G2A Many GEOs
SHARE
TWEET

BT_TRACE_LEVEL_VERBOSE gattc cannot get characteristic

a guest Oct 31st, 2017 383 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. I (298) GATTC: Start
  2. 0x4000d890: ?? ??:0
  3. D (308) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
  4. D (308) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
  5. D (318) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
  6. D (328) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
  7. D (328) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
  8. D (338) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
  9. D (338) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
  10. D (348) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
  11. I (358) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE
  12. D (518) phy_init: loading PHY init data from partition at offset 0xf000
  13. D (518) phy_init: PHY data partition validated
  14. I (538) phy: phy_version: 362.0, 61e8d92, Sep  8 2017, 18:48:11, 0, 0
  15. E (538) BT: btm_acl_init
  16. E (538) BT: L2CA_RegisterFixedChannel()  CID: 0x0004, 0x3ffd5b40
  17. E (538) BT: btm_sec_set_security_level : sec: 0x0
  18. E (548) BT: BTM_SEC_REG[0]: id 50, is_orig 1, psm 0x001f, proto_id 0, chan_id 0
  19. E (558) BT:                : sec: 0x80, service name [] (up to 21 chars saved)
  20. E (558) BT: btm_sec_set_security_level : sec: 0x0
  21. E (568) BT: BTM_SEC_REG[0]: id 50, is_orig 0, psm 0x001f, proto_id 0, chan_id 0
  22. E (578) BT:                : sec: 0x80, service name [] (up to 21 chars saved)
  23. E (588) BT: SMP_Init
  24. E (588) BT: SMDBG l2c smp_l2cap_if_init
  25. E (588) BT: L2CA_RegisterFixedChannel()  CID: 0x0006, 0x3ffd5b20
  26. E (598) BT: btm_ble_init
  27. E (608) BT: BTA got event 0x100
  28. E (608) BT: bta_dm_sm_execute event:0x0
  29. E (608) BT: BTA got event 0x0
  30. E (608) BT: bta_sys_sm_execute state:0, event:0x0
  31. E (618) BT: bta_sys_hw_api_enable for 0, active modules 0x0001
  32. E (628) BT: BTA got event 0x1
  33. E (628) BT: bta_sys_sm_execute state:1, event:0x1
  34. E (638) BT: bta_sys_hw_evt_enabled for 0
  35. E (638) BT: btm_acl_device_down
  36. E (648) BT: BTM Register For VSEvents is successfully
  37. E (648) BT: btm_ble_resolving_list_init max_irk_list_sz = 3
  38. E (658) BT: btm_ble_white_list_init white_list_size = 12
  39. E (658) BT: #####################################num_lm_ble_bufs = 10
  40. E (668) BT: BTM_SetPinType: pin type 0 [variable-0, fixed-1], code , length 0
  41. E (678) BT: btm_decode_ext_features_page page: 0
  42. E (678) BT: Local supported ACL packet types: 0xcc18
  43. E (688) BT: Local supported SCO packet types: 0x003d
  44. E (688) BT: btm_sec_set_security_level : sec: 0x0
  45. E (698) BT: BTM_SEC_REG[1]: id 42, is_orig 0, psm 0x0003, proto_id 3, chan_id 0
  46. E (708) BT:                : sec: 0x80, service name [RFC_MUX
  47. ] (up to 21 chars saved)
  48. E (718) BT: btm_sec_dev_reset sec mode: 4
  49. E (718) BT: BTM_SetInquiryMode
  50. E (728) BT: BTM_SetPageScanType
  51. E (728) BT: BTM_SetInquiryScanType
  52. E (728) BT: btm_decode_ext_features_page page: 1
  53. E (738) BT: btm_decode_ext_features_page page: 2
  54. E (738) BT:  bta_sys_hw_btm_cback was called with parameter: 0
  55. E (748) BT: BTA got event 0x2
  56. E (758) BT: bta_sys_sm_execute state:1, event:0x2
  57. E (758) BT:  bta_sys_hw_evt_stack_enabled!notify the callers
  58. E (768) BT: bta_dm_sys_hw_cback with event: 1
  59. E (768) BT: BTM_BleLoadLocalKeys
  60. E (778) BT: BTM_BleLoadLocalKeys
  61. E (778) BT: BTM_SecRegister application registered
  62. E (788) BT: BTM_SecRegister SMP_Register( btm_proc_smp_cback )
  63. E (788) BT: SMP_Register state=0
  64. E (798) BT: BTM_SecRegister application registered
  65. E (798) BT: BTM_SetDefaultLinkSuperTout
  66. E (808) BT: BTM: BTM_WritePageTimeout: Timeout: 8192.
  67. E (808) BT: BTM_SetDefaultLinkPolicy setting:0x000f
  68. E (818) BT: BTM_SetDefaultLinkPolicy hold not supported (settings: 0x000d)
  69. E (828) BT: BTM_SetDefaultLinkPolicy park not supported (settings: 0x0005)
  70. E (828) BT: Set DefaultLinkPolicy:0x0005
  71. E (838) BT: BTM_RegBusyLevelNotif
  72. E (848) BT: btm_ble_clear_resolving_list_complete status=0
  73. E (848) BT: btm_ble_clear_resolving_list_complete resolving_list_avail_size=3
  74. E (858) BT: BTA got event 0x110
  75. E (858) BT: bta_dm_sm_execute event:0x10
  76. E (868) BT: BTM_SecAddBleDevice dev_type=0x2
  77. E (868) BT: Add a new device
  78. E (868) BT: allocate a new dev rec idx=0x0
  79. E (878) BT: BTM_GetHCIConnHandle
  80. E (878) BT: BTM_GetHCIConnHandle
  81. E (888) BT: hci_handl=0xffff
  82. E (888) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  83. E (898) BT: BTA got event 0x10f
  84. E (898) BT: bta_dm_sm_execute event:0xf
  85. E (898) BT: BTM_SecAddBleKey
  86. E (908) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x01
  87. E (908) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=0
  88. E (918) BT: bd_addr:67-89-c2-b0-71-c6
  89. E (928) BT: BTM_LE_KEY_PENC key_type=0x1 sec_flags=0x1080 sec_leve=0x1
  90. E (928) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  91. E (938) BT: BTA got event 0x10f
  92. E (938) BT: bta_dm_sm_execute event:0xf
  93. E (948) BT: BTM_SecAddBleKey
  94. E (948) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x02
  95. E (958) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=0
  96. E (968) BT: bd_addr:67-89-c2-b0-71-c6
  97. E (968) BT: BTM_LE_KEY_PID key_type=0x3 save peer IRK
  98. E (978) BT: btm_consolidate_dev
  99. E (978) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  100. E (988) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  101. E (998) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  102. E (998) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
  103. E (1008) BT: btm_ble_suspend_bg_conn
  104. E (1018) BT: btm_ble_add_resolving_list_entry_complete status = 0
  105. E (1018) BT: BTA got event 0x10f
  106. E (1028) BT: bta_dm_sm_execute event:0xf
  107. E (1028) BT: BTM_SecAddBleKey
  108. E (1038) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x04
  109. E (1038) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=0
  110. E (1048) BT: bd_addr:67-89-c2-b0-71-c6
  111. E (1048) BT: BTM_LE_KEY_PCSRK key_type=0x7 sec_flags=0x1080 sec_level=0x1 peer_counter=0
  112. E (1058) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  113. E (1068) BT: BTA got event 0x10f
  114. E (1078) BT: bta_dm_sm_execute event:0xf
  115. E (1078) BT: BTM_SecAddBleKey
  116. E (1078) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x10
  117. E (1088) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=0
  118. E (1098) BT: bd_addr:67-89-c2-b0-71-c6
  119. E (1098) BT: BTM_LE_KEY_LENC key_type=0x17 DIV=0x0 key_size=0x10 sec_level=0x1
  120. E (1108) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  121. I (1118) GATTC: REGISTER GAP CALLBACK
  122. I (1118) GATTC: REGISTER GATTC CALLBACK
  123. I (1128) GATTC: REGISTER THIS APPLICATION
  124. E (1128) BT: btc_gattc_call_handler()
  125. E (1138) BT: BTA got event 0x1f13
  126. E (1138) BT: bta_gattc_register state 0
  127. E (1138) BT: bta_gattc_enable
  128. E (1148) BT: GATT_Register
  129. E (1148) BT: UUID=[0x0000]
  130. E (1158) BT: allocated gatt_if=1
  131. E (1158) BT: GATTC getbuf sucess.
  132. E (1158) BT: BTA got event 0x1f12
  133. E (1168) BT: GATT_StartIf gatt_if=1
  134. E (1168) BT: gatt_find_the_connected_bda start_idx=0
  135. E (1178) BT: gatt_find_the_connected_bda found=0 found_idx=4
  136. W (1178) GATTCallback: GATT CALLBACK: 0
  137. I (1188) GATTCallback: REG_EVT
  138. E (1188) BT: BTA got event 0x11e
  139. E (1198) BT: bta_dm_sm_execute event:0x1e
  140. E (1198) BT: BTM_BleConfigPrivacy
  141. E (1198) BT: btm_gen_resolvable_private_addr
  142. E (1208) BT: btm_ble_rand_enc_complete
  143. E (1208) BT: btm_gen_resolve_paddr_low
  144. E (1218) BT: smp_encrypt_data
  145. E (1218) BT: btm_gen_resolve_paddr_cmpl
  146. E (1228) BT: BTA got event 0x118
  147. E (1228) BT: bta_dm_sm_execute event:0x18
  148. E (1238) BT: BTM_BleSetScanFilterParams
  149. I (1238) GAPCallback: SCAN PARAMETERS SET; INITIATE A SCAN REQUEST
  150. E (1248) BT: BTA_DmBleScan:start = 1
  151. E (1248) BT: BTA got event 0x11a
  152. E (1258) BT: bta_dm_sm_execute event:0x1a
  153. I (1258) GAPCallback: scan start success
  154. E (1468) BT: BLE HCI(id=62) event = 0x02)
  155. E (1468) BT: btu_ble_process_adv_pkt
  156. E (1468) BT: btm_identity_addr_to_random_pseudo
  157. E (1478) BT: BTM_CheckAdvData type=0x01
  158. E (1478) BT: BTM_CheckAdvData type=0x19
  159. E (1488) BT: BTM_CheckAdvData type=0x03
  160. E (1488) BT: Random address, treating device as LE only
  161. E (1498) BT: BTM_CheckAdvData type=0x01
  162. E (1498) BT: bta_dm_observe_results_cb
  163. E (1508) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  164. E (1508) BT: BLE HCI(id=62) event = 0x02)
  165. E (1518) BT: btu_ble_process_adv_pkt
  166. E (1518) BT: btm_identity_addr_to_random_pseudo
  167. E (1528) BT: BTM_CheckAdvData type=0x01
  168. E (1528) BT: BTM_CheckAdvData type=0x19
  169. E (1528) BT: BTM_CheckAdvData type=0x03
  170. E (1538) BT: Random address, treating device as LE only
  171. E (1538) BT: BTM_CheckAdvData type=0x01
  172. E (1548) BT: bta_dm_observe_results_cb
  173. E (1548) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  174. E (1558) BT: BLE HCI(id=62) event = 0x02)
  175. E (1558) BT: btu_ble_process_adv_pkt
  176. E (1568) BT: btm_identity_addr_to_random_pseudo
  177. E (1568) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false,                              scan_type_active=1
  178. E (1588) BT: BTM_CheckAdvData type=0x01
  179. E (1588) BT: BTM_CheckAdvData type=0x19
  180. E (1588) BT: BTM_CheckAdvData type=0x03
  181. E (1598) BT: BR/EDR NOT support bit not set, treat as DUMO
  182. E (1598) BT: BLE HCI(id=62) event = 0x02)
  183. E (1608) BT: btu_ble_process_adv_pkt
  184. E (1608) BT: btm_identity_addr_to_random_pseudo
  185. E (1618) BT: BTM_CheckAdvData type=0x01
  186. E (1618) BT: BTM_CheckAdvData type=0x19
  187. E (1628) BT: BTM_CheckAdvData type=0x03
  188. E (1628) BT: BR/EDR NOT support bit not set, treat as DUMO
  189. E (1638) BT: BTM_CheckAdvData type=0x01
  190. E (1638) BT: bta_dm_observe_results_cb
  191. E (1648) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  192. E (1648) BT: BLE HCI(id=62) event = 0x02)
  193. E (1658) BT: btu_ble_process_adv_pkt
  194. E (1658) BT: btm_identity_addr_to_random_pseudo
  195. E (1668) BT: BTM_CheckAdvData type=0x01
  196. E (1668) BT: BTM_CheckAdvData type=0x19
  197. E (1678) BT: BTM_CheckAdvData type=0x03
  198. E (1678) BT: Random address, treating device as LE only
  199. E (1688) BT: BTM_CheckAdvData type=0x01
  200. E (1688) BT: bta_dm_observe_results_cb
  201. E (1698) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  202. E (1698) BT: BLE HCI(id=62) event = 0x02)
  203. E (1708) BT: btu_ble_process_adv_pkt
  204. E (1708) BT: btm_identity_addr_to_random_pseudo
  205. E (1718) BT: BTM_CheckAdvData type=0x01
  206. E (1718) BT: BTM_CheckAdvData type=0x19
  207. E (1728) BT: BTM_CheckAdvData type=0x03
  208. E (1728) BT: Random address, treating device as LE only
  209. E (1738) BT: BTM_CheckAdvData type=0x01
  210. E (1738) BT: bta_dm_observe_results_cb
  211. E (1738) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  212. E (1748) BT: BLE HCI(id=62) event = 0x02)
  213. E (1748) BT: btu_ble_process_adv_pkt
  214. E (1758) BT: btm_identity_addr_to_random_pseudo
  215. E (1758) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false,                              scan_type_active=1
  216. E (1778) BT: BTM_CheckAdvData type=0x01
  217. E (1778) BT: BTM_CheckAdvData type=0x19
  218. E (1778) BT: BTM_CheckAdvData type=0x03
  219. E (1788) BT: BR/EDR NOT support bit not set, treat as DUMO
  220. E (1798) BT: BLE HCI(id=62) event = 0x02)
  221. E (1798) BT: btu_ble_process_adv_pkt
  222. E (1798) BT: btm_identity_addr_to_random_pseudo
  223. E (1808) BT: BTM_CheckAdvData type=0x01
  224. E (1808) BT: BTM_CheckAdvData type=0x19
  225. E (1818) BT: BTM_CheckAdvData type=0x03
  226. E (1818) BT: BR/EDR NOT support bit not set, treat as DUMO
  227. E (1828) BT: BTM_CheckAdvData type=0x01
  228. E (1828) BT: bta_dm_observe_results_cb
  229. E (1838) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  230. E (1838) BT: BLE HCI(id=62) event = 0x02)
  231. E (1848) BT: btu_ble_process_adv_pkt
  232. E (1848) BT: btm_identity_addr_to_random_pseudo
  233. E (1858) BT: BTM_CheckAdvData type=0x01
  234. E (1858) BT: BTM_CheckAdvData type=0x19
  235. E (1868) BT: BTM_CheckAdvData type=0x03
  236. E (1868) BT: Random address, treating device as LE only
  237. E (1878) BT: BTM_CheckAdvData type=0x01
  238. E (1878) BT: bta_dm_observe_results_cb
  239. E (1888) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  240. E (1888) BT: BLE HCI(id=62) event = 0x02)
  241. E (1898) BT: btu_ble_process_adv_pkt
  242. E (1898) BT: btm_identity_addr_to_random_pseudo
  243. E (1908) BT: BTM_CheckAdvData type=0x01
  244. E (1908) BT: BTM_CheckAdvData type=0x19
  245. E (1918) BT: BTM_CheckAdvData type=0x03
  246. E (1918) BT: Random address, treating device as LE only
  247. E (1928) BT: BTM_CheckAdvData type=0x01
  248. E (1928) BT: bta_dm_observe_results_cb
  249. E (1938) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  250. E (1938) BT: BLE HCI(id=62) event = 0x02)
  251. E (1948) BT: btu_ble_process_adv_pkt
  252. E (1948) BT: btm_identity_addr_to_random_pseudo
  253. E (1958) BT: BTM_CheckAdvData type=0x01
  254. E (1958) BT: BTM_CheckAdvData type=0x19
  255. E (1958) BT: BTM_CheckAdvData type=0x03
  256. E (1968) BT: Random address, treating device as LE only
  257. E (1968) BT: BTM_CheckAdvData type=0x01
  258. E (1978) BT: bta_dm_observe_results_cb
  259. E (1978) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  260. E (1988) BT: BLE HCI(id=62) event = 0x02)
  261. E (1988) BT: btu_ble_process_adv_pkt
  262. E (1998) BT: btm_identity_addr_to_random_pseudo
  263. E (1998) BT: BTM_CheckAdvData type=0x01
  264. E (2008) BT: BTM_CheckAdvData type=0x19
  265. E (2008) BT: BTM_CheckAdvData type=0x03
  266. E (2018) BT: Random address, treating device as LE only
  267. E (2018) BT: BTM_CheckAdvData type=0x01
  268. E (2028) BT: bta_dm_observe_results_cb
  269. E (2028) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  270. E (2038) BT: BTM_CheckAdvData type=0x07
  271. E (2038) BT: BTM_CheckAdvData type=0x07
  272. E (2048) BT: BTM_CheckAdvData type=0x07
  273. I (2048) GAPCallback: OPEN A DIRECT CONNECTION TO DEVICE. application identity: 1 rssi: -69, bda:     3ffd6988
  274. E (2058) BT: BTM_CheckAdvData type=0x07
  275. E (2068) BT: BTM_CheckAdvData type=0x07
  276. E (2068) BT: BTM_CheckAdvData type=0x07
  277. E (2078) BT: BTM_CheckAdvData type=0x07
  278. E (2078) BT: BTM_CheckAdvData type=0x07
  279. E (2078) BT: BTM_CheckAdvData type=0x07
  280. E (2088) BT: BTM_CheckAdvData type=0x07
  281. E (2088) BT: BTA_DmBleScan:start = 0
  282. E (2098) BT: BTA got event 0x11a
  283. E (2098) BT: bta_dm_sm_execute event:0x1a
  284. E (2108) BT: bta_dm_observe_cmpl_cb
  285. E (2108) BT: BTA got event 0x1f00
  286. E (2108) BT: GATT_Connect gatt_if=1
  287. E (2118) BT: gatt_get_ch_state: ch_state=0
  288. E (2118) BT: gatt_set_ch_state: old=0 new=2
  289. E (2128) BT: L2CA_ConnectFixedChnl() CID: 0x0004  BDA: 6789c2b071c6
  290. E (2138) BT: l2c_ble_link_adjust_allocation  num_hipri: 0  num_lowpri: 1  low_quota: 10  round_robin_quota: 0  qq: 10
  291. E (2148) BT: l2c_ble_link_adjust_allocation LCB 0   Priority: 0  XmitQuota: 10
  292. E (2148) BT:         SentNotAcked: 0  RRUnacked: 0
  293. E (2158) BT: l2cu_allocate_ccb: cid 0x0000
  294. E (2168) BT: l2c_link_adjust_chnl_allocation
  295. E (2168) BT: CID:0x0040 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  296. E (2178) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  297. E (2178) BT: btm_find_dev_type - device_type = 2 addr_type = 0
  298. E (2188) BT: btm_find_or_alloc_dev
  299. E (2198) BT: gatt_update_app_use_link_flag  is_add=1 chk_link=0
  300. E (2198) BT: gatt_update_app_hold_link_status found=1[1-found] idx=0 gatt_if=1 is_add=1
  301. E (2208) BT: gatt_get_ch_state: ch_state=2
  302. E (2208) BT: GATT_GetConnIdIfConnected status=0
  303. I (2218) GAPCallback: stop scan successfully
  304. E (2268) BT: BLE HCI(id=62) event = 0x0a)
  305. E (2268) BT: status = 0, handle = 0, role = 0, bda_type = 2
  306. E (2268) BT: btm_identity_addr_to_random_pseudo
  307. E (2278) BT: btm_ble_connected
  308. E (2278) BT: Security Manager: btm_ble_connected :  handle:0  enc_mode:0  bda:c2b071c6 RName:
  309. E (2288) BT: btm_ble_connected sec_flags=0x1080
  310. E (2298) BT: btm_find_or_alloc_dev
  311. E (2298) BT: l2cble_scanner_conn_comp: HANDLE=0 addr_type=0 conn_interval=12 slave_latency=0 supervision_tout=600
  312. E (2308) BT: btm_acl_created hci_handle=0 link_role=0  transport=2
  313. E (2318) BT: btm_bda_to_acl found
  314. E (2318) BT: device_type=0x3
  315. E (2328) BT: btm_bda_to_acl found
  316. E (2328) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  317. E (2338) BT: btm_bda_to_acl found
  318. E (2338) BT: p_acl->active_remote_addr_type: 1
  319. E (2348) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  320. E (2358) BT: btm_ble_read_resolving_list_entry_complete status = 0
  321. E (2358) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  322. E (2368) BT: btm_bda_to_acl found
  323. E (2368) BT: p_acl->active_remote_addr_type: 1
  324. E (2378) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  325. E (2388) BT: l2cu_release_ccb: cid 0x0004  in_use: 1
  326. E (2388) BT: GATT   ATT protocol channel with BDA: 6789c2b071c6 is disconnected
  327. E (2398) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
  328. E (2408) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  329. E (2408) BT: gatt_add_srv_chg_clt
  330. E (2418) BT: enqueue a srv chg client
  331. E (2418) BT: gatt_cleanup_upon_disc
  332. E (2428) BT: found p_tcb
  333. E (2428) BT: gatt_set_ch_state: old=2 new=0
  334. E (2438) BT: gatt_free_pending_ind
  335. E (2438) BT: gatt_free_pending_enc_queue
  336. E (2438) BT: gatt_free_pending_prepare_write_queue
  337. E (2448) BT: found p_reg tcb_idx=0 gatt_if=1  conn_id=0x1
  338. E (2458) BT: bta_gattc_conn_cback() - cif=1 connected=0 conn_id=1 reason=0x003e
  339. E (2458) BT: p_conn is NULL in bta_gattc_conn_cback
  340. E (2468) BT: ATT disconnected
  341. E (2468) BT: SMDBG l2c smp_connect_callback
  342. E (2478) BT: btm_acl_removed
  343. E (2478) BT: btm_bda_to_acl found
  344. E (2488) BT: btm_acl_report_role_change
  345. E (2488) BT: acl hci_handle=0 transport=2 connectable_mode=0x0 link_role=0
  346. E (2498) BT: before update p_dev_rec->sec_flags=0x1080
  347. E (2498) BT: LE link down
  348. E (2508) BT: Bonded
  349. E (2508) BT: after update p_dev_rec->sec_flags=0x1080
  350. E (2518) BT: btm_acl_resubmit_page
  351. E (2518) BT: btm_sec_disconnected sec_req:x0 state:IDLE reason:62 bd_addr:00:ec:0a:47:ba:e3  remote_name:
  352. E (2528) BT: btm_sec_disconnected before update sec_flags=0x1080
  353. E (2538) BT: btm_sec_disconnected after update sec_flags=0x1080
  354. E (2548) BT: BTA got event 0x1f11
  355. W (2548) GATTCallback: GATT CALLBACK: 41
  356. I (2548) GATTCallback: ESP_GATTC_DISCONNECT_EVT, status = 0
  357. W (2558) GATTC: Unregister -> esp_ble_gattc_app_unregister:  0
  358. W (2568) GATTCallback: GATT CALLBACK: 2
  359. E (2568) GATTCallback: open failed, error status = 85
  360. E (2578) BT: BTA got event 0x1f14
  361. E (2578) BT: bta_gattc_deregister Deregister Failedm unknown client cif
  362. ets Jun  8 2016 00:22:57
  363. rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  364. ets Jun  8 2016 00:22:57
  365. rst:0x10 (RTCWDT_RTC_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  366. configsip: 0, SPIWP:0xee
  367. clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
  368. mode:DIO, clock div:1
  369. load:0x3fff0018,len:4
  370. load:0x3fff001c,len:5568
  371. ho 0 tail 12 room 4
  372. 0x40078000: ?? ??:0
  373. load:0x40078000,len:0
  374. 0x40078000: ?? ??:0
  375. load:0x40078000,len:12532
  376. 0x40078f84: ?? ??:0
  377. entry 0x40078f84
  378. I (30) boot: ESP-IDF v3.0-dev-1065-g5d332ba0 2nd stage bootloader
  379. I (30) boot: compile time 14:47:06
  380. I (30) boot: Enabling RNG early entropy source...
  381. I (36) boot: SPI Speed      : 80MHz
  382. I (40) boot: SPI Mode       : DIO
  383. I (44) boot: SPI Flash Size : 4MB
  384. I (48) boot: Partition Table:
  385. I (52) boot: ## Label            Usage          Type ST Offset   Length
  386. I (59) boot:  0 nvs              WiFi data        01 02 00009000 00004000
  387. I (67) boot:  1 otadata          OTA data         01 00 0000d000 00002000
  388. I (74) boot:  2 phy_init         RF data          01 01 0000f000 00001000
  389. I (82) boot:  3 factory          OTA app          00 10 00010000 00150000
  390. I (89) boot:  4 ota_0            OTA app          00 11 00160000 00150000
  391. I (96) boot:  5 storage          Unknown data     01 81 002b0000 00150000
  392. I (104) boot: End of partition table
  393. I (108) boot: No factory image, trying OTA 0
  394. I (113) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x2c36c (181100) map
  395. I (147) esp_image: segment 1: paddr=0x0003c394 vaddr=0x3ffc0000 size=0x01f4c (  8012) load
  396. 0x40080000: _WindowOverflow4 at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:1685
  397. I (148) esp_image: segment 2: paddr=0x0003e2e8 vaddr=0x40080000 size=0x00400 (  1024) load
  398. 0x40080400: ?? ??:0
  399. I (154) esp_image: segment 3: paddr=0x0003e6f0 vaddr=0x40080400 size=0x01920 (  6432) load
  400. 0x400d0018: _flash_cache_start at ??:?
  401. I (163) esp_image: segment 4: paddr=0x00040018 vaddr=0x400d0018 size=0x6771c (423708) map
  402. 0x40081d20: _xt_coproc_exc at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:981
  403. I (229) esp_image: segment 5: paddr=0x000a773c vaddr=0x40081d20 size=0x104c0 ( 66752) load
  404. 0x400c0000: ?? ??:0
  405. I (240) esp_image: segment 6: paddr=0x000b7c04 vaddr=0x400c0000 size=0x00000 (     0) load
  406. I (243) boot: Loaded app from partition at offset 0x10000
  407. I (244) boot: Disabling RNG early entropy source...
  408. I (250) cpu_start: Pro cpu up.
  409. I (253) cpu_start: Single core mode
  410. I (258) heap_init: Initializing. RAM available for dynamic allocation:
  411. D (265) heap_init: New heap initialised at 0x3ffaff10
  412. I (270) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM
  413. D (276) heap_init: New heap initialised at 0x3ffc9068
  414. I (281) heap_init: At 3FFC9068 len 00016F98 (91 KiB): DRAM
  415. I (287) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM
  416. I (294) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
  417. 0x400921e0: ?? ??:0
  418. D (300) heap_init: New heap initialised at 0x400921e0
  419. I (305) heap_init: At 400921E0 len 0000DE20 (55 KiB): IRAM
  420. I (311) cpu_start: Pro cpu start user code
  421. D (323) clk: RTC_SLOW_CLK calibration value: 3348352
  422. ets Jun  8 2016 00:22:57
  423. rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  424. ets Jun  8 2016 00:22:57
  425. rst:0x10 (RTCWDT_RTC_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
  426. configsip: 0, SPIWP:0xee
  427. clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
  428. mode:DIO, clock div:1
  429. load:0x3fff0018,len:4
  430. load:0x3fff001c,len:5568
  431. ho 0 tail 12 room 4
  432. 0x40078000: ?? ??:0
  433. load:0x40078000,len:0
  434. 0x40078000: ?? ??:0
  435. load:0x40078000,len:12532
  436. 0x40078f84: ?? ??:0
  437. entry 0x40078f84
  438. I (30) boot: ESP-IDF v3.0-dev-1065-g5d332ba0 2nd stage bootloader
  439. I (30) boot: compile time 14:47:06
  440. I (30) boot: Enabling RNG early entropy source...
  441. I (36) boot: SPI Speed      : 80MHz
  442. I (40) boot: SPI Mode       : DIO
  443. I (44) boot: SPI Flash Size : 4MB
  444. I (48) boot: Partition Table:
  445. I (52) boot: ## Label            Usage          Type ST Offset   Length
  446. I (59) boot:  0 nvs              WiFi data        01 02 00009000 00004000
  447. I (67) boot:  1 otadata          OTA data         01 00 0000d000 00002000
  448. I (74) boot:  2 phy_init         RF data          01 01 0000f000 00001000
  449. I (82) boot:  3 factory          OTA app          00 10 00010000 00150000
  450. I (89) boot:  4 ota_0            OTA app          00 11 00160000 00150000
  451. I (96) boot:  5 storage          Unknown data     01 81 002b0000 00150000
  452. I (104) boot: End of partition table
  453. I (108) boot: No factory image, trying OTA 0
  454. I (113) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x2c36c (181100) map
  455. I (147) esp_image: segment 1: paddr=0x0003c394 vaddr=0x3ffc0000 size=0x01f4c (  8012) load
  456. 0x40080000: _WindowOverflow4 at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:1685
  457. I (148) esp_image: segment 2: paddr=0x0003e2e8 vaddr=0x40080000 size=0x00400 (  1024) load
  458. 0x40080400: ?? ??:0
  459. I (154) esp_image: segment 3: paddr=0x0003e6f0 vaddr=0x40080400 size=0x01920 (  6432) load
  460. 0x400d0018: _flash_cache_start at ??:?
  461. I (163) esp_image: segment 4: paddr=0x00040018 vaddr=0x400d0018 size=0x6771c (423708) map
  462. 0x40081d20: _xt_coproc_exc at /home/fhfs/ESP/BEASTv3/esp-idf/components/freertos/./xtensa_vectors.S:981
  463. I (229) esp_image: segment 5: paddr=0x000a773c vaddr=0x40081d20 size=0x104c0 ( 66752) load
  464. 0x400c0000: ?? ??:0
  465. I (240) esp_image: segment 6: paddr=0x000b7c04 vaddr=0x400c0000 size=0x00000 (     0) load
  466. I (243) boot: Loaded app from partition at offset 0x10000
  467. I (244) boot: Disabling RNG early entropy source...
  468. I (250) cpu_start: Pro cpu up.
  469. I (253) cpu_start: Single core mode
  470. I (258) heap_init: Initializing. RAM available for dynamic allocation:
  471. D (265) heap_init: New heap initialised at 0x3ffaff10
  472. I (270) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM
  473. D (276) heap_init: New heap initialised at 0x3ffc9068
  474. I (281) heap_init: At 3FFC9068 len 00016F98 (91 KiB): DRAM
  475. I (287) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM
  476. I (294) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
  477. 0x400921e0: ?? ??:0
  478. D (300) heap_init: New heap initialised at 0x400921e0
  479. I (305) heap_init: At 400921E0 len 0000DE20 (55 KiB): IRAM
  480. I (311) cpu_start: Pro cpu start user code
  481. D (323) clk: RTC_SLOW_CLK calibration value: 3339469
  482. V (34) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  483. V (35) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xC0E
  484. D (40) intr_alloc: Connected src 57 to int 2 (cpu 0)
  485. V (45) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  486. V (51) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
  487. D (59) intr_alloc: Connected src 16 to int 3 (cpu 0)
  488. V (64) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  489. V (70) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0x40E
  490. D (78) intr_alloc: Connected src 24 to int 9 (cpu 0)
  491. I (83) cpu_start: Starting scheduler on PRO CPU.
  492. D (88) heap_init: New heap initialised at 0x3ffe0440
  493. D (88) heap_init: New heap initialised at 0x3ffe4350
  494. I (98) gpio: GPIO[13]| InputEn: 1| OutputEn: 0| OpenDrain: 0| Pullup: 1| Pulldown: 0| Intr:3
  495. V (98) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  496. V (98) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
  497. D (98) intr_alloc: Connected src 22 to int 12 (cpu 0)
  498. D (118) rmt: Rmt Tx Channel 1|Gpio 0|Sclk_Hz 80000000|Div 8|Carrier_Hz 100|Duty 50
  499. V (128) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): checking args
  500. V (138) intr_alloc: esp_intr_alloc_intrstatus (cpu 0): Args okay. Resulting flags 0xE
  501. D (148) intr_alloc: Connected src 47 to int 13 (cpu 0)
  502. D (148) rmt: RMT INTR : TX END
  503. E (158) NVSFlashStorage: ret == 1073525696 && length == 0
  504. E (158) NVSFlashStorage: 0 deviceID err:4354
  505. E (158) NVSFlashStorage: ret == 1073525696 && length == 0
  506. E (168) NVSFlashStorage: 1 advertisement err:4354
  507. E (178) NVSFlashStorage: ret == 1073525696 && length == 0
  508. E (178) NVSFlashStorage: 2 filter err:4354
  509. E (188) NVSFlashStorage: ret == 1073525696 && length == 0
  510. E (188) NVSFlashStorage: 3 primaryKey err:4354
  511. E (198) NVSFlashStorage: ret == 1073525696 && length == 0
  512. E (198) NVSFlashStorage: 4 connectionString err:4354
  513. E (208) NVSFlashStorage: ret == 1073525696 && length == 0
  514. E (218) NVSFlashStorage: 5 wifissid err:4354
  515. E (218) NVSFlashStorage: ret == 1073525696 && length == 0
  516. E (228) NVSFlashStorage: 6 wifipassword err:4354
  517. E (228) NVSFlashStorage: ret == 1073525696 && length == 0
  518. E (238) NVSFlashStorage: 7 ota_url err:4354
  519. E (238) NVSFlashStorage: ret == 1073525696 && length == 0
  520. E (248) NVSFlashStorage: 8 ipinfo err:4354
  521. E (248) BEA*ST: Read DeviceContext Failed
  522. I (258) BEA*ST: Provision: 1
  523. D (258) rmt: RMT INTR : TX END
  524. D (268) wl_flash: init - config ID=1, stored ID=1, access_count=0, block_size=4096, max_count=16, pos=0, move_count=0
  525. D (278) wl_flash: init starts: crc1=456748127, crc2 = 456748127, this->state.crc=456748127, state_copy->crc=456748127
  526. D (288) wl_flash: init: crc1=456748127, crc2 = 456748127, result=0
  527. D (288) wl_flash: recoverPos - this->state.pos=0x0000000e, result=00000000
  528. D (298) vfs_fat_spiflash: using pdrv=0
  529. I (298) GATTC: Start
  530. 0x4000d890: ?? ??:0
  531. D (308) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
  532. D (308) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
  533. D (318) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
  534. D (328) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
  535. D (328) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
  536. D (338) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
  537. D (338) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
  538. D (348) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
  539. I (358) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE
  540. D (528) phy_init: loading PHY init data from partition at offset 0xf000
  541. D (528) phy_init: PHY data partition validated
  542. I (538) phy: phy_version: 362.0, 61e8d92, Sep  8 2017, 18:48:11, 0, 0
  543. E (538) BT: btm_acl_init
  544. E (538) BT: L2CA_RegisterFixedChannel()  CID: 0x0004, 0x3ffd5b40
  545. E (548) BT: btm_sec_set_security_level : sec: 0x0
  546. E (548) BT: BTM_SEC_REG[0]: id 50, is_orig 1, psm 0x001f, proto_id 0, chan_id 0
  547. E (558) BT:                : sec: 0x80, service name [] (up to 21 chars saved)
  548. E (568) BT: btm_sec_set_security_level : sec: 0x0
  549. E (568) BT: BTM_SEC_REG[0]: id 50, is_orig 0, psm 0x001f, proto_id 0, chan_id 0
  550. E (578) BT:                : sec: 0x80, service name [] (up to 21 chars saved)
  551. E (588) BT: SMP_Init
  552. E (588) BT: SMDBG l2c smp_l2cap_if_init
  553. E (598) BT: L2CA_RegisterFixedChannel()  CID: 0x0006, 0x3ffd5b20
  554. E (598) BT: btm_ble_init
  555. E (608) BT: BTA got event 0x100
  556. E (608) BT: bta_dm_sm_execute event:0x0
  557. E (618) BT: BTA got event 0x0
  558. E (618) BT: bta_sys_sm_execute state:0, event:0x0
  559. E (628) BT: bta_sys_hw_api_enable for 0, active modules 0x0001
  560. E (628) BT: BTA got event 0x1
  561. E (638) BT: bta_sys_sm_execute state:1, event:0x1
  562. E (638) BT: bta_sys_hw_evt_enabled for 0
  563. E (648) BT: btm_acl_device_down
  564. E (658) BT: BTM Register For VSEvents is successfully
  565. E (658) BT: btm_ble_resolving_list_init max_irk_list_sz = 3
  566. E (658) BT: btm_ble_white_list_init white_list_size = 12
  567. E (668) BT: #####################################num_lm_ble_bufs = 10
  568. E (678) BT: BTM_SetPinType: pin type 0 [variable-0, fixed-1], code , length 0
  569. E (678) BT: btm_decode_ext_features_page page: 0
  570. E (688) BT: Local supported ACL packet types: 0xcc18
  571. E (688) BT: Local supported SCO packet types: 0x003d
  572. E (698) BT: btm_sec_set_security_level : sec: 0x0
  573. E (708) BT: BTM_SEC_REG[1]: id 42, is_orig 0, psm 0x0003, proto_id 3, chan_id 0
  574. E (708) BT:                : sec: 0x80, service name [RFC_MUX
  575. ] (up to 21 chars saved)
  576. E (718) BT: btm_sec_dev_reset sec mode: 4
  577. E (728) BT: BTM_SetInquiryMode
  578. E (728) BT: BTM_SetPageScanType
  579. E (738) BT: BTM_SetInquiryScanType
  580. E (738) BT: btm_decode_ext_features_page page: 1
  581. E (748) BT: btm_decode_ext_features_page page: 2
  582. E (748) BT:  bta_sys_hw_btm_cback was called with parameter: 0
  583. E (758) BT: BTA got event 0x2
  584. E (758) BT: bta_sys_sm_execute state:1, event:0x2
  585. E (768) BT:  bta_sys_hw_evt_stack_enabled!notify the callers
  586. E (768) BT: bta_dm_sys_hw_cback with event: 1
  587. E (778) BT: BTM_BleLoadLocalKeys
  588. E (778) BT: BTM_BleLoadLocalKeys
  589. E (788) BT: BTM_SecRegister application registered
  590. E (788) BT: BTM_SecRegister SMP_Register( btm_proc_smp_cback )
  591. E (798) BT: SMP_Register state=0
  592. E (798) BT: BTM_SecRegister application registered
  593. E (808) BT: BTM_SetDefaultLinkSuperTout
  594. E (808) BT: BTM: BTM_WritePageTimeout: Timeout: 8192.
  595. E (818) BT: BTM_SetDefaultLinkPolicy setting:0x000f
  596. E (818) BT: BTM_SetDefaultLinkPolicy hold not supported (settings: 0x000d)
  597. E (828) BT: BTM_SetDefaultLinkPolicy park not supported (settings: 0x0005)
  598. E (838) BT: Set DefaultLinkPolicy:0x0005
  599. E (838) BT: BTM_RegBusyLevelNotif
  600. E (848) BT: btm_ble_clear_resolving_list_complete status=0
  601. E (848) BT: btm_ble_clear_resolving_list_complete resolving_list_avail_size=3
  602. E (858) BT: BTA got event 0x110
  603. E (868) BT: bta_dm_sm_execute event:0x10
  604. E (868) BT: BTM_SecAddBleDevice dev_type=0x2
  605. E (878) BT: Add a new device
  606. E (878) BT: allocate a new dev rec idx=0x0
  607. E (878) BT: BTM_GetHCIConnHandle
  608. E (888) BT: BTM_GetHCIConnHandle
  609. E (888) BT: hci_handl=0xffff
  610. E (898) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  611. E (898) BT: BTA got event 0x10f
  612. E (908) BT: bta_dm_sm_execute event:0xf
  613. E (908) BT: BTM_SecAddBleKey
  614. E (908) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x01
  615. E (918) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=0
  616. E (928) BT: bd_addr:67-89-c2-b0-71-c6
  617. E (928) BT: BTM_LE_KEY_PENC key_type=0x1 sec_flags=0x1080 sec_leve=0x1
  618. E (938) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  619. E (948) BT: BTA got event 0x10f
  620. E (948) BT: bta_dm_sm_execute event:0xf
  621. E (958) BT: BTM_SecAddBleKey
  622. E (958) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x02
  623. E (958) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=0
  624. E (968) BT: bd_addr:67-89-c2-b0-71-c6
  625. E (978) BT: BTM_LE_KEY_PID key_type=0x3 save peer IRK
  626. E (978) BT: btm_consolidate_dev
  627. E (988) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  628. E (988) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  629. E (998) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 0
  630. E (1008) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
  631. E (1018) BT: btm_ble_suspend_bg_conn
  632. E (1018) BT: btm_ble_add_resolving_list_entry_complete status = 0
  633. E (1028) BT: BTA got event 0x10f
  634. E (1028) BT: bta_dm_sm_execute event:0xf
  635. E (1038) BT: BTM_SecAddBleKey
  636. E (1038) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x04
  637. E (1048) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=0
  638. E (1058) BT: bd_addr:67-89-c2-b0-71-c6
  639. E (1058) BT: BTM_LE_KEY_PCSRK key_type=0x7 sec_flags=0x1080 sec_level=0x1 peer_counter=0
  640. E (1068) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  641. E (1078) BT: BTA got event 0x10f
  642. E (1078) BT: bta_dm_sm_execute event:0xf
  643. E (1088) BT: BTM_SecAddBleKey
  644. E (1088) BT: BTM_SecAddLeKey()  BDA: 6789c2b071c6, Type: 0x10
  645. E (1098) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=0
  646. E (1098) BT: bd_addr:67-89-c2-b0-71-c6
  647. E (1108) BT: BTM_LE_KEY_LENC key_type=0x17 DIV=0x0 key_size=0x10 sec_level=0x1
  648. E (1118) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  649. I (1118) GATTC: REGISTER GAP CALLBACK
  650. I (1128) GATTC: REGISTER GATTC CALLBACK
  651. I (1128) GATTC: REGISTER THIS APPLICATION
  652. E (1138) BT: btc_gattc_call_handler()
  653. E (1138) BT: BTA got event 0x1f13
  654. E (1148) BT: bta_gattc_register state 0
  655. E (1148) BT: bta_gattc_enable
  656. E (1148) BT: GATT_Register
  657. E (1158) BT: UUID=[0x0000]
  658. E (1158) BT: allocated gatt_if=1
  659. E (1158) BT: GATTC getbuf sucess.
  660. E (1168) BT: BTA got event 0x1f12
  661. E (1168) BT: GATT_StartIf gatt_if=1
  662. E (1178) BT: gatt_find_the_connected_bda start_idx=0
  663. E (1178) BT: gatt_find_the_connected_bda found=0 found_idx=4
  664. W (1188) GATTCallback: GATT CALLBACK: 0
  665. I (1188) GATTCallback: REG_EVT
  666. E (1198) BT: BTA got event 0x11e
  667. E (1198) BT: bta_dm_sm_execute event:0x1e
  668. E (1208) BT: BTM_BleConfigPrivacy
  669. E (1208) BT: btm_gen_resolvable_private_addr
  670. E (1218) BT: btm_ble_rand_enc_complete
  671. E (1218) BT: btm_gen_resolve_paddr_low
  672. E (1218) BT: smp_encrypt_data
  673. E (1228) BT: btm_gen_resolve_paddr_cmpl
  674. E (1228) BT: BTA got event 0x118
  675. E (1238) BT: bta_dm_sm_execute event:0x18
  676. E (1238) BT: BTM_BleSetScanFilterParams
  677. I (1248) GAPCallback: SCAN PARAMETERS SET; INITIATE A SCAN REQUEST
  678. E (1248) BT: BTA_DmBleScan:start = 1
  679. E (1258) BT: BTA got event 0x11a
  680. E (1258) BT: bta_dm_sm_execute event:0x1a
  681. I (1268) GAPCallback: scan start success
  682. E (1348) BT: BLE HCI(id=62) event = 0x02)
  683. E (1348) BT: btu_ble_process_adv_pkt
  684. E (1348) BT: btm_identity_addr_to_random_pseudo
  685. E (1348) BT: BTM_CheckAdvData type=0x01
  686. E (1358) BT: BTM_CheckAdvData type=0x19
  687. E (1358) BT: BTM_CheckAdvData type=0x03
  688. E (1368) BT: Random address, treating device as LE only
  689. E (1368) BT: BTM_CheckAdvData type=0x01
  690. E (1378) BT: bta_dm_observe_results_cb
  691. E (1378) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  692. E (1388) BT: BLE HCI(id=62) event = 0x02)
  693. E (1388) BT: btu_ble_process_adv_pkt
  694. E (1398) BT: btm_identity_addr_to_random_pseudo
  695. E (1398) BT: BTM_CheckAdvData type=0x01
  696. E (1408) BT: BTM_CheckAdvData type=0x19
  697. E (1408) BT: BTM_CheckAdvData type=0x03
  698. E (1408) BT: Random address, treating device as LE only
  699. E (1418) BT: BTM_CheckAdvData type=0x01
  700. E (1428) BT: bta_dm_observe_results_cb
  701. E (1428) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  702. E (1438) BT: BTM_CheckAdvData type=0x07
  703. E (1438) BT: BTM_CheckAdvData type=0x07
  704. E (1448) BT: BLE HCI(id=62) event = 0x02)
  705. E (1448) BT: btu_ble_process_adv_pkt
  706. E (1448) BT: btm_identity_addr_to_random_pseudo
  707. E (1458) BT: BTM_CheckAdvData type=0x01
  708. E (1458) BT: BTM_CheckAdvData type=0x19
  709. E (1468) BT: BTM_CheckAdvData type=0x03
  710. E (1468) BT: Random address, treating device as LE only
  711. E (1478) BT: BTM_CheckAdvData type=0x01
  712. E (1478) BT: bta_dm_observe_results_cb
  713. E (1488) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  714. E (1488) BT: BLE HCI(id=62) event = 0x02)
  715. E (1498) BT: btu_ble_process_adv_pkt
  716. E (1498) BT: btm_identity_addr_to_random_pseudo
  717. E (1508) BT: BTM_CheckAdvData type=0x01
  718. E (1508) BT: BTM_CheckAdvData type=0x19
  719. E (1518) BT: BTM_CheckAdvData type=0x03
  720. E (1518) BT: Random address, treating device as LE only
  721. E (1528) BT: BTM_CheckAdvData type=0x01
  722. E (1528) BT: bta_dm_observe_results_cb
  723. E (1538) BT: BTM_InqDbRead: bd addr [18cb72cff238]
  724. E (1538) BT: BTM_CheckAdvData type=0x07
  725. E (1548) BT: BTM_CheckAdvData type=0x07
  726. E (1548) BT: BLE HCI(id=62) event = 0x02)
  727. E (1548) BT: btu_ble_process_adv_pkt
  728. E (1558) BT: btm_identity_addr_to_random_pseudo
  729. E (1558) BT: BTM_CheckAdvData type=0x01
  730. E (1568) BT: BTM_CheckAdvData type=0x19
  731. E (1568) BT: BTM_CheckAdvData type=0x03
  732. E (1578) BT: Random address, treating device as LE only
  733. E (1578) BT: BTM_CheckAdvData type=0x01
  734. E (1588) BT: bta_dm_observe_results_cb
  735. E (1588) BT: BTM_InqDbRead: bd addr [1f3e1d31abcc]
  736. E (1598) BT: BTM_CheckAdvData type=0x07
  737. E (1678) BT: BLE HCI(id=62) event = 0x02)
  738. E (1678) BT: btu_ble_process_adv_pkt
  739. E (1678) BT: btm_identity_addr_to_random_pseudo
  740. E (1688) BT: btm_ble_update_inq_result scan_rsp=false, to_report=false,                              scan_type_active=1
  741. E (1698) BT: BTM_CheckAdvData type=0x01
  742. E (1698) BT: BTM_CheckAdvData type=0x19
  743. E (1708) BT: BTM_CheckAdvData type=0x03
  744. E (1708) BT: BR/EDR NOT support bit not set, treat as DUMO
  745. E (1718) BT: BLE HCI(id=62) event = 0x02)
  746. E (1718) BT: btu_ble_process_adv_pkt
  747. E (1728) BT: btm_identity_addr_to_random_pseudo
  748. E (1728) BT: BTM_CheckAdvData type=0x01
  749. E (1738) BT: BTM_CheckAdvData type=0x19
  750. E (1738) BT: BTM_CheckAdvData type=0x03
  751. E (1738) BT: BR/EDR NOT support bit not set, treat as DUMO
  752. E (1748) BT: BTM_CheckAdvData type=0x01
  753. E (1758) BT: bta_dm_observe_results_cb
  754. E (1758) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  755. E (1768) BT: BTM_CheckAdvData type=0x07
  756. I (1768) GAPCallback: OPEN A DIRECT CONNECTION TO DEVICE. application identity: 1 rssi: -68, bda:     3ffd67dc
  757. E (1778) BT: BTA_DmBleScan:start = 0
  758. E (1778) BT: BTA got event 0x11a
  759. E (1788) BT: bta_dm_sm_execute event:0x1a
  760. E (1788) BT: bta_dm_observe_cmpl_cb
  761. E (1798) BT: BLE HCI(id=62) event = 0x02)
  762. E (1798) BT: btu_ble_process_adv_pkt
  763. E (1808) BT: BLE HCI(id=62) event = 0x02)
  764. E (1808) BT: btu_ble_process_adv_pkt
  765. E (1818) BT: BTA got event 0x1f00
  766. E (1818) BT: GATT_Connect gatt_if=1
  767. E (1818) BT: gatt_get_ch_state: ch_state=0
  768. E (1828) BT: gatt_set_ch_state: old=0 new=2
  769. E (1828) BT: L2CA_ConnectFixedChnl() CID: 0x0004  BDA: 6789c2b071c6
  770. E (1838) BT: l2c_ble_link_adjust_allocation  num_hipri: 0  num_lowpri: 1  low_quota: 10  round_robin_quota: 0  qq: 10
  771. E (1848) BT: l2c_ble_link_adjust_allocation LCB 0   Priority: 0  XmitQuota: 10
  772. E (1858) BT:         SentNotAcked: 0  RRUnacked: 0
  773. E (1868) BT: l2cu_allocate_ccb: cid 0x0000
  774. E (1868) BT: l2c_link_adjust_chnl_allocation
  775. E (1878) BT: CID:0x0040 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  776. E (1878) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  777. E (1888) BT: btm_find_dev_type - device_type = 2 addr_type = 0
  778. E (1898) BT: btm_find_or_alloc_dev
  779. E (1898) BT: gatt_update_app_use_link_flag  is_add=1 chk_link=0
  780. E (1908) BT: gatt_update_app_hold_link_status found=1[1-found] idx=0 gatt_if=1 is_add=1
  781. E (1918) BT: gatt_get_ch_state: ch_state=2
  782. E (1918) BT: GATT_GetConnIdIfConnected status=0
  783. I (1928) GAPCallback: stop scan successfully
  784. E (2108) BT: BLE HCI(id=62) event = 0x0a)
  785. E (2108) BT: status = 0, handle = 0, role = 0, bda_type = 2
  786. E (2108) BT: btm_identity_addr_to_random_pseudo
  787. E (2108) BT: btm_ble_connected
  788. E (2118) BT: Security Manager: btm_ble_connected :  handle:0  enc_mode:0  bda:c2b071c6 RName:
  789. E (2128) BT: btm_ble_connected sec_flags=0x1080
  790. E (2128) BT: btm_find_or_alloc_dev
  791. E (2138) BT: l2cble_scanner_conn_comp: HANDLE=0 addr_type=0 conn_interval=12 slave_latency=0 supervision_tout=600
  792. E (2148) BT: btm_acl_created hci_handle=0 link_role=0  transport=2
  793. E (2148) BT: btm_bda_to_acl found
  794. E (2158) BT: device_type=0x3
  795. E (2158) BT: btm_bda_to_acl found
  796. E (2168) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  797. E (2168) BT: btm_bda_to_acl found
  798. E (2178) BT: p_acl->active_remote_addr_type: 1
  799. E (2178) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  800. E (2188) BT: btm_ble_read_resolving_list_entry_complete status = 0
  801. E (2198) BT: btm_ble_refresh_peer_resolvable_private_addr: active_addr_type: 1
  802. E (2208) BT: btm_bda_to_acl found
  803. E (2208) BT: p_acl->active_remote_addr_type: 1
  804. E (2218) BT: btm_ble_refresh_peer_resolvable_private_addr conn_addr: 6b:60:66:6c:8e:23
  805. E (2218) BT: btm_bda_to_acl found
  806. E (2228) BT: btm_establish_continue
  807. E (2228) BT: btm_acl_update_busy_level
  808. E (2238) BT: BTM_BLI_ACL_UP_EVT
  809. E (2238) BT: l2cu_process_fixed_chnl_resp
  810. E (2248) BT: GATT   ATT protocol channel with BDA: 6789c2b071c6 is connected
  811. E (2248) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
  812. E (2258) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  813. E (2268) BT: gatt_add_srv_chg_clt
  814. E (2268) BT: enqueue a srv chg client
  815. E (2268) BT: gatt_get_ch_state: ch_state=2
  816. E (2278) BT: gatt_set_ch_state: old=2 new=4
  817. E (2278) BT: gatt_num_apps_hold_link   num=1
  818. E (2288) BT: GATT_SetIdleTimeout idle_tout=65535 status=1(1-OK 0-not performed)
  819. E (2298) BT: SMDBG l2c smp_connect_callback
  820. E (2298) BT: L2CAP - rcv_cid CID: 0x0004
  821. E (2308) BT: gatt_get_ch_state: ch_state=4
  822. E (2308) BT: gatt_process_notification
  823. E (2318) BT: gatt_get_link_encrypt_status status=0x8e
  824. E (2318) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 7 status = 142
  825. E (2328) BT: GATT_GetConnectionInfor conn_id=1
  826. E (2328) BT: bta_gattc_process_indicate no one interested, ack now
  827. E (2338) BT: GATTC_SendHandleValueConfirm conn_id=1 handle=0x3
  828. E (2348) BT: notif_count=1
  829. E (2348) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  830. E (2358) BT: l2c_link_check_send_pkts
  831. E (2358) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  832. E (2368) BT: l2c_link_send_to_lower
  833. E (2368) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  834. E (2378) BT: BLE HCI(id=62) event = 0x07)
  835. E (2388) BT: l2cble_process_data_length_change_event TX data len = 251
  836. E (2388) BT: btm_handle_to_acl_index
  837. E (2398) BT: btm_bda_to_acl found
  838. E (2398) BT: L2CAP - rcv_cid CID: 0x0006
  839. E (2408) BT: l2cu_allocate_ccb: cid 0x0000
  840. E (2408) BT: l2c_link_adjust_chnl_allocation
  841. E (2418) BT: CID:0x0004 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  842. E (2418) BT: CID:0x0041 FCR Mode:0 Priority:2 TxDataRate:1 RxDataRate:1 Quota:200
  843. E (2428) BT:
  844. SMDBG l2c smp_data_received
  845. E (2438) BT: main smp_sm_event
  846. E (2438) BT: SMP Role: Master
  847.  State: [SMP_STATE_IDLE (0)], Event: [SECURITY_REQ_EVT (11)]
  848. E (2448) BT: State change: SMP_STATE_IDLE(0) ==> SMP_STATE_WAIT_APP_RSP(1)
  849. E (2458) BT: smp_proc_sec_req auth_req=0xd
  850. E (2458) BT: btm_ble_link_sec_check auth_req =0xd
  851. E (2468) BT: dev_rec sec_flags=0x1080
  852. E (2468) BT: cur_sec_level=1 req_sec_level=4 sec_req_act=2
  853. E (2478) BT: smp_proc_sec_req sec_req_act=0x2
  854. E (2478) BT: smp_send_app_cback p_cb->cb_evt=2
  855. E (2488) BT: btm_proc_smp_cback event = 2
  856. 0x40101090: bta_dm_ble_smp_cback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/bta/dm/bta_dm_act.c:4189
  857. E (2488) BT: btm_cb.api.p_le_callback=0x40101090
  858. E (2498) BT: callback_rc=0  p_cb->cb_evt=2
  859. E (2498) BT: smp_send_app_cback return
  860. E (2508) BT: result state = SMP_STATE_WAIT_APP_RSP
  861. E (2508) BT: btm_bda_to_acl found
  862. E (2518) BT: L2CAP - rcv_cid CID: 0x0005
  863. E (2518) BT: l2c_link_check_send_pkts
  864. E (2528) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  865. E (2528) BT: l2c_link_send_to_lower
  866. E (2538) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  867. I (2548) GAPCallback: ESP_GAP_BLE_SEC_REQ_EVT
  868. E (2548) BT: BLE HCI(id=62) event = 0x04)
  869. E (2548) BT: btm_ble_read_remote_features_complete
  870. E (2558) BT: BTA got event 0x104
  871. E (2558) BT: bta_dm_sm_execute event:0x4
  872. E (2568) BT: BTM_ReadRemoteFeatures
  873. E (2568) BT: bta_dm_acl_change info: 0x0
  874. E (2578) BT: L2CA_SetDesireRole() new:x1, disallow_switch:0
  875. E (2578) BT: BTA got event 0x104
  876. E (2588) BT: bta_dm_sm_execute event:0x4
  877. E (2588) BT: BTA got event 0x1f0d
  878. E (2598) BT: bta_gattc_conn server cache state=0
  879. E (2598) BT: bta_gattc_conn conn_id=1
  880. E (2608) BT: GATT_GetConnectionInfor conn_id=1
  881. E (2608) BT: bta_gattc_start_discover conn_id=1 p_clcb->p_srcb->state = 3
  882. E (2618) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 0 current upd state 0x0c
  883. E (2628) BT: GATTC_Discover conn_id=1 disc_type=1
  884. E (2628) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  885. E (2638) BT: l2c_link_check_send_pkts
  886. E (2648) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  887. E (2648) BT: l2c_link_send_to_lower
  888. E (2658) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
  889. W (2658) GATTCallback: GATT CALLBACK: 40
  890. I (2668) GATTCallback: ESP_GATTC_CONNECT_EVT conn_id 0, if 1, status 0
  891. E (2678) BT: BTA_DmSetEncryption
  892. E (2678) BT: l2c_link_check_send_pkts
  893. E (2678) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  894. E (2688) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
  895. E (2698) BT: l2c_link_check_send_pkts
  896. E (2698) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  897. E (2708) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  898. E (2718) BT: BTA got event 0x113
  899. E (2718) BT: bta_dm_sm_execute event:0x13
  900. E (2718) BT: BTM_SecurityGrant
  901. E (2728) BT: SMP_SecurityGrant
  902. E (2728) BT: main smp_sm_event
  903. E (2738) BT: SMP Role: Master
  904.  State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_SEC_GRANT_EVT (21)]
  905. E (2748) BT: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_WAIT_APP_RSP(1)
  906. E (2748) BT: smp_proc_sec_grant
  907. E (2758) BT: smp_send_app_cback p_cb->cb_evt=1
  908. E (2758) BT: io_cap = 4
  909. E (2768) BT: btm_proc_smp_cback event = 1
  910. E (2768) BT: btm_ble_io_capabilities_req
  911. E (2778) BT: io mitm: 13 oob_data:0
  912. E (2778) BT: btm_ble_io_capabilities_req 1: p_dev_rec->security_required = 0 auth_req:13
  913. E (2788) BT: btm_ble_io_capabilities_req 2: i_keys=0x3 r_keys=0xf (bit 0-LTK 1-IRK 2-CSRK)
  914. E (2798) BT: btm_ble_io_capabilities_req 3: auth_req:13
  915. E (2798) BT: btm_ble_io_capabilities_req 4: i_keys=0x3 r_keys=0xf
  916. E (2808) BT: btm_ble_io_capabilities_req 5: p_data->io_cap = 3 auth_req:13
  917. E (2818) BT: btm_ble_io_capabilities_req 6: IO_CAP:3 oob_data:0 auth_req:0x09
  918. E (2828) BT: callback_rc=0  p_cb->cb_evt=1
  919. E (2828) BT: rcvd auth_req: 0x09, io_cap: 3                         loc_oob_flag: 0 loc_enc_size: 16,local_i_key: 0x03, local_r_key: 0x0f
  920. E (2838) BT: btm_bda_to_acl found
  921. E (2848) BT: lmp_version_below LMP version 6 < 8
  922. E (2848) BT: set auth_req: 0x09, local_i_key: 0x03, local_r_key: 0x07
  923. E (2858) BT: main smp_sm_event
  924. E (2858) BT: SMP Role: Master
  925.  State: [SMP_STATE_WAIT_APP_RSP (1)], Event: [API_IO_RSP_EVT (20)]
  926. E (2868) BT: State change: SMP_STATE_WAIT_APP_RSP(1) ==> SMP_STATE_PAIR_REQ_RSP(3)
  927. E (2878) BT: smp_send_pair_req
  928. E (2888) BT: btm_sec_clear_ble_keys() Clearing BLE Keys
  929. E (2888) BT: btm_ble_resolving_list_remove_dev
  930. E (2898) BT: btm_ble_suspend_bg_conn
  931. E (2898) BT: btm_ble_suspend_bg_conn
  932. E (2908) BT: smp_send_cmd on l2cap cmd_code=0x1
  933. E (2908) BT: smp_build_pairing_cmd
  934. E (2918) BT: smp_send_msg_to_L2CAP
  935. E (2918) BT: L2CA_SendFixedChnlData()  CID: 0x0006  BDA: 6789c2b071c6
  936. E (2928) BT: l2c_link_check_send_pkts
  937. E (2928) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  938. E (2938) BT: l2c_link_send_to_lower
  939. E (2938) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  940. W (2948) GATTCallback: GATT CALLBACK: 2
  941. I (2948) GATTCallback: ESP_GATTC_OPEN_EVT conn_id: 0 (0) gattc_if: 1 (1)
  942. E (2958) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 0 current upd state 0x0c
  943. E (2968) BT: result state = SMP_STATE_PAIR_REQ_RSP
  944. E (2978) BT: smp_send_app_cback return
  945. E (2978) BT: result state = SMP_STATE_PAIR_REQ_RSP
  946. E (2988) BT: BLE HCI(id=62) event = 0x03)
  947. E (2988) BT: l2cble_process_conn_update_evt: conn_update_mask=8
  948. E (2998) BT: BTA got event 0x10b
  949. E (2998) BT: bta_dm_sm_execute event:0xb
  950. E (3008) BT: bta_dm_set_encryption
  951. E (3008) BT: Security Manager: BTM_SetEncryption busy, enqueue request
  952. E (3018) BT: btm_read_remote_version_complete
  953. E (3018) BT: btm_bda_to_acl found
  954. E (3028) BT: l2c_link_check_send_pkts
  955. E (3028) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  956. E (3038) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  957. E (3048) BT: btm_bda_to_acl found
  958. E (3048) BT: L2CAP - rcv_cid CID: 0x0004
  959. E (3058) BT: gatt_get_ch_state: ch_state=4
  960. I (3058) GAPCallback: update connection params status = 0, min_int = 6, max_int = 6,conn_int = 6,latency = 0, timeout = 2000
  961. E (3068) BT: bta_gattc_add_srvc_to_list handle=1, service type=0x1801
  962. E (3078) BT: bta_gattc_add_srvc_to_list handle=20, service type=0x1800
  963. E (3088) BT: bta_gattc_add_srvc_to_list handle=40, service type=0x00ff
  964. E (3088) BT: gatt_end_operation status=0 op=1 subtype=1
  965. E (3098) BT: Start service discovery: srvc_idx = 0
  966. E (3098) BT: GATTC_Discover conn_id=1 disc_type=3
  967. E (3108) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  968. E (3118) BT: l2c_link_check_send_pkts
  969. E (3118) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  970. E (3128) BT: l2c_link_send_to_lower
  971. E (3128) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  972. E (3138) BT: BTA got event 0x1f07
  973. E (3138) BT: btm_ble_remove_resolving_list_entry_complete status = 0
  974. E (3148) BT: l2c_link_check_send_pkts
  975. E (3158) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  976. E (3158) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  977. E (3168) BT: btm_bda_to_acl found
  978. E (3168) BT: L2CAP - rcv_cid CID: 0x0006
  979. E (3178) BT:
  980. SMDBG l2c smp_data_received
  981. E (3178) BT: main smp_sm_event
  982. E (3188) BT: SMP Role: Master
  983.  State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PAIRING_RSP_EVT (2)]
  984. E (3198) BT: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PAIR_REQ_RSP(3)
  985. E (3198) BT: smp_proc_pair_cmd
  986. E (3208) BT: smp_command_has_invalid_parameters for cmd code 0x02
  987. E (3218) BT: smp_command_has_valid_fixed_length for cmd code 0x02
  988. E (3218) BT: smp_pairing_request_response_parameters_are_valid for cmd code 0x02
  989. E (3228) BT: smp_select_association_model
  990. E (3238) BT: smp_select_association_model p_cb->peer_io_caps = 4 p_cb->local_io_capability = 3
  991. E (3238) BT: smp_select_association_model p_cb->peer_oob_flag = 0 p_cb->loc_oob_flag = 0
  992. E (3248) BT: smp_select_association_model p_cb->peer_auth_req = 0x0d p_cb->loc_auth_req = 0x09
  993. E (3258) BT: smp_select_association_model p_cb->secure_connections_only_mode_required = FALSE
  994. E (3268) BT: use_sc_process = 1
  995. E (3278) BT: smp_select_association_model_secure_connections
  996. E (3278) BT: smp_decide_association_model Association Model = 4
  997. E (3288) BT: sec_level=0
  998. E (3288) BT: main smp_sm_event
  999. E (3298) BT: SMP Role: Master
  1000.  State: [SMP_STATE_PAIR_REQ_RSP (3)], Event: [PUBLIC_KEY_EXCHANGE_REQ_EVT (27)]
  1001. E (3308) BT: State change: SMP_STATE_PAIR_REQ_RSP(3) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
  1002. E (3318) BT: smp_create_private_key
  1003. E (3318) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
  1004. E (3328) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
  1005. E (3328) BT: l2c_link_check_send_pkts
  1006. E (3338) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1007. E (3338) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1008. E (3348) BT: btm_bda_to_acl found
  1009. E (3348) BT: L2CAP - rcv_cid CID: 0x0004
  1010. E (3358) BT: gatt_get_ch_state: ch_state=4
  1011. E (3358) BT: gatt_process_error_rsp
  1012. E (3368) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1013. E (3368) BT: Discovery completed
  1014. E (3378) BT: gatt_end_operation status=0 op=1 subtype=3
  1015. E (3378) BT: GATTC_Discover conn_id=1 disc_type=4
  1016. E (3388) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1017. E (3398) BT: l2c_link_check_send_pkts
  1018. E (3398) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1019. E (3408) BT: l2c_link_send_to_lower
  1020. E (3408) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1021. E (3418) BT: btm_ble_rand_enc_complete
  1022. E (3418) BT: smp_rand_back state=0x9
  1023. E (3428) BT: smp_continue_private_key_creation state=0x9
  1024. E (3428) BT: l2c_link_check_send_pkts
  1025. E (3438) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1026. E (3448) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1027. E (3448) BT: btm_bda_to_acl found
  1028. E (3458) BT: L2CAP - rcv_cid CID: 0x0004
  1029. E (3458) BT: gatt_get_ch_state: ch_state=4
  1030. E (3468) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1031. E (3468) BT: l2c_link_check_send_pkts
  1032. E (3478) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1033. E (3478) BT: l2c_link_send_to_lower
  1034. E (3488) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1035. E (3498) BT: btm_ble_rand_enc_complete
  1036. E (3498) BT: smp_rand_back state=0xa
  1037. E (3498) BT: smp_continue_private_key_creation state=0xa
  1038. E (3508) BT: l2c_link_check_send_pkts
  1039. E (3508) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1040. E (3518) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1041. E (3528) BT: btm_bda_to_acl found
  1042. E (3528) BT: L2CAP - rcv_cid CID: 0x0004
  1043. E (3538) BT: gatt_get_ch_state: ch_state=4
  1044. E (3538) BT: gatt_process_error_rsp
  1045. E (3548) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1046. E (3548) BT: Discovery completed
  1047. E (3558) BT: gatt_end_operation status=0 op=1 subtype=4
  1048. E (3558) BT: starting discover characteristics descriptor
  1049. E (3568) BT: GATTC_Discover conn_id=1 disc_type=5
  1050. E (3568) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1051. E (3578) BT: l2c_link_check_send_pkts
  1052. E (3588) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1053. E (3588) BT: l2c_link_send_to_lower
  1054. E (3598) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1055. E (3598) BT: btm_ble_rand_enc_complete
  1056. E (3608) BT: smp_rand_back state=0xb
  1057. E (3608) BT: smp_continue_private_key_creation state=0xb
  1058. E (3618) BT: l2c_link_check_send_pkts
  1059. E (3618) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1060. E (3628) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1061. E (3638) BT: btm_bda_to_acl found
  1062. E (3638) BT: L2CAP - rcv_cid CID: 0x0004
  1063. E (3648) BT: gatt_get_ch_state: ch_state=4
  1064. E (3648) BT: gatt_process_error_rsp
  1065. E (3648) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
  1066. E (3658) BT: Discovery completed
  1067. E (3658) BT: gatt_end_operation status=0 op=1 subtype=5
  1068. E (3668) BT: Start service discovery: srvc_idx = 1
  1069. E (3678) BT: GATTC_Discover conn_id=1 disc_type=3
  1070. E (3678) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1071. E (3688) BT: l2c_link_check_send_pkts
  1072. E (3688) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1073. E (3698) BT: l2c_link_send_to_lower
  1074. E (3698) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1075. E (3708) BT: btm_ble_rand_enc_complete
  1076. E (3718) BT: smp_rand_back state=0xc
  1077. E (3718) BT: smp_continue_private_key_creation state=0xc
  1078. E (3728) BT: smp_process_private_key
  1079. E (3778) BT: main smp_sm_event
  1080. E (3778) BT: SMP Role: Master
  1081.  State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [LOCAL_PUBLIC_KEY_CRTD_EVT (28)]
  1082. E (3788) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
  1083. E (3798) BT: smp_send_pair_public_key
  1084. E (3798) BT: smp_send_cmd on l2cap cmd_code=0xc
  1085. E (3808) BT: smp_build_pair_public_key_cmd
  1086. E (3808) BT: smp_send_msg_to_L2CAP
  1087. E (3818) BT: L2CA_SendFixedChnlData()  CID: 0x0006  BDA: 6789c2b071c6
  1088. E (3818) BT: l2c_link_check_send_pkts
  1089. E (3828) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1090. E (3828) BT: l2c_link_send_to_lower
  1091. E (3838) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1092. E (3848) BT: result state = SMP_STATE_PUBLIC_KEY_EXCH
  1093. E (3848) BT: l2c_link_check_send_pkts
  1094. E (3858) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1095. E (3858) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1096. E (3868) BT: btm_bda_to_acl found
  1097. E (3868) BT: L2CAP - rcv_cid CID: 0x0004
  1098. E (3878) BT: gatt_get_ch_state: ch_state=4
  1099. E (3878) BT: gatt_process_error_rsp
  1100. E (3888) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1101. E (3888) BT: Discovery completed
  1102. E (3898) BT: gatt_end_operation status=0 op=1 subtype=3
  1103. E (3898) BT: GATTC_Discover conn_id=1 disc_type=4
  1104. E (3908) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1105. E (3918) BT: l2c_link_check_send_pkts
  1106. E (3918) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1107. E (3928) BT: l2c_link_send_to_lower
  1108. E (3928) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1109. E (3938) BT: l2c_link_check_send_pkts
  1110. E (3938) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1111. E (3948) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1112. E (3958) BT: btm_bda_to_acl found
  1113. E (3958) BT: L2CAP - rcv_cid CID: 0x0006
  1114. E (3968) BT:
  1115. SMDBG l2c smp_data_received
  1116. E (3968) BT: main smp_sm_event
  1117. E (3968) BT: SMP Role: Master
  1118.  State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [PAIR_PUBLIC_KEY_EVT (12)]
  1119. E (3978) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_PUBLIC_KEY_EXCH(7)
  1120. E (3988) BT: smp_process_pairing_public_key
  1121. E (3998) BT: smp_command_has_invalid_parameters for cmd code 0x0c
  1122. E (3998) BT: smp_command_has_valid_fixed_length for cmd code 0x0c
  1123. E (4008) BT: smp_wait_for_both_public_keys
  1124. E (4018) BT: main smp_sm_event
  1125. E (4018) BT: SMP Role: Master
  1126.  State: [SMP_STATE_PUBLIC_KEY_EXCH (7)], Event: [BOTH_PUBLIC_KEYS_RCVD_EVT (29)]
  1127. E (4028) BT: State change: SMP_STATE_PUBLIC_KEY_EXCH(7) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
  1128. E (4038) BT: smp_both_have_public_keys
  1129. E (4038) BT: smp_compute_dhkey
  1130. E (4098) BT: main smp_sm_event
  1131. E (4098) BT: SMP Role: Master
  1132.  State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [SEC_CONN_DHKEY_COMPLETE_EVT (30)]
  1133. E (4108) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
  1134. E (4118) BT: smp_start_secure_connection_phase1
  1135. E (4118) BT: p_cb->sec_level =1 (SMP_SEC_UNAUTHENTICATE)
  1136.  
  1137. E (4128) BT: smp_start_nonce_generation
  1138. E (4128) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1139. E (4138) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1140. E (4138) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1141. E (4148) BT: btm_bda_to_acl found
  1142. E (4158) BT: L2CAP - rcv_cid CID: 0x0006
  1143. E (4158) BT:
  1144. SMDBG l2c smp_data_received
  1145. E (4168) BT: in smp_data_received cmd = 0x03, peer_auth_req = 0x0d,loc_auth_req = 0x09
  1146. E (4168) BT: main smp_sm_event
  1147. E (4178) BT: SMP Role: Master
  1148.  State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [PAIR_COMMITMENT_EVT (15)]
  1149. E (4188) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_SEC_CONN_PHS1_START(8)
  1150. E (4198) BT: smp_process_pairing_commitment
  1151. E (4198) BT: smp_command_has_invalid_parameters for cmd code 0x0f
  1152. E (4208) BT: smp_command_has_valid_fixed_length for cmd code 0x0f
  1153. E (4218) BT: result state = SMP_STATE_SEC_CONN_PHS1_START
  1154. E (4218) BT: l2c_link_check_send_pkts
  1155. E (4228) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1156. E (4228) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1157. E (4238) BT: btm_bda_to_acl found
  1158. E (4238) BT: L2CAP - rcv_cid CID: 0x0004
  1159. E (4248) BT: gatt_get_ch_state: ch_state=4
  1160. E (4248) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1161. E (4258) BT: l2c_link_check_send_pkts
  1162. E (4268) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1163. E (4268) BT: l2c_link_send_to_lower
  1164. E (4278) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1165. E (4278) BT: btm_ble_rand_enc_complete
  1166. E (4288) BT: smp_rand_back state=0xd
  1167. E (4288) BT: smp_finish_nonce_generation
  1168. E (4298) BT: l2c_link_check_send_pkts
  1169. E (4298) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1170. E (4308) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1171. E (4318) BT: btm_bda_to_acl found
  1172. E (4318) BT: L2CAP - rcv_cid CID: 0x0004
  1173. E (4318) BT: gatt_get_ch_state: ch_state=4
  1174. E (4328) BT: gatt_process_error_rsp
  1175. E (4328) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1176. E (4338) BT: Discovery completed
  1177. E (4338) BT: gatt_end_operation status=0 op=1 subtype=4
  1178. E (4348) BT: starting discover characteristics descriptor
  1179. E (4358) BT: starting discover characteristics descriptor
  1180. E (4358) BT: starting discover characteristics descriptor
  1181. E (4368) BT: GATTC_Discover conn_id=1 disc_type=5
  1182. E (4368) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1183. E (4378) BT: l2c_link_check_send_pkts
  1184. E (4378) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1185. E (4388) BT: l2c_link_send_to_lower
  1186. E (4398) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1187. E (4398) BT: btm_ble_rand_enc_complete
  1188. E (4408) BT: smp_rand_back state=0xe
  1189. E (4408) BT: smp_process_new_nonce round 0
  1190. E (4418) BT: main smp_sm_event
  1191. E (4418) BT: SMP Role: Master
  1192.  State: [SMP_STATE_SEC_CONN_PHS1_START (8)], Event: [HAVE_LOCAL_NONCE_EVT (31)]
  1193. E (4428) BT: State change: SMP_STATE_SEC_CONN_PHS1_START(8) ==> SMP_STATE_WAIT_COMMITMENT(9)
  1194. E (4438) BT: smp_process_local_nonce
  1195. E (4438) BT: master in assoc mode = 4                     already rcvd slave commitment - race condition
  1196. E (4448) BT: smp_send_rand
  1197. E (4458) BT: smp_send_cmd on l2cap cmd_code=0x4
  1198. E (4458) BT: smp_build_rand_cmd
  1199. E (4468) BT: smp_send_msg_to_L2CAP
  1200. E (4468) BT: L2CA_SendFixedChnlData()  CID: 0x0006  BDA: 6789c2b071c6
  1201. E (4478) BT: l2c_link_check_send_pkts
  1202. E (4478) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1203. E (4488) BT: l2c_link_send_to_lower
  1204. E (4488) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1205. E (4498) BT: State change: SMP_STATE_WAIT_COMMITMENT(9) ==> SMP_STATE_WAIT_NONCE(10)
  1206. E (4508) BT: result state = SMP_STATE_WAIT_NONCE
  1207. E (4518) BT: l2c_link_check_send_pkts
  1208. E (4518) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1209. E (4528) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1210. E (4528) BT: btm_bda_to_acl found
  1211. E (4538) BT: L2CAP - rcv_cid CID: 0x0004
  1212. E (4538) BT: gatt_get_ch_state: ch_state=4
  1213. E (4548) BT: gatt_process_error_rsp
  1214. E (4548) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
  1215. E (4558) BT: Discovery completed
  1216. E (4558) BT: gatt_end_operation status=0 op=1 subtype=5
  1217. E (4568) BT: Start service discovery: srvc_idx = 2
  1218. E (4568) BT: GATTC_Discover conn_id=1 disc_type=3
  1219. E (4578) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1220. E (4588) BT: l2c_link_check_send_pkts
  1221. E (4588) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1222. E (4598) BT: l2c_link_send_to_lower
  1223. E (4598) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1224. E (4608) BT: l2c_link_check_send_pkts
  1225. E (4608) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1226. E (4618) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1227. E (4628) BT: btm_bda_to_acl found
  1228. E (4628) BT: L2CAP - rcv_cid CID: 0x0006
  1229. E (4628) BT:
  1230. SMDBG l2c smp_data_received
  1231. E (4638) BT: main smp_sm_event
  1232. E (4638) BT: SMP Role: Master
  1233.  State: [SMP_STATE_WAIT_NONCE (10)], Event: [RAND_EVT (4)]
  1234. E (4648) BT: State change: SMP_STATE_WAIT_NONCE(10) ==> SMP_STATE_SEC_CONN_PHS2_START(11)
  1235. E (4658) BT: smp_proc_rand
  1236. E (4658) BT: smp_command_has_invalid_parameters for cmd code 0x04
  1237. E (4668) BT: smp_command_has_valid_fixed_length for cmd code 0x04
  1238. E (4678) BT: smp_process_peer_nonce start
  1239. E (4678) BT: smp_check_commitment
  1240. E (4688) BT: smp_calculate_peer_commitment
  1241. E (4688) BT: smp_calculate_f4
  1242. E (4698) BT: aes_cipher_msg_auth_code
  1243. E (4698) BT: AES128_CMAC started, allocate buffer size = 80
  1244. E (4708) BT:  cmac_generate_subkey
  1245. E (4708) BT: smp_encrypt_data
  1246. E (4708) BT: cmac_subkey_cont
  1247. E (4718) BT: leftshift_onebit
  1248. E (4718) BT: leftshift_onebit
  1249. E (4728) BT: smp_xor_128
  1250. E (4728) BT: cmac_prepare_last_block
  1251. E (4728) BT: flag = 0 round = 5
  1252. E (4738) BT: smp_xor_128
  1253. E (4738) BT: cmac_aes_k_calculate
  1254. E (4738) BT: smp_xor_128
  1255. E (4748) BT: smp_encrypt_data
  1256. E (4748) BT: smp_xor_128
  1257. E (4758) BT: smp_encrypt_data
  1258. E (4758) BT: smp_xor_128
  1259. E (4758) BT: smp_encrypt_data
  1260. E (4768) BT: smp_xor_128
  1261. E (4768) BT: smp_encrypt_data
  1262. E (4768) BT: smp_xor_128
  1263. E (4778) BT: smp_encrypt_data
  1264. E (4778) BT: tlen = 16 p_mac = 0x3ffd5964
  1265. E (4788) BT: p_mac[0] = 0x52 p_mac[1] = 0xef p_mac[2] = 0x5e p_mac[3] = 0x49
  1266. E (4788) BT: p_mac[4] = 0x03 p_mac[5] = 0x25 p_mac[6] = 0xc6 p_mac[7] = 0x1b
  1267. E (4798) BT: peer commitment calculation is completed
  1268. E (4808) BT: Commitment check succeeds
  1269. E (4808) BT: main smp_sm_event
  1270. E (4818) BT: SMP Role: Master
  1271.  State: [SMP_STATE_SEC_CONN_PHS2_START (11)], Event: [SEC_CONN_PHASE1_CMPLT_EVT (32)]
  1272. E (4828) BT: State change: SMP_STATE_SEC_CONN_PHS2_START(11) ==> SMP_STATE_WAIT_DHK_CHECK(12)
  1273. E (4838) BT: smp_calculate_local_dhkey_check
  1274. E (4838) BT: smp_calculate_f5_mackey_and_long_term_key
  1275. E (4848) BT: smp_collect_local_ble_address
  1276. E (4848) BT: btm_bda_to_acl found
  1277. E (4858) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
  1278. E (4858) BT: smp_collect_peer_ble_address
  1279. E (4868) BT: btm_bda_to_acl found
  1280. E (4868) BT: smp_calculate_f5
  1281. E (4878) BT: smp_calculate_f5_key
  1282. E (4878) BT: aes_cipher_msg_auth_code
  1283. E (4878) BT: AES128_CMAC started, allocate buffer size = 32
  1284. E (4888) BT:  cmac_generate_subkey
  1285. E (4888) BT: smp_encrypt_data
  1286. E (4898) BT: cmac_subkey_cont
  1287. E (4898) BT: leftshift_onebit
  1288. E (4908) BT: smp_xor_128
  1289. E (4908) BT: leftshift_onebit
  1290. E (4908) BT: cmac_prepare_last_block
  1291. E (4918) BT: flag = 1 round = 2
  1292. E (4918) BT: smp_xor_128
  1293. E (4918) BT: cmac_aes_k_calculate
  1294. E (4928) BT: smp_xor_128
  1295. E (4928) BT: smp_encrypt_data
  1296. E (4938) BT: smp_xor_128
  1297. E (4938) BT: smp_encrypt_data
  1298. E (4938) BT: tlen = 16 p_mac = 0x3ffd58b4
  1299. E (4948) BT: p_mac[0] = 0x53 p_mac[1] = 0xd1 p_mac[2] = 0x42 p_mac[3] = 0xda
  1300. E (4948) BT: p_mac[4] = 0x90 p_mac[5] = 0x8f p_mac[6] = 0x6b p_mac[7] = 0x43
  1301. E (4958) BT: smp_calculate_f5_mackey_or_long_term_key
  1302. E (4968) BT: aes_cipher_msg_auth_code
  1303. E (4968) BT: AES128_CMAC started, allocate buffer size = 64
  1304. E (4978) BT:  cmac_generate_subkey
  1305. E (4978) BT: smp_encrypt_data
  1306. E (4988) BT: cmac_subkey_cont
  1307. E (4988) BT: leftshift_onebit
  1308. E (4988) BT: leftshift_onebit
  1309. E (4998) BT: cmac_prepare_last_block
  1310. E (4998) BT: flag = 0 round = 4
  1311. E (5008) BT: smp_xor_128
  1312. E (5008) BT: cmac_aes_k_calculate
  1313. E (5008) BT: smp_xor_128
  1314. E (5018) BT: smp_encrypt_data
  1315. E (5018) BT: smp_xor_128
  1316. E (5018) BT: smp_encrypt_data
  1317. E (5028) BT: smp_xor_128
  1318. E (5028) BT: smp_encrypt_data
  1319. E (5038) BT: smp_xor_128
  1320. E (5038) BT: smp_encrypt_data
  1321. E (5038) BT: tlen = 16 p_mac = 0x3ffd5894
  1322. E (5048) BT: p_mac[0] = 0x24 p_mac[1] = 0xef p_mac[2] = 0x08 p_mac[3] = 0x48
  1323. E (5048) BT: p_mac[4] = 0xd3 p_mac[5] = 0x0f p_mac[6] = 0x25 p_mac[7] = 0x16
  1324. E (5058) BT: smp_calculate_f5_mackey_or_long_term_key
  1325. E (5068) BT: aes_cipher_msg_auth_code
  1326. E (5068) BT: AES128_CMAC started, allocate buffer size = 64
  1327. E (5078) BT:  cmac_generate_subkey
  1328. E (5078) BT: smp_encrypt_data
  1329. E (5088) BT: cmac_subkey_cont
  1330. E (5088) BT: leftshift_onebit
  1331. E (5088) BT: leftshift_onebit
  1332. E (5098) BT: cmac_prepare_last_block
  1333. E (5098) BT: flag = 0 round = 4
  1334. E (5108) BT: smp_xor_128
  1335. E (5108) BT: cmac_aes_k_calculate
  1336. E (5108) BT: smp_xor_128
  1337. E (5118) BT: smp_encrypt_data
  1338. E (5118) BT: smp_xor_128
  1339. E (5118) BT: smp_encrypt_data
  1340. E (5128) BT: smp_xor_128
  1341. E (5128) BT: smp_encrypt_data
  1342. E (5138) BT: smp_xor_128
  1343. E (5138) BT: smp_encrypt_data
  1344. E (5138) BT: tlen = 16 p_mac = 0x3ffd5894
  1345. E (5148) BT: p_mac[0] = 0x11 p_mac[1] = 0x61 p_mac[2] = 0x6d p_mac[3] = 0x56
  1346. E (5148) BT: p_mac[4] = 0xb0 p_mac[5] = 0x65 p_mac[6] = 0x10 p_mac[7] = 0xc2
  1347. E (5158) BT: smp_calculate_f5_mackey_and_long_term_key is completed
  1348. E (5168) BT: smp_collect_local_io_capabilities
  1349. E (5168) BT: smp_collect_local_ble_address
  1350. E (5178) BT: btm_bda_to_acl found
  1351. E (5178) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
  1352. E (5188) BT: smp_collect_peer_ble_address
  1353. E (5198) BT: btm_bda_to_acl found
  1354. E (5198) BT: smp_calculate_f6
  1355. E (5198) BT: aes_cipher_msg_auth_code
  1356. E (5208) BT: AES128_CMAC started, allocate buffer size = 80
  1357. E (5208) BT:  cmac_generate_subkey
  1358. E (5218) BT: smp_encrypt_data
  1359. E (5218) BT: cmac_subkey_cont
  1360. E (5228) BT: leftshift_onebit
  1361. E (5228) BT: leftshift_onebit
  1362. E (5228) BT: cmac_prepare_last_block
  1363. E (5238) BT: flag = 0 round = 5
  1364. E (5238) BT: smp_xor_128
  1365. E (5238) BT: cmac_aes_k_calculate
  1366. E (5248) BT: smp_xor_128
  1367. E (5248) BT: smp_encrypt_data
  1368. E (5258) BT: smp_xor_128
  1369. E (5258) BT: smp_encrypt_data
  1370. E (5258) BT: smp_xor_128
  1371. E (5268) BT: smp_encrypt_data
  1372. E (5268) BT: smp_xor_128
  1373. E (5268) BT: smp_encrypt_data
  1374. E (5278) BT: smp_xor_128
  1375. E (5278) BT: smp_encrypt_data
  1376. E (5278) BT: tlen = 16 p_mac = 0x3ffd5914
  1377. E (5288) BT: p_mac[0] = 0xe9 p_mac[1] = 0x76 p_mac[2] = 0xfe p_mac[3] = 0x83
  1378. E (5298) BT: p_mac[4] = 0xfe p_mac[5] = 0xde p_mac[6] = 0xad p_mac[7] = 0x7b
  1379. E (5298) BT: local DHKey check calculation is completed
  1380. E (5308) BT: smp_send_dhkey_check
  1381. E (5308) BT: smp_send_cmd on l2cap cmd_code=0xd
  1382. E (5318) BT: smp_build_pair_dhkey_check_cmd
  1383. E (5318) BT: smp_send_msg_to_L2CAP
  1384. E (5328) BT: L2CA_SendFixedChnlData()  CID: 0x0006  BDA: 6789c2b071c6
  1385. E (5338) BT: l2c_link_check_send_pkts
  1386. E (5338) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1387. E (5348) BT: l2c_link_send_to_lower
  1388. E (5348) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1389. E (5358) BT: result state = SMP_STATE_WAIT_DHK_CHECK
  1390. E (5358) BT: smp_process_peer_nonce end
  1391.  
  1392. E (5368) BT: result state = SMP_STATE_WAIT_DHK_CHECK
  1393. E (5378) BT: l2c_link_check_send_pkts
  1394. E (5378) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1395. E (5388) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1396. E (5388) BT: btm_bda_to_acl found
  1397. E (5398) BT: L2CAP - rcv_cid CID: 0x0004
  1398. E (5398) BT: gatt_get_ch_state: ch_state=4
  1399. E (5408) BT: gatt_process_error_rsp
  1400. E (5408) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1401. E (5418) BT: Discovery completed
  1402. E (5418) BT: gatt_end_operation status=0 op=1 subtype=3
  1403. E (5428) BT: GATTC_Discover conn_id=1 disc_type=4
  1404. E (5428) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1405. E (5438) BT: l2c_link_check_send_pkts
  1406. E (5438) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1407. E (5448) BT: l2c_link_send_to_lower
  1408. E (5458) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1409. E (5458) BT: l2c_link_check_send_pkts
  1410. E (5468) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1411. E (5468) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1412. E (5478) BT: btm_bda_to_acl found
  1413. E (5478) BT: L2CAP - rcv_cid CID: 0x0006
  1414. E (5488) BT:
  1415. SMDBG l2c smp_data_received
  1416. E (5488) BT: main smp_sm_event
  1417. E (5498) BT: SMP Role: Master
  1418.  State: [SMP_STATE_WAIT_DHK_CHECK (12)], Event: [PAIR_DHKEY_CHECK_EVT (13)]
  1419. E (5508) BT: State change: SMP_STATE_WAIT_DHK_CHECK(12) ==> SMP_STATE_DHK_CHECK(13)
  1420. E (5518) BT: smp_process_dhkey_check
  1421. E (5518) BT: smp_command_has_invalid_parameters for cmd code 0x0d
  1422. E (5528) BT: smp_command_has_valid_fixed_length for cmd code 0x0d
  1423. E (5528) BT: smp_calculate_peer_dhkey_check
  1424. E (5538) BT: smp_collect_peer_io_capabilities
  1425. E (5538) BT: smp_collect_local_ble_address
  1426. E (5548) BT: btm_bda_to_acl found
  1427. E (5548) BT: BTM_ReadConnectionAddr address type: 1 addr: 0x78
  1428. E (5558) BT: smp_collect_peer_ble_address
  1429. E (5568) BT: btm_bda_to_acl found
  1430. E (5568) BT: smp_calculate_f6
  1431. E (5568) BT: aes_cipher_msg_auth_code
  1432. E (5578) BT: AES128_CMAC started, allocate buffer size = 80
  1433. E (5578) BT:  cmac_generate_subkey
  1434. E (5588) BT: smp_encrypt_data
  1435. E (5588) BT: cmac_subkey_cont
  1436. E (5598) BT: leftshift_onebit
  1437. E (5598) BT: leftshift_onebit
  1438. E (5598) BT: cmac_prepare_last_block
  1439. E (5608) BT: flag = 0 round = 5
  1440. E (5608) BT: smp_xor_128
  1441. E (5608) BT: cmac_aes_k_calculate
  1442. E (5618) BT: smp_xor_128
  1443. E (5618) BT: smp_encrypt_data
  1444. E (5628) BT: smp_xor_128
  1445. E (5628) BT: smp_encrypt_data
  1446. E (5628) BT: smp_xor_128
  1447. E (5638) BT: smp_encrypt_data
  1448. E (5638) BT: smp_xor_128
  1449. E (5638) BT: smp_encrypt_data
  1450. E (5648) BT: smp_xor_128
  1451. E (5648) BT: smp_encrypt_data
  1452. E (5648) BT: tlen = 16 p_mac = 0x3ffd5974
  1453. E (5658) BT: p_mac[0] = 0xdf p_mac[1] = 0x25 p_mac[2] = 0xdb p_mac[3] = 0xca
  1454. E (5668) BT: p_mac[4] = 0x43 p_mac[5] = 0x8f p_mac[6] = 0xe4 p_mac[7] = 0x5b
  1455. E (5668) BT: peer DHKey check calculation is completed
  1456. E (5678) BT: main smp_sm_event
  1457. E (5678) BT: SMP Role: Master
  1458.  State: [SMP_STATE_DHK_CHECK (13)], Event: [SEC_CONN_KEY_READY_EVT (37)]
  1459. E (5688) BT: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_DHK_CHECK(13)
  1460. E (5698) BT: smp_match_dhkey_checks
  1461. E (5708) BT: dhkey chcks match
  1462. E (5708) BT: main smp_sm_event
  1463. E (5708) BT: SMP Role: Master
  1464.  State: [SMP_STATE_DHK_CHECK (13)], Event: [ENC_REQ_EVT (24)]
  1465. E (5718) BT: State change: SMP_STATE_DHK_CHECK(13) ==> SMP_STATE_ENCRYPTION_PENDING(14)
  1466. E (5728) BT: smp_generate_stk
  1467. E (5738) BT: FOR LE SC LTK IS USED INSTEAD OF STK
  1468. E (5738) BT: smp_process_stk
  1469. E (5738) BT: smp_mask_enc_key
  1470. E (5748) BT: main smp_sm_event
  1471. E (5748) BT: SMP Role: Master
  1472.  State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [KEY_READY_EVT (16)]
  1473. E (5758) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
  1474. E (5768) BT: smp_start_enc
  1475. E (5778) BT: btm_ble_start_encrypt
  1476. E (5778) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1477. E (5788) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1478. E (5788) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1479. E (5798) BT: result state = SMP_STATE_ENCRYPTION_PENDING
  1480. E (5798) BT: l2c_link_check_send_pkts
  1481. E (5808) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1482. E (5818) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1483. E (5818) BT: btm_bda_to_acl found
  1484. E (5828) BT: L2CAP - rcv_cid CID: 0x0004
  1485. E (5828) BT: gatt_get_ch_state: ch_state=4
  1486. E (5838) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1487. E (5838) BT: l2c_link_check_send_pkts
  1488. E (5848) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1489. E (5848) BT: l2c_link_send_to_lower
  1490. E (5858) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1491. E (5868) BT: btm_acl_encrypt_change handle=0 status=0 encr_enabl=1
  1492. E (5868) BT: btm_handle_to_acl_index
  1493. E (5878) BT: btm_handle_to_acl_index
  1494. E (5878) BT: Security Manager: encrypt_change status:0 State:1, encr_enable = 1
  1495. E (5888) BT: before update p_dev_rec->sec_flags=0x1080
  1496. E (5898) BT: after update p_dev_rec->sec_flags=0x1680
  1497. E (5898) BT: btm_ble_link_encrypted encr_enable=1
  1498. E (5908) BT: smp_link_encrypted encr_enable=1
  1499. E (5908) BT: btm_ble_update_sec_key_size enc_key_size = 16
  1500. E (5918) BT: main smp_sm_event
  1501. E (5918) BT: SMP Role: Master
  1502.  State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [ENCRYPTED_EVT (17)]
  1503. E (5928) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_ENCRYPTION_PENDING(14)
  1504. E (5938) BT: smp_check_auth_req rcvs enc_enable=1 i_keys=0x3 r_keys=0x7 (i-initiator r-responder)
  1505. E (5948) BT: smp_check_auth_req rcvs upgrades: i_keys=0x3 r_keys=0x6 (i-initiator r-responder)
  1506. E (5958) BT: main smp_sm_event
  1507. E (5958) BT: SMP Role: Master
  1508.  State: [SMP_STATE_ENCRYPTION_PENDING (14)], Event: [BOND_REQ_EVT (25)]
  1509. E (5968) BT: State change: SMP_STATE_ENCRYPTION_PENDING(14) ==> SMP_STATE_BOND_PENDING(15)
  1510. E (5978) BT:
  1511. smp_key_distribution role=0 (0-master) r_keys=0x6 i_keys=0x3
  1512. E (5988) BT: result state = SMP_STATE_BOND_PENDING
  1513. E (5998) BT: result state = SMP_STATE_BOND_PENDING
  1514. E (5998) BT:  p_dev_rec->sec_flags=0x1680
  1515. E (6008) BT: bta_gattc_enc_cmpl_cback: cif = 1
  1516. E (6008) BT: btm_bda_to_acl found
  1517. E (6018) BT: L2CAP - rcv_cid CID: 0x0006
  1518. E (6018) BT:
  1519. SMDBG l2c smp_data_received
  1520. E (6028) BT: main smp_sm_event
  1521. E (6028) BT: SMP Role: Master
  1522.  State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_INFO_EVT (8)]
  1523. E (6038) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
  1524. E (6048) BT: smp_proc_id_info
  1525. E (6048) BT: smp_key_distribution_by_transport
  1526. E (6058) BT:
  1527. smp_key_distribution role=0 (0-master) r_keys=0x6 i_keys=0x3
  1528. E (6068) BT: result state = SMP_STATE_BOND_PENDING
  1529. E (6068) BT: btm_bda_to_acl found
  1530. E (6068) BT: L2CAP - rcv_cid CID: 0x0006
  1531. E (6078) BT:
  1532. SMDBG l2c smp_data_received
  1533. E (6078) BT: main smp_sm_event
  1534. E (6088) BT: SMP Role: Master
  1535.  State: [SMP_STATE_BOND_PENDING (15)], Event: [ID_ADDR_EVT (9)]
  1536. E (6098) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
  1537. E (6108) BT: smp_proc_id_addr
  1538. E (6108) BT: smp_update_key_mask before update role=0 recv=1 local_i_key = 03, local_r_key = 06
  1539. E (6118) BT: updated local_i_key = 03, local_r_key = 04
  1540. E (6128) BT: btm_sec_save_le_key key_type=0x2 pass_to_application=1
  1541. E (6128) BT: bd_addr:67-89-c2-b0-71-c6
  1542. E (6138) BT: BTM_LE_KEY_PID key_type=0x2 save peer IRK
  1543. E (6138) BT: btm_consolidate_dev
  1544. E (6148) BT: BLE key type 0x02 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1545. E (6158) BT: smp_key_distribution_by_transport
  1546. E (6158) BT:
  1547. smp_key_distribution role=0 (0-master) r_keys=0x4 i_keys=0x3
  1548. E (6168) BT: result state = SMP_STATE_BOND_PENDING
  1549. E (6168) BT: btm_bda_to_acl found
  1550. E (6178) BT: L2CAP - rcv_cid CID: 0x0006
  1551. E (6178) BT:
  1552. SMDBG l2c smp_data_received
  1553. I (6188) GAPCallback: key type = ESP_LE_KEY_PID
  1554. E (6188) BT: main smp_sm_event
  1555. E (6198) BT: SMP Role: Master
  1556.  State: [SMP_STATE_BOND_PENDING (15)], Event: [SIGN_INFO_EVT (10)]
  1557. E (6208) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_BOND_PENDING(15)
  1558. E (6208) BT: smp_proc_srk_info
  1559. E (6218) BT: smp_update_key_mask before update role=0 recv=1 local_i_key = 03, local_r_key = 04
  1560. E (6228) BT: updated local_i_key = 03, local_r_key = 00
  1561. E (6228) BT: btm_sec_save_le_key key_type=0x4 pass_to_application=1
  1562. E (6238) BT: bd_addr:67-89-c2-b0-71-c6
  1563. E (6248) BT: BTM_LE_KEY_PCSRK key_type=0x6 sec_flags=0x1680 sec_level=0x1 peer_counter=0
  1564. E (6248) BT: BLE key type 0x04 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1565. E (6258) BT: smp_key_distribution_by_transport
  1566. E (6268) BT:
  1567. smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x3
  1568. E (6278) BT: smp_key_pick_key key_to_dist=0x3
  1569. E (6278) BT: key to send = 03, i = 0
  1570. E (6288) BT: smp_distribute_act[0]
  1571. E (6288) BT: smp_generate_ltk
  1572. E (6288) BT: smp_process_secure_connection_long_term_key
  1573. E (6298) BT: smp_save_secure_connections_long_term_key-Save LTK as local LTK key
  1574. E (6308) BT: btm_sec_save_le_key key_type=0x10 pass_to_application=1
  1575. E (6308) BT: bd_addr:67-89-c2-b0-71-c6
  1576. E (6318) BT: BTM_LE_KEY_LENC key_type=0x16 DIV=0x0 key_size=0x10 sec_level=0x1
  1577. E (6328) BT: BLE key type 0x10 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1578. E (6338) BT: smp_save_secure_connections_long_term_key-Save LTK as peer LTK key
  1579. E (6338) BT: btm_sec_save_le_key key_type=0x1 pass_to_application=1
  1580. E (6348) BT: bd_addr:67-89-c2-b0-71-c6
  1581. E (6348) BT: BTM_LE_KEY_PENC key_type=0x17 sec_flags=0x1680 sec_leve=0x1
  1582. E (6358) BT: BLE key type 0x01 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1583. E (6368) BT: smp_update_key_mask before update role=0 recv=0 local_i_key = 03, local_r_key = 00
  1584. E (6378) BT: updated local_i_key = 02, local_r_key = 00
  1585. E (6388) BT:
  1586. smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x2
  1587. E (6388) BT: smp_key_pick_key key_to_dist=0x2
  1588. E (6398) BT: key to send = 02, i = 0
  1589. E (6398) BT: key to send = 02, i = 1
  1590. E (6408) BT: smp_distribute_act[1]
  1591. E (6408) BT: smp_send_id_info
  1592. E (6418) BT: smp_update_key_mask before update role=0 recv=0 local_i_key = 02, local_r_key = 00
  1593. E (6428) BT: updated local_i_key = 00, local_r_key = 00
  1594. E (6428) BT: smp_send_cmd on l2cap cmd_code=0x8
  1595. E (6438) BT: smp_build_identity_info_cmd
  1596. E (6438) BT: BTM_GetDeviceIDRoot
  1597. E (6448) BT: smp_send_msg_to_L2CAP
  1598. E (6448) BT: L2CA_SendFixedChnlData()  CID: 0x0006  BDA: 6789c2b071c6
  1599. E (6458) BT: l2c_link_check_send_pkts
  1600. E (6458) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1601. E (6468) BT: l2c_link_send_to_lower
  1602. E (6468) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1603. I (6478) GAPCallback: key type = ESP_LE_KEY_PCSRK
  1604. I (6478) GAPCallback: key type = ESP_LE_KEY_LENC
  1605. I (6488) GAPCallback: key type = ESP_LE_KEY_PENC
  1606. E (6498) BT: smp_send_cmd on l2cap cmd_code=0x9
  1607. E (6498) BT: smp_build_id_addr_cmd
  1608. E (6508) BT: smp_send_msg_to_L2CAP
  1609. E (6508) BT: L2CA_SendFixedChnlData()  CID: 0x0006  BDA: 6789c2b071c6
  1610. E (6518) BT: l2c_link_check_send_pkts
  1611. E (6518) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1612. E (6528) BT: l2c_link_send_to_lower
  1613. E (6528) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
  1614. E (6538) BT: btm_sec_save_le_key key_type=0x20 pass_to_application=1
  1615. E (6548) BT: bd_addr:67-89-c2-b0-71-c6
  1616. E (6548) BT: BLE key type 0x20 updated for BDA: 6789c2b071c6 (btm_sec_save_le_key)
  1617. E (6558) BT: smp_key_distribution_by_transport
  1618. E (6558) BT:
  1619. smp_key_distribution role=0 (0-master) r_keys=0x0 i_keys=0x0
  1620. E (6568) BT: smp_key_pick_key key_to_dist=0x0
  1621. E (6578) BT: key to send = 00, i = 0
  1622. E (6578) BT: key to send = 00, i = 1
  1623. E (6588) BT: key to send = 00, i = 2
  1624. E (6588) BT: key to send = 00, i = 3
  1625. E (6588) BT: main smp_sm_event
  1626. E (6598) BT: SMP Role: Master
  1627.  State: [SMP_STATE_BOND_PENDING (15)], Event: [AUTH_CMPL_EVT (23)]
  1628. E (6608) BT: State change: SMP_STATE_BOND_PENDING(15) ==> SMP_STATE_IDLE(0)
  1629. E (6618) BT: smp_send_pair_fail status=0 failure=0
  1630. E (6618) BT: smp_proc_pairing_cmpl
  1631. E (6628) BT: send SMP_COMPLT_EVT reason=0x0 sec_level=0x1
  1632. E (6628) BT: smp_reset_control_value
  1633. I (6638) GAPCallback: key type = ESP_LE_KEY_LID
  1634. E (6638) BT: smp_remove_fixed_channel
  1635. E (6648) BT: L2CA_RemoveFixedChnl()  CID: 0x0006  BDA: 6789c2b071c6
  1636. E (6648) BT: l2cu_release_ccb: cid 0x0006  in_use: 1
  1637. E (6658) BT: smp_cb_cleanup
  1638. E (6658) BT: btm_proc_smp_cback event = 7
  1639. 0x40101090: bta_dm_ble_smp_cback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/bta/dm/bta_dm_act.c:4189
  1640. E (6668) BT: btm_cb.api.p_le_callback=0x40101090
  1641. E (6668) BT: BTM_InqDbRead: bd addr [6789c2b071c6]
  1642. E (6678) BT: btm_find_dev_type - device_type = 2 addr_type = 0
  1643. E (6678) BT: evt=SMP_COMPLT_EVT before update sec_level=0x1 sec_flags=0x1680
  1644. E (6688) BT: after update result=0 sec_level=0x1 sec_flags=0x1680
  1645. E (6698) BT: btm_cb pairing_state=0 pairing_flags=80 pin_code_len=0
  1646. E (6708) BT: btm_cb.pairing_bda 67:89:c2:b0:71:c6
  1647. E (6708) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 2
  1648. E (6718) BT: btm_ble_resolving_list_load_dev btm_cb.ble_ctr_cb.privacy_mode = 2
  1649. E (6728) BT: btm_ble_suspend_bg_conn
  1650. E (6728) BT: btm_ble_resolving_list_load_dev:adding device to controller resolving list
  1651. E (6738) BT: btm_ble_suspend_bg_conn
  1652. E (6748) BT: btm_bda_to_acl found
  1653. E (6748) BT: Security Manager: BTM_SetEncryption already encrypted
  1654. 0x40137024: btc_set_encryption_callback at /home/fhfs/ESP/BEASTv3/esp-idf/components/bt/bluedroid/btc/profile/std/gap/btc_gap_ble.c:722
  1655. E (6758) BT: bta_dm_encrypt_cback status =0 p_callback=0x40137024
  1656. E (6758) BT: result state = SMP_STATE_IDLE
  1657. E (6768) BT: result state = SMP_STATE_IDLE
  1658. E (6768) BT: l2c_link_check_send_pkts
  1659. E (6778) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1660. E (6778) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
  1661. E (6788) BT: btm_bda_to_acl found
  1662. E (6798) BT: L2CAP - rcv_cid CID: 0x0004
  1663. E (6798) BT: gatt_get_ch_state: ch_state=4
  1664. I (6858) GAPCallback: remote BD_ADDR: 6789c2b071c6
  1665. I (6858) GAPCallback: address type = 0
  1666. I (6858) GAPCallback: pair status = success
  1667. E (6868) BT: gatt_process_error_rsp
  1668. E (6868) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0008
  1669. E (6878) BT: Discovery completed
  1670. E (6878) BT: gatt_end_operation status=0 op=1 subtype=4
  1671. E (6888) BT: starting discover characteristics descriptor
  1672. E (6888) BT: GATTC_Discover conn_id=1 disc_type=5
  1673. E (6898) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1674. E (6908) BT: l2c_link_check_send_pkts
  1675. E (6908) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1676. E (6918) BT: l2c_link_send_to_lower
  1677. E (6918) BT: TotalWin=7,Hndl=0x0,Quota=10,Unack=3,RRQuota=0,RRUnack=0
  1678. E (6928) BT: BTA got event 0x1f18
  1679. E (6928) BT: l2c_link_check_send_pkts
  1680. E (6938) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1681. E (6938) BT: TotalWin=8,LinkUnack(0x0)=2,RRCheck=0,RRUnack=0
  1682. E (6948) BT: l2c_link_check_send_pkts
  1683. E (6948) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1684. E (6958) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1685. E (6968) BT: btm_bda_to_acl found
  1686. E (6968) BT: L2CAP - rcv_cid CID: 0x0005
  1687. E (6978) BT: l2c_link_check_send_pkts
  1688. E (6978) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1689. E (6988) BT: l2c_link_send_to_lower
  1690. E (6988) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1691. E (6998) BT: btm_bda_to_acl found
  1692. E (6998) BT: L2CAP - rcv_cid CID: 0x0004
  1693. E (7008) BT: gatt_get_ch_state: ch_state=4
  1694. E (7008) BT: btm_ble_add_resolving_list_entry_complete status = 0
  1695. E (7018) BT: l2c_link_check_send_pkts
  1696. E (7018) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1697. E (7028) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1698. E (7038) BT: btm_bda_to_acl found
  1699. E (7038) BT: L2CAP - rcv_cid CID: 0x0004
  1700. E (7048) BT: gatt_get_ch_state: ch_state=4
  1701. E (7048) BT: gatt_end_operation status=0 op=1 subtype=5
  1702. E (7058) BT: starting discover characteristics descriptor
  1703. E (7058) BT: GATTC_Discover conn_id=1 disc_type=5
  1704. E (7068) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1705. E (7078) BT: l2c_link_check_send_pkts
  1706. E (7078) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1707. E (7088) BT: l2c_link_send_to_lower
  1708. E (7088) BT: TotalWin=8,Hndl=0x0,Quota=10,Unack=2,RRQuota=0,RRUnack=0
  1709. E (7098) BT: l2c_link_check_send_pkts
  1710. E (7098) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1711. E (7108) BT: TotalWin=9,LinkUnack(0x0)=1,RRCheck=0,RRUnack=0
  1712. E (7118) BT: BLE HCI(id=62) event = 0x03)
  1713. E (7118) BT: l2cble_process_conn_update_evt: conn_update_mask=8
  1714. E (7128) BT: l2c_link_check_send_pkts
  1715. E (7128) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1716. E (7138) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1717. E (7148) BT: btm_bda_to_acl found
  1718. E (7148) BT: L2CAP - rcv_cid CID: 0x0004
  1719. E (7148) BT: gatt_get_ch_state: ch_state=4
  1720. I (7158) GAPCallback: update connection params status = 0, min_int = 12, max_int = 12,conn_int = 12,latency = 0, timeout = 600
  1721. E (7168) BT: gatt_end_operation status=0 op=1 subtype=5
  1722. E (7178) BT: starting discover characteristics descriptor
  1723. E (7178) BT: GATTC_Discover conn_id=1 disc_type=5
  1724. E (7188) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1725. E (7198) BT: l2c_link_check_send_pkts
  1726. E (7198) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1727. E (7208) BT: l2c_link_send_to_lower
  1728. E (7208) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1729. E (7218) BT: l2c_link_check_send_pkts
  1730. E (7218) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1731. E (7228) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1732. E (7238) BT: btm_bda_to_acl found
  1733. E (7238) BT: L2CAP - rcv_cid CID: 0x0004
  1734. E (7238) BT: gatt_get_ch_state: ch_state=4
  1735. E (7248) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1736. E (7258) BT: l2c_link_check_send_pkts
  1737. E (7258) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1738. E (7268) BT: l2c_link_send_to_lower
  1739. E (7268) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1740. E (7278) BT: l2c_link_check_send_pkts
  1741. E (7278) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1742. E (7288) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1743. E (7298) BT: btm_bda_to_acl found
  1744. E (7298) BT: L2CAP - rcv_cid CID: 0x0004
  1745. E (7308) BT: gatt_get_ch_state: ch_state=4
  1746. E (7308) BT: gatt_process_error_rsp
  1747. E (7318) BT: gatt_proc_disc_error_rsp reason: 0a cmd_code 0004
  1748. E (7318) BT: Discovery completed
  1749. E (7328) BT: gatt_end_operation status=0 op=1 subtype=5
  1750. E (7328) BT: Start service discovery: srvc_idx = 3
  1751. E (7338) BT: L2CA_EnableUpdateBleConnParams - BD_ADDR 6789c2b071c6 enable 1 current upd state 0x08
  1752. E (7348) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  1753. E (7638) BT: bta_gattc_disc_cmpl conn_id=1, status = 0
  1754. E (7638) BT: +++++++++++++++++++++++++++++++++++++++++++++++++++++++= 0x3ffcaac4
  1755. E (7638) BT: GATTC_ConfigureMTU conn_id=1 mtu=200
  1756. E (7638) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1757. E (7648) BT: l2c_link_check_send_pkts
  1758. E (7658) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1759. E (7658) BT: l2c_link_send_to_lower
  1760. E (7668) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1761. E (7678) BT: l2c_link_check_send_pkts
  1762. E (7678) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1763. E (7688) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1764. E (7688) BT: btm_bda_to_acl found
  1765. E (7698) BT: L2CAP - rcv_cid CID: 0x0004
  1766. E (7698) BT: gatt_get_ch_state: ch_state=4
  1767. E (7708) BT: l2cble_set_fixed_channel_tx_data_length TX MTU = 200
  1768. E (7708) BT: l2cble_update_data_length
  1769. E (7718) BT: btm_bda_to_acl found
  1770. E (7718) BT: BTM_SetBleDataLength: tx_pdu_length =204
  1771. E (7728) BT: gatt_end_operation status=0 op=5 subtype=0
  1772. E (7728) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 5 status = 0
  1773. E (7738) BT: BTA got event 0x1f10
  1774. E (7738) BT: bta_gattc_op_cmpl op = 5
  1775. W (7748) GATTCallback: GATT CALLBACK: 18
  1776. I (7748) GATTCallback: ESP_GATTC_CFG_MTU_EVT status 0 mtu 200, conn_id 0
  1777. E (7748) BT: BLE HCI(id=62) event = 0x07)
  1778. E (7768) BT: l2cble_process_data_length_change_event TX data len = 204
  1779. E (7768) BT: btm_handle_to_acl_index
  1780. E (7778) BT: BTA got event 0x1f09
  1781. E (7778) BT: bta_gattc_search conn_id=1
  1782. W (7788) GATTCallback: GATT CALLBACK: 7
  1783. I (7788) GATTCallback: SEARCH_RES_EVT ff, conn_id: 0
  1784. W (7798) GATTCallback: GATT CALLBACK: 6
  1785. I (7798) GATTCallback: SEARCH_CMPL_EVT
  1786. E (17798) BT: BTA got event 0x1f04
  1787. E (17798) BT: GATTC_Read conn_id=1 type=2
  1788. E (17798) BT: btm_ble_link_sec_check auth_req =0x3
  1789. E (17798) BT: dev_rec sec_flags=0x1680
  1790. E (17798) BT: cur_sec_level=4 req_sec_level=1 sec_req_act=1
  1791. E (17808) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1792. E (17818) BT: l2c_link_check_send_pkts
  1793. E (17818) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1794. E (17828) BT: l2c_link_send_to_lower
  1795. E (17828) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1796. E (17838) BT: l2c_link_check_send_pkts
  1797. E (17838) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1798. E (17848) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1799. E (17858) BT: btm_bda_to_acl found
  1800. E (17858) BT: L2CAP - rcv_cid CID: 0x0004
  1801. E (17868) BT: gatt_get_ch_state: ch_state=4
  1802. E (17868) BT: gatt_process_error_rsp
  1803. E (17878) BT: gatt_end_operation status=1 op=2 subtype=2
  1804. E (17878) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 2 status = 1
  1805. E (17888) BT: BTA got event 0x1f10
  1806. E (17888) BT: bta_gattc_op_cmpl op = 2
  1807. W (17898) GATTCallback: GATT CALLBACK: 3
  1808. E (17898) GATTCallback: read_char called with status 0x1
  1809. E (27908) BT: BTA got event 0x1f04
  1810. E (27908) BT: GATTC_Read conn_id=1 type=2
  1811. E (27908) BT: btm_ble_link_sec_check auth_req =0x3
  1812. E (27908) BT: dev_rec sec_flags=0x1680
  1813. E (27908) BT: cur_sec_level=4 req_sec_level=1 sec_req_act=1
  1814. E (27918) BT: L2CA_SendFixedChnlData()  CID: 0x0004  BDA: 6789c2b071c6
  1815. E (27928) BT: l2c_link_check_send_pkts
  1816. E (27928) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1817. E (27938) BT: l2c_link_send_to_lower
  1818. E (27938) BT: TotalWin=9,Hndl=0x0,Quota=10,Unack=1,RRQuota=0,RRUnack=0
  1819. E (27948) BT: l2c_link_check_send_pkts
  1820. E (27948) BT: partial_segment_being_sent=0,link_state=4,power_mode=0
  1821. E (27958) BT: TotalWin=10,LinkUnack(0x0)=0,RRCheck=0,RRUnack=0
  1822. E (27968) BT: btm_bda_to_acl found
  1823. E (27968) BT: L2CAP - rcv_cid CID: 0x0004
  1824. E (27978) BT: gatt_get_ch_state: ch_state=4
  1825. E (27978) BT: gatt_process_error_rsp
  1826. E (27988) BT: gatt_end_operation status=1 op=2 subtype=2
  1827. E (27988) BT: bta_gattc_cmpl_cback: conn_id = 1 op = 2 status = 1
  1828. E (27998) BT: BTA got event 0x1f10
  1829. E (27998) BT: bta_gattc_op_cmpl op = 2
  1830. W (28008) GATTCallback: GATT CALLBACK: 3
  1831. E (28008) GATTCallback: read_char called with status 0x1
  1832. E (36578) BT: l2cu_release_ccb: cid 0x0004  in_use: 1
  1833. E (36578) BT: GATT   ATT protocol channel with BDA: 6789c2b071c6 is disconnected
  1834. E (36588) BT: gatt_is_bda_in_the_srv_chg_clt_list :67-89-c2-b0-71-c6
  1835. E (36588) BT: bda is in the srv chg clt list
  1836. E (36598) BT: btm_sec_is_a_bonded_dev() is_bonded=1
  1837. E (36598) BT: gatt_add_srv_chg_clt
  1838. E (36608) BT: enqueue a srv chg client
  1839. E (36608) BT: gatt_cleanup_upon_disc
  1840. E (36618) BT: found p_tcb
  1841. E (36618) BT: gatt_set_ch_state: old=4 new=0
  1842. E (36628) BT: gatt_free_pending_ind
  1843. E (36628) BT: gatt_free_pending_enc_queue
  1844. E (36628) BT: gatt_free_pending_prepare_write_queue
  1845. E (36638) BT: found p_reg tcb_idx=0 gatt_if=1  conn_id=0x1
  1846. E (36648) BT: bta_gattc_conn_cback() - cif=1 connected=0 conn_id=1 reason=0x0013
  1847. E (36648) BT: ATT disconnected
  1848. E (36658) BT: SMDBG l2c smp_connect_callback
  1849. E (36658) BT: btm_acl_removed
  1850. E (36668) BT: btm_bda_to_acl found
  1851. E (36668) BT: btm_acl_report_role_change
  1852. E (36678) BT: btm_acl_update_busy_level
  1853. E (36678) BT: BTM_BLI_ACL_DOWN_EVT
  1854. E (36688) BT: acl hci_handle=0 transport=2 connectable_mode=0x0 link_role=0
  1855. E (36688) BT: before update p_dev_rec->sec_flags=0x1680
  1856. E (36698) BT: LE link down
  1857. E (36698) BT: Bonded
  1858. E (36708) BT: after update p_dev_rec->sec_flags=0x1280
  1859. E (36708) BT: btm_acl_resubmit_page
  1860. E (36718) BT: btm_sec_disconnected sec_req:x0 state:IDLE reason:19 bd_addr:00:ec:0a:47:ba:e3  remote_name:
  1861. E (36728) BT: btm_sec_disconnected before update sec_flags=0x1280
  1862. E (36728) BT: btm_sec_disconnected after update sec_flags=0x1080
  1863. E (36738) BT: BTA got event 0x1f11
  1864. E (36738) BT: bta_gattc_close conn_id=1
  1865. E (36748) BT: BTA got event 0x104
  1866. E (36748) BT: bta_dm_sm_execute event:0x4
  1867. E (36758) BT: btm_get_acl_disc_reason_code
  1868. E (36758) BT: L2CA_SetDesireRole() new:x1, disallow_switch:0
  1869. E (36768) BT: BTA got event 0x104
  1870. E (36768) BT: bta_dm_sm_execute event:0x4
  1871. W (38018) GATTCallback: GATT CALLBACK: 41
  1872. I (38018) GATTCallback: ESP_GATTC_DISCONNECT_EVT, status = 0
  1873. W (38018) GATTC: Unregister -> esp_ble_gattc_app_unregister:  0
  1874. W (38018) GATTCallback: GATT CALLBACK: 5
  1875. E (38028) BT: BTA got event 0x1f04
  1876. E (38028) BT: Ignore unknown conn ID: 1
  1877. E (38038) BT: BTA got event 0x1f14
  1878. E (38038) BT: bta_gattc_deregister Deregister Failedm unknown client cif
RAW Paste Data
Ledger Nano X - The secure hardware wallet
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top