E (6238) BT: bd_addr:67-89-c2-b0-71-c6
  1563. E (6248) BT: BTM_LE_KEY_PCSRK key_type=0x6 sec_flags=0x1680 sec_level=0x1 peer_counter=0
  1564. E (6248) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1565. E (6258) BT: smp_key_distribution_by_transport
  1566. E (6268) BT:
  1567. smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x3
  1568. E (6278) BT: smp_key_pick_key key_to_dist=0x3
  1569. E (6278) BT: key to send = 03, i = 0
  1570. E (6288) BT: smp_distribute_act[0]
  1571. E (6288) BT: smp_generate_ltk
  1572. E (6288) BT: smp_process_secure_connection_long_term_key
  1573. E (6298) BT: smp_save_secure_connections_long_term_key-Save LTK as local LTK key
  1574. E (6308) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=1
  1575. E (6308) BT: bd_addr:67-89-c2-b0-71-c6
  1576. E (6318) BT: BTM_LE_KEY_LENC key_type=0x16 DIV=0x0 key_size=0x10 sec_level=0x1
  1577. E (6328) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1578. E (6338) BT: smp_save_secure_connections_long_term_key-Save LTK as peer LTK key
  1579. E (6338) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=1
  1580. E (6348) BT: bd_addr:67-89-c2-b0-71-c6
  1581. E (6348) BT: BTM_LE_KEY_PENC key_type=0x17 sec_flags=0x1680 sec_leve=0x1
  1582. E (6358) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1583. E (6368) BT: smp_update_key_mask before update role=0 recv=0 local_i_key = 03, local_r_key = 00
  1584. E (6378) BT: updated local_i_key = 02, local_r_key = 00
  1585. E (6388) BT:
  1586. smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x2
  1587. E (6388) BT: smp_key_pick_key key_to_dist=0x2
  1588. E (6398) BT: key to send = 02, i = 0
  1589. E (6398) BT: key to send = 02, i = 1
  1590. E (6408) BT: smp_distribute_act[1]
  1591. E (6408) BT: smp_send_id_info
  1592. E (6418) BT: smp_update_key_mask before update role=0 recv=0 local_i_key = 02, local_r_key = 00
  1593. E (6428) BT: updated local_i_key = 00, local_r_key = 00
  1594. E (6428) BT: smp_send_cmd on l2cap cmd_code=0x8
  1595. E (6438) BT: smp_build_identity_info_cmd
  1596. E (6438) BT: BTM_GetDeviceIDRoot
  1597. E (6448) BT: smp_send_msg_to_L2CAP
  1598. E (6448) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
  1599. E (6458) BT: l2c_link_check_send_pkts
  1600. E (6458) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1601. E (6468) BT: l2c_link_send_to_lower
  1602. E (6468) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1603. I (6478) GAPCallback: key type = ESP_LE_KEY_PCSRK
  1604. I (6478) GAPCallback: key type = ESP_LE_KEY_LENC
  1605. I (6488) GAPCallback: key type = ESP_LE_KEY_PENC
  1606. E (6498) BT: smp_send_cmd on l2cap cmd_code=0x9
  1607. E (6498) BT: smp_build_id_addr_cmd
  1608. E (6508) BT: smp_send_msg_to_L2CAP
  1609. E (6508) BT: L2CA_SendFixedChnlData() CID: 0x0006 BDA: 6789c2b071c6
  1610. E (6518) BT: l2c_link_check_send_pkts
  1611. E (6518) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1612. E (6528) BT: l2c_link_send_to_lower
  1613. E (6528) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
  1614. E (6538) BT: btm_sec_save_le_key key_type=0x20 pass_to_application=1
  1615. E (6548) BT: bd_addr:67-89-c2-b0-71-c6
  1616. E (6548) BT: BLE key type 0x20 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1617. E (6558) BT: smp_key_distribution_by_transport
  1618. E (6558) BT:
  1619. smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x0
  1620. E (6568) BT: smp_key_pick_key key_to_dist=0x0
  1621. E (6578) BT: key to send = 00, i = 0
  1622. E (6578) BT: key to send = 00, i = 1
  1623. E (6588) BT: key to send = 00, i = 2
  1624. E (6588) BT: key to send = 00, i = 3
  1625. E (6588) BT: main smp_sm_event
  1626. E (6598) BT: SMP Role: Master
  1627. State: [SMP_STATE_BOND_PENDING (15)], Event: [AUTH_CMPL_EVT (23)]
  1628. E (6608) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_IDLE(0)
  1629. E (6618) BT: smp_send_pair_fail status=0 failure=0
  1630. E (6618) BT: smp_proc_pairing_cmpl
  1631. E (6628) BT: send SMP_COMPLT_EVT reason=0x0 sec_level=0x1
  1632. E (6628) BT: smp_reset_control_value
  1633. I (6638) GAPCallback: key type = ESP_LE_KEY_LID
  1634. E (6638) BT: smp_remove_fixed_channel
  1635. E (6648) BT: L2CA_RemoveFixedChnl() CID: 0x0006 BDA: 6789c2b071c6
  1636. E (6648) BT: l2cu_release_ccb: cid 0x0006 in_use: 1
  1637. E (6658) BT: smp_cb_cleanup
  1638. E (6658) BT: btm_proc_smp_cback event = 7
  1639. 0x40101090: bta_dm_ble_smp_cback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/bta/dm/bta_dm_act.c:4189
  1640. E (6668) BT: btm_cb.api.p_le_callback=0x40101090
  1641. E (6668) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  1642. E (6678) BT: btm_find_dev_type - device_type = 2 addr_type = 0
  1643. E (6678) BT: evt=SMP_COMPLT_EVT before update sec_level=0x1 sec_flags=0x1680
  1644. E (6688) BT: after update result=0 sec_level=0x1 sec_flags=0x1680
  1645. E (6698) BT: btm_cb pairing_state=0 pairing_flags=80 pin_code_len=0
  1646. E (6708) BT: btm_cb.pairing_bda 67:89:c2:b0:71:c6
  1647. E (6708) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 2
  1648. E (6718) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 2
  1649. E (6728) BT: btm_ble_suspend_bg_conn
  1650. E (6728) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
  1651. E (6738) BT: btm_ble_suspend_bg_conn
  1652. E (6748) BT: btm_bda_to_acl found
  1653. E (6748) BT: Security Manager: BTM_SetEncryption already encrypted
  1654. 0x40137024: btc_set_encryption_callback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/btc/profile/std/gap/btc_gap_ble.c:722
  1655. E (6758) BT: bta_dm_encrypt_cback status =0 p_callback=0x40137024
  1656. E (6758) BT: result state = SMP_STATE_IDLE
  1657. E (6768) BT: result state = SMP_STATE_IDLE
  1658. E (6768) BT: l2c_link_check_send_pkts
  1659. E (6778) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1660. E (6778) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
  1661. E (6788) BT: btm_bda_to_acl found
  1662. E (6798) BT: L2CAP - rcv_cid CID: 0x0004
  1663. E (6798) BT: gatt_get_ch_state: ch_state=4
  1664. I (6858) GAPCallback: remote BD_ADDR: 6789c2b071c6
  1665. I (6858) GAPCallback: address type = 0
  1666. I (6858) GAPCallback: pair status = success
  1667. E (6868) BT: gatt_process_error_rsp
  1668. E (6868) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1669. E (6878) BT: Discovery completed
  1670. E (6878) BT: gatt_end_operation status=0 op=1 subtype=4
  1671. E (6888) BT: starting discover characteristics descriptor
  1672. E (6888) BT: GATTC_Discover conn_id=1 disc_type=5
  1673. E (6898) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1674. E (6908) BT: l2c_link_check_send_pkts
  1675. E (6908) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1676. E (6918) BT: l2c_link_send_to_lower
  1677. E (6918) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
  1678. E (6928) BT: BTA got event 0x1f18
  1679. E (6928) BT: l2c_link_check_send_pkts
  1680. E (6938) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1681. E (6938) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
  1682. E (6948) BT: l2c_link_check_send_pkts
  1683. E (6948) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1684. E (6958) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1685. E (6968) BT: btm_bda_to_acl found
  1686. E (6968) BT: L2CAP - rcv_cid CID: 0x0005
  1687. E (6978) BT: l2c_link_check_send_pkts
  1688. E (6978) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1689. E (6988) BT: l2c_link_send_to_lower
  1690. E (6988) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1691. E (6998) BT: btm_bda_to_acl found
  1692. E (6998) BT: L2CAP - rcv_cid CID: 0x0004
  1693. E (7008) BT: gatt_get_ch_state: ch_state=4
  1694. E (7008) BT: btm_ble_add_resolving_list_entry_complete status = 0
  1695. E (7018) BT: l2c_link_check_send_pkts
  1696. E (7018) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1697. E (7028) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1698. E (7038) BT: btm_bda_to_acl found
  1699. E (7038) BT: L2CAP - rcv_cid CID: 0x0004
  1700. E (7048) BT: gatt_get_ch_state: ch_state=4
  1701. E (7048) BT: gatt_end_operation status=0 op=1 subtype=5
  1702. E (7058) BT: starting discover characteristics descriptor
  1703. E (7058) BT: GATTC_Discover conn_id=1 disc_type=5
  1704. E (7068) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1705. E (7078) BT: l2c_link_check_send_pkts
  1706. E (7078) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1707. E (7088) BT: l2c_link_send_to_lower
  1708. E (7088) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1709. E (7098) BT: l2c_link_check_send_pkts
  1710. E (7098) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1711. E (7108) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1712. E (7118) BT: BLE HCI(id=62) event = 0x03)
  1713. E (7118) BT: l2cble_process_conn_update_evt: conn_update_mask=8
  1714. E (7128) BT: l2c_link_check_send_pkts
  1715. E (7128) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1716. E (7138) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1717. E (7148) BT: btm_bda_to_acl found
  1718. E (7148) BT: L2CAP - rcv_cid CID: 0x0004
  1719. E (7148) BT: gatt_get_ch_state: ch_state=4
  1720. I (7158) GAPCallback: update connection params status = 0, min_int = 12, max_int = 12,conn_int = 12,latency = 0, timeout = 600
  1721. E (7168) BT: gatt_end_operation status=0 op=1 subtype=5
  1722. E (7178) BT: starting discover characteristics descriptor
  1723. E (7178) BT: GATTC_Discover conn_id=1 disc_type=5
  1724. E (7188) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1725. E (7198) BT: l2c_link_check_send_pkts
  1726. E (7198) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1727. E (7208) BT: l2c_link_send_to_lower
  1728. E (7208) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1729. E (7218) BT: l2c_link_check_send_pkts
  1730. E (7218) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1731. E (7228) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1732. E (7238) BT: btm_bda_to_acl found
  1733. E (7238) BT: L2CAP - rcv_cid CID: 0x0004
  1734. E (7238) BT: gatt_get_ch_state: ch_state=4
  1735. E (7248) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1736. E (7258) BT: l2c_link_check_send_pkts
  1737. E (7258) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1738. E (7268) BT: l2c_link_send_to_lower
  1739. E (7268) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1740. E (7278) BT: l2c_link_check_send_pkts
  1741. E (7278) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1742. E (7288) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1743. E (7298) BT: btm_bda_to_acl found
  1744. E (7298) BT: L2CAP - rcv_cid CID: 0x0004
  1745. E (7308) BT: gatt_get_ch_state: ch_state=4
  1746. E (7308) BT: gatt_process_error_rsp
  1747. E (7318) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
  1748. E (7318) BT: Discovery completed
  1749. E (7328) BT: gatt_end_operation status=0 op=1 subtype=5
  1750. E (7328) BT: Start service discovery: srvc_idx = 3
  1751. E (7338) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 1 current upd state 0x08
  1752. E (7348) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  1753. E (7638) BT: bta_gattc_disc_cmpl conn_id=1, status = 0
  1754. E (7638) BT: +++++++++++++++++++++++++++++++++++++++++++++++++++++++= 0x3ffcaac4
  1755. E (7638) BT: GATTC_ConfigureMTU conn_id=1 mtu=200
  1756. E (7638) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1757. E (7648) BT: l2c_link_check_send_pkts
  1758. E (7658) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1759. E (7658) BT: l2c_link_send_to_lower
  1760. E (7668) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1761. E (7678) BT: l2c_link_check_send_pkts
  1762. E (7678) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1763. E (7688) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1764. E (7688) BT: btm_bda_to_acl found
  1765. E (7698) BT: L2CAP - rcv_cid CID: 0x0004
  1766. E (7698) BT: gatt_get_ch_state: ch_state=4
  1767. E (7708) BT: l2cble_set_fixed_channel_tx_data_length TX MTU = 200
  1768. E (7708) BT: l2cble_update_data_length
  1769. E (7718) BT: btm_bda_to_acl found
  1770. E (7718) BT: BTM_SetBleDataLength: tx_pdu_length =204
  1771. E (7728) BT: gatt_end_operation status=0 op=5 subtype=0
  1772. E (7728) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 5 status = 0
  1773. E (7738) BT: BTA got event 0x1f10
  1774. E (7738) BT: bta_gattc_op_cmpl op = 5
  1775. W (7748) GATTCallback: GATT CALLBACK: 18
  1776. I (7748) GATTCallback: ESP_GATTC_CFG_MTU_EVT status 0 mtu 200, conn_id 0
  1777. E (7748) BT: BLE HCI(id=62) event = 0x07)
  1778. E (7768) BT: l2cble_process_data_length_change_event TX data len = 204
  1779. E (7768) BT: btm_handle_to_acl_index
  1780. E (7778) BT: BTA got event 0x1f09
  1781. E (7778) BT: bta_gattc_search conn_id=1
  1782. W (7788) GATTCallback: GATT CALLBACK: 7
  1783. I (7788) GATTCallback: SEARCH_RES_EVT ff, conn_id: 0
  1784. W (7798) GATTCallback: GATT CALLBACK: 6
  1785. I (7798) GATTCallback: SEARCH_CMPL_EVT
  1786. E (17798) BT: BTA got event 0x1f04
  1787. E (17798) BT: GATTC_Read conn_id=1 type=2
  1788. E (17798) BT: btm_ble_link_sec_check auth_req =0x3
  1789. E (17798) BT: dev_rec sec_flags=0x1680
  1790. E (17798) BT: cur_sec_level=4 req_sec_level=1 sec_req_act=1
  1791. E (17808) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1792. E (17818) BT: l2c_link_check_send_pkts
  1793. E (17818) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1794. E (17828) BT: l2c_link_send_to_lower
  1795. E (17828) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1796. E (17838) BT: l2c_link_check_send_pkts
  1797. E (17838) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1798. E (17848) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1799. E (17858) BT: btm_bda_to_acl found
  1800. E (17858) BT: L2CAP - rcv_cid CID: 0x0004
  1801. E (17868) BT: gatt_get_ch_state: ch_state=4
  1802. E (17868) BT: gatt_process_error_rsp
  1803. E (17878) BT: gatt_end_operation status=1 op=2 subtype=2
  1804. E (17878) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 2 status = 1
  1805. E (17888) BT: BTA got event 0x1f10
  1806. E (17888) BT: bta_gattc_op_cmpl op = 2
  1807. W (17898) GATTCallback: GATT CALLBACK: 3
  1808. E (17898) GATTCallback: read_char called with status 0x1
  1809. E (27908) BT: BTA got event 0x1f04
  1810. E (27908) BT: GATTC_Read conn_id=1 type=2
  1811. E (27908) BT: btm_ble_link_sec_check auth_req =0x3
  1812. E (27908) BT: dev_rec sec_flags=0x1680
  1813. E (27908) BT: cur_sec_level=4 req_sec_level=1 sec_req_act=1
  1814. E (27918) BT: L2CA_SendFixedChnlData() CID: 0x0004 BDA: 6789c2b071c6
  1815. E (27928) BT: l2c_link_check_send_pkts
  1816. E (27928) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1817. E (27938) BT: l2c_link_send_to_lower
  1818. E (27938) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1819. E (27948) BT: l2c_link_check_send_pkts
  1820. E (27948) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1821. E (27958) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1822. E (27968) BT: btm_bda_to_acl found
  1823. E (27968) BT: L2CAP - rcv_cid CID: 0x0004
  1824. E (27978) BT: gatt_get_ch_state: ch_state=4
  1825. E (27978) BT: gatt_process_error_rsp
  1826. E (27988) BT: gatt_end_operation status=1 op=2 subtype=2
  1827. E (27988) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 2 status = 1
  1828. E (27998) BT: BTA got event 0x1f10
  1829. E (27998) BT: bta_gattc_op_cmpl op = 2
  1830. W (28008) GATTCallback: GATT CALLBACK: 3
  1831. E (28008) GATTCallback: read_char called with status 0x1
  1832. E (36578) BT: l2cu_release_ccb: cid 0x0004 in_use: 1
  1833. E (36578) BT: GATT ATT protocol channel with BDA: 6789c2b071c6 is disconnected
  1834. E (36588) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
  1835. E (36588) BT: bda is in the srv chg clt list
  1836. E (36598) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  1837. E (36598) BT: gatt_add_srv_chg_clt
  1838. E (36608) BT: enqueue a srv chg client
  1839. E (36608) BT: gatt_cleanup_upon_disc
  1840. E (36618) BT: found p_tcb
  1841. E (36618) BT: gatt_set_ch_state: old=4 new=0
  1842. E (36628) BT: gatt_free_pending_ind
  1843. E (36628) BT: gatt_free_pending_enc_queue
  1844. E (36628) BT: gatt_free_pending_prepare_write_queue
  1845. E (36638) BT: found p_reg tcb_idx=0 gatt_if=1 conn_id=0x1
  1846. E (36648) BT: bta_gattc_conn_cback() - cif=1 connected=0 conn_id=1 reason=0x0013
  1847. E (36648) BT: ATT disconnected
  1848. E (36658) BT: SMDBG l2c smp_connect_callback
  1849. E (36658) BT: btm_acl_removed
  1850. E (36668) BT: btm_bda_to_acl found
  1851. E (36668) BT: btm_acl_report_role_change
  1852. E (36678) BT: btm_acl_update_busy_level
  1853. E (36678) BT: BTM_BLI_ACL_DOWN_EVT
  1854. E (36688) BT: acl hci_handle=0 transport=2 connectable_mode=0x0 link_role=0
  1855. E (36688) BT: before update p_dev_rec->sec_flags=0x1680
  1856. E (36698) BT: LE link down
  1857. E (36698) BT: Bonded
  1858. E (36708) BT: after update p_dev_rec->sec_flags=0x1280
  1859. E (36708) BT: btm_acl_resubmit_page
  1860. E (36718) BT: btm_sec_disconnected sec_req:x0 state:IDLE reason:19 bd_addr:00:ec:0a:47:ba:e3 remote_name:
  1861. E (36728) BT: btm_sec_disconnected before update sec_flags=0x1280
  1862. E (36728) BT: btm_sec_disconnected after update sec_flags=0x1080
  1863. E (36738) BT: BTA got event 0x1f11
  1864. E (36738) BT: bta_gattc_close conn_id=1
  1865. E (36748) BT: BTA got event 0x104
  1866. E (36748) BT: bta_dm_sm_execute event:0x4
  1867. E (36758) BT: btm_get_acl_disc_reason_code
  1868. E (36758) BT: L2CA_SetDesireRole() new:x1, disallow_switch:0
  1869. E (36768) BT: BTA got event 0x104
  1870. E (36768) BT: bta_dm_sm_execute event:0x4
  1871. W (38018) GATTCallback: GATT CALLBACK: 41
  1872. I (38018) GATTCallback: ESP_GATTC_DISCONNECT_EVT, status = 0
  1873. W (38018) GATTC: Unregister -> esp_ble_gattc_app_unregister: 0
  1874. W (38018) GATTCallback: GATT CALLBACK: 5
  1875. E (38028) BT: BTA got event 0x1f04
  1876. E (38028) BT: Ignore unknown conn ID: 1
  1877. E (38038) BT: BTA got event 0x1f14
  1878. E (38038) BT: bta_gattc_deregister Deregister Failedm unknown client cif
Advertisement
Add Comment
Please, Sign In to add comment